Language Selection

English French German Italian Portuguese Spanish

OSS, Openwashing and Sharing

Filed under
OSS
  • VOLTHA Release Provides the Brain for AT&T’s XGS-PON Plans

    AT&T’s 10-gigabit symmetric passive optical network technology (XGS-PON) plans are set to receive some open source brains.

    The carrier today released the first version of its Virtual Optical Line Termination Hardware Abstraction (VOLTHA) software into the Open Networking Foundation (ONF). The platform provides a software framework – or “brain” – behind the XGS-PON access network in the cloud.

  • AT&T Releases Open-Source VOLTHA Software for XGS-PON

    In AT&T’s latest effort to virtualize the last mile of connectivity between its fiber network and customers’ homes or businesses, the operator released open-source software it calls the “brain” for XGS-PON access technology.

  • Say Hi to Subutai

    Subutai is an open-source project and platform that lets anyone share, barter or rent computer resources to create clouds from the edge rather than centralized locations. Available devices can attach to these clouds hovering on the edge. We started calling it Social Cloud Computing, but technically, Subutai is a dynamic p2p multi-cloud made possible thanks to Lightweight Linux Containers and software-defined networking. Think Amazon's Virtual Private Cloud, but running on your computers and the computers of social contacts who share their computer resources with you. Or, think AirBnB on computers for the people's cloud.

  • Open-Source Tool Aims to Boost Confidence in Ice Sheet Models

    Massive ice sheets with layers built up over millions of years blanket most of Greenland and Antarctica. As a result of climate change, these ice sheets have begun to melt and shrink. Scientists believe this trend is likely to continue and will contribute to sea level rise for decades to come.

  • What are the advantages of open source software?

    Open source software attracts an ever-growing list of advocates. It can save organisations a lot of money while still providing a superior service to that available from proprietary vendors.

    Read on for a rundown of the key benefits open source software has over commercial products

  • Webinar: 10-step plan to rollout Cloud devops
  • The ARCS model of motivational design

    The ARCS model is an instructional design method developed by John Keller that focuses on motivation. ARCS is based on a research into best practices and successful teachers and gives you tactics on how to evaluate your lessons in order to build motivation right into them.

  • Patching Firefox

    For Firefox 57, mozilla decided to overhaul much of their browser. The changes are large and massive, and in some ways revolutionary. It's no surprise, therefore, that some of the changes break compatibility with older things.

  • Oracle Builds a Blockchain Cloud Service Based on Hyperledger

    At its Oracle OpenWorld conference this week in San Francisco, the company announced its new Blockchain Cloud Service. The distributed ledger cloud platform aims to help enterprises make various transactions more secure, using blockchain technology. The new service — which is fully managed by Oracle — is part of Oracle’s Cloud Platform.

  • Blockchain Startup Circle To Launch Open Source Project To Send Money Like Email And Tex
  • PostgreSQL 10 released

    Version 10 of the PostgreSQL database management system has been released.

  • The illustrated Open Organization is now available [Ed: A whole book dedicated to openwashing Red Gat for recruitment/marketing purposes]
  • The Untapped Potential of Open-Source for Education
  • Elsevier's Latest Brilliant Idea: Adding Geoblocking To Open Access

    We've just written about a troubling move by Elsevier to create its own, watered-down version of Wikipedia in the field of science. If you are wondering what other plans it has for the academic world, here's a post from Elsevier’s Vice President, Policy and Communications, Gemma Hersh, that offers some clues. She's "responsible for developing and refreshing policies in areas related to open access, open data, text mining and others," and in "Working towards a transition to open access", Hersh meditates upon the two main kinds of open access, "gold" and "green".

  • Medical 3D Printing Roundup: Slovenia's Symbiolab develops open source Vitaprint bioprinter, two 3D printed spine implants approved

    With its promise to someday 3D print viable human organs for transplantation, bioprinting is one of the most exciting additive technologies out there. Its biggest drawback? Cost. Many popular 3D bioprinters cost upward of $200,000, if they’re even on sale at all.

More in Tux Machines

Linux firewalls: What you need to know about iptables and firewalld

A firewall is a set of rules. When a data packet moves into or out of a protected network space, its contents (in particular, information about its origin, target, and the protocol it plans to use) are tested against the firewall rules to see if it should be allowed through. Here’s a simple example... Read more

Mozilla: Firefox GCC/LLVM Clang Dilemma, September 2018 CA Communication and CfP

  • Fedora Firefox – GCC/CLANG dilemma
    After reading Mike’s blog post about official Mozilla Firefox switch to LLVM Clang, I was wondering if we should also use that setup for official Fedora Firefox binaries. The numbers look strong but as Honza Hubicka mentioned, Mozilla uses pretty ancient GCC6 to create binaries and it’s not very fair to compare it with up-to date LLVM Clang 6. Also if I’m reading the mozilla bug correctly the PGO/LTO is not yet enabled for Linux, only plain optimized builds are used for now…which means the transition at Mozilla is not so far than I expected.
  • September 2018 CA Communication
    Mozilla has sent a CA Communication to inform Certification Authorities (CAs) who have root certificates included in Mozilla’s program about current events relevant to their membership in our program and to remind them of upcoming deadlines. This CA Communication has been emailed to the Primary Point of Contact (POC) and an email alias for each CA in Mozilla’s program, and they have been asked to respond to the following 7 action items:
  • Emily Dunham: CFP tricks 1
    Some strategies I’ve recommended in the past for dealing with this include looking at the conference’s marketing materials to imagine who they would interest, and examining the abstracts of past years’ talks.

today's howtos

Security: Quantum Computing and Cryptography, Time to Rebuild Alpine Linux Docker Container

  • Quantum Computing and Cryptography
    Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would break the RSA cryptosystem for any key length. This is why cryptographers are hard at work designing and analyzing "quantum-resistant" public-key algorithms. Currently, quantum computing is too nascent for cryptographers to be sure of what is secure and what isn't. But even assuming aliens have developed the technology to its full potential, quantum computing doesn't spell the end of the world for cryptography. Symmetric cryptography is easy to make quantum-resistant, and we're working on quantum-resistant public-key algorithms. If public-key cryptography ends up being a temporary anomaly based on our mathematical knowledge and computational ability, we'll still survive. And if some inconceivable alien technology can break all of cryptography, we still can have secrecy based on information theory -- albeit with significant loss of capability. At its core, cryptography relies on the mathematical quirk that some things are easier to do than to undo. Just as it's easier to smash a plate than to glue all the pieces back together, it's much easier to multiply two prime numbers together to obtain one large number than it is to factor that large number back into two prime numbers. Asymmetries of this kind -- one-way functions and trap-door one-way functions -- underlie all of cryptography.
  • This New CSS Attack Restarts iPhones & Freezes Macs
  • Time to Rebuild Alpine Linux Docker Containers After Package Manager Patch
  • GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg