Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Saturday, 21 Jul 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Hollywood Studios File New Round of Web Lawsuits srlinuxx 1 02/03/2005 - 12:37am
Story Review: SimplyMEPIS 3.3 Linux srlinuxx 1 02/03/2005 - 12:39am
Story Cannabis 'doubles mental health risk' srlinuxx 3 02/03/2005 - 6:31am
Story Invisibility Shields Planned srlinuxx 2 02/03/2005 - 5:21pm
Story Illicit drug sales booming online srlinuxx 2 02/03/2005 - 5:24pm
Story Half-Life 2 sweeps Bafta awards srlinuxx 2 02/03/2005 - 11:48pm
Story KDE's FOSDEM report srlinuxx 03/03/2005 - 5:06am
Story AMD's Latest Stunt srlinuxx 03/03/2005 - 5:14am
Poll I think polls srlinuxx 2 03/03/2005 - 10:20am
Story Court Overturns Eolas Browser Judgment Against Microsoft srlinuxx 03/03/2005 - 3:42pm

Microsoft's Lobbying Campaign for Android Antitrust Woes

Filed under
Android
Google
  • Google Hints A Future Where Android Might NOT Be Free
  • Android has created more choice, not less
  • Google Fined Record $5 Billion by EU, Given 90 Days to Stop ‘Illegal Practices’

    EU regulators rejected arguments that Apple Inc. competes with Android, saying Apple’s phone software can’t be licensed by handset makers and that Apple phones are often priced outside many Android users’ purchasing power.

  • EU: Google illegally used Android to dominate search, must pay $5B fine

    Thirdly, Google allegedly ran afoul of EU rules by deterring manufacturers from using Android forks. Google "has prevented manufacturers wishing to pre-install Google apps from selling even a single smart mobile device running on alternative versions of Android that were not approved by Google," the commission said.

  • EU hits Google with US$5b fine over alleged Android misuse

    The European Union has hit Google with a second fine in as many years, demanding that the search behemoth pay €4.34 billion (US$5.05 billion, A$6.82 billion) for breaching anti-trust rules over its Android mobile operating system.

    Announcing the fine on Wednesday in Brussels, the EU said Google must end such conduct within 90 days or pay a penalty of up to 5% of the average daily turnover of its parent company, Alphabet.

    The company has said it will appeal against the fine.

  • iPhone users buy half as many apps as Android users, but spend twice as much

    Apple's app store is still yielding twice the revenue of Google Play, and yet is only recording half the number of downloads.

    The figures for Q1&2 of the year suggest Apple owners spent $22.6bn on apps, whilst Android users only spent $11.8bn.

  • The EU fining Google over Android is too little, too late, say experts

    The Play Store is free to use under licence from Google, but comes with a set of conditions smartphone manufacturers must meet. The most important of these, and the one the EC has a problem with, is the requirement to set Google as the default search engine and the pre-installation of certain apps, including Google Chrome, YouTube and the Google search app. Google also dictates that some of the pre-installed apps be placed on the homescreen.

  • Don’t Expect Big Changes from Europe’s Record Google Fine

    The decision by the European Commission, the EU’s regulatory arm, found that Google manages Android, which runs roughly 80 percent of the world’s smartphones, in ways that illegally harm competition. The ruling focused on three practices: the bundling of Google's Chrome web browser and its search app as a condition for licensing the Google Play store; payments Google makes to phone manufacturers and telecom companies to exclusively preinstall the Google search app on their devices; and Google's practice of prohibiting device makers from running Google apps on Android “forks,” or alternative versions of the software unapproved by Google. In its ruling, the commission ordered Google to stop all of those practices.

OSS Leftovers

Filed under
OSS
  • Four top open source SIEM tools you should know

    With open source SIEM tools, organizations can test out certain capabilities and reduce cost barriers before expanding their product investments. Depending on what functions you're interested in, there is a variety of software to choose from.

    [...]

    Another choice for open source SIEM tools is Apache Metron. ELK Stack is a general purpose log and data parsing tool; Apache Metron focuses squarely on security.

    Apache Metron provides four main capabilities. First, it offers long-term, cost-effective storage of telemetry data through its security data lake feature. Second, it features an extensible framework that collects data from a variety of sources and supports any future endpoints. Third, Metron performs normal SIEM tasks, such as data ingest and threat alerts. The fourth capability is threat intelligence driven by machine learning-based anomaly detection.

  • Open Your Own Front Page Using Firefox New Tab

    Did you know Firefox has a unique page full of great links and ideas curated just for you? In one simple click, we’ve made it faster and easier for you to find things that are important to you whenever you open a new tab in Firefox.

  • pfSense Gold Free with 2.4.4-RELEASE

    Starting with the upcoming release of pfSense® 2.4.4, all of the services previously offered under “pfSense Gold” will continue, but will be free to all pfSense users. Read on for more detail.

  • Google Fined by EU for Antitrust Violations, Qt Creator 4.7.0 Now Available, New ownCloud Version 10.0.9, pfSense Gold to Be Free with the 2.4.4 Release, Kobol Relaunches Helios4

    Netgate announces that pfSense Gold will be free with the 2.4.4 release, including all services previously offered under the pfSense Gold subscription, such as the pfSense Book and monthly online Hangouts (video conferences). In addition, AutoConfigBackup (ACB) also will be free and will conform to GDPR best practices. The 2.4.4 release is planned for September 2018.

  • Emacs & TLS

    A recent query about the status of network security (TLS settings in particular) in Emacs led to a long thread in the emacs-devel mailing list. That thread touched on a number of different areas, including using OpenSSL (or other TLS libraries) rather than GnuTLS, what kinds of problems should lead to complaints out of the box, what settings should be the default, and when those settings could change for Emacs so as not to discombobulate users. The latter issue is one that lots of projects struggle with: what kinds of changes are appropriate for a bug-fix release versus a feature release. For Emacs, its lengthy development cycle, coupled with the perceived urgency of security changes, makes that question even more difficult.

  • nanotime 0.2.2

    A new maintenance release of the nanotime package for working with nanosecond timestamps just arrived on CRAN.

Openwashing Latest

Filed under
OSS

Security: Spectre V1, Gentoo, Google’s Servers and Denuvo DRM

Filed under
Security
  • Spectre V1 defense in GCC
  • Signing and distributing Gentoo

    The compromise of the Gentoo's GitHub mirror was certainly embarrassing, but its overall impact on Gentoo users was likely fairly limited. Gentoo and GitHub responded quickly and forcefully to the breach, which greatly limited the damage that could be done; the fact that it was a mirror and not the master copy of Gentoo's repositories made it relatively straightforward to recover from. But the black eye that it gave the project has led some to consider ways to make it even harder for an attacker to add malicious content to Gentoo—even if the distribution's own infrastructure were to be compromised.

    Unlike other distributions, Gentoo is focused on each user building the software packages they want using the Portage software-management tool. This is done by using the emerge tool, which is the usual interface to Portage. Software "packages" are stored as ebuilds, which are sets of files that contain the information and code needed by Portage to build the software. The GitHub compromise altered the ebuilds for three packages to add malicious content so that users who pulled from those repositories would get it.

    Ebuilds are stored in the /usr/portage directory on each system. That local repository is updated using emerge --sync (which uses rsync under the hood), either from Gentoo's infrastructure or one of its mirrors. Alternatively, users can use emerge-webrsync to get snapshots of the Gentoo repository, which are updated daily. Snapshots are individually signed by the Gentoo infrastructure OpenPGP keys, while the /usr/portage tree is signed by way of Manifest files that list the hash of each file in a directory. The top-level Manifest is signed by the infrastructure team, so following and verifying the chain of hashes down to a particular file (while also making sure there are no unlisted files) ensures that the right files are present in the tree.

  • Here’s How Hackers Are Using Google’s Servers To Host Malware For Free
  • Pirates Punish Denuvo-Protected Games With Poor Ratings

    Denuvo's anti-piracy technology is a thorn in the side of game pirates. While it has been defeated on several occasions recently, the strict anti-piracy measures have not been without consequence. According to new research, Denuvo has frustrated pirates to a point where they sabotage reviews on Metacritic, leading to significantly lower ratings for protected games.

Games: EXAPUNKS, Minecraft, The Station, Chicken Assassin: Reloaded, Stack Gun Heroes

Filed under
Gaming

GUADEC 2018 and GNOME

Filed under
GNOME
  • Felipe Borges: Summing up GUADEC 2018

    This year’s edition was once again a blast. The best opportunity to put faces into the names we interact daily throughout the communication channels of our community, and to meet new folk.

    Once again a volunteer, this year a chaired the sessions in the auditorium during the first day, organized one of the newcomers activities, and the football game. Don’t forget to check out the conference photos.

  • GUADEC 2018 (It’s a Gitlab world)

    GUADEC in Almería was a great opportunity to catch up with some technologies in the GNOME world, hang out with lovely folks again, and spend time at the beach.

  • Jakub Steiner: Detail Considered Harmful

    As many moons have passed since GNOME 3, it’s fair to stop and reconsider the aesthetic choices we made. We don’t actually present app icons at small resolutions anymore. Pixel perfection sounds like a great slogan, but maybe this is another area that dillutes our focus. Asking app authors to craft pixel precise variants that nobody actually sees? Complex size lookup infrastructure that prominent applications like Blender fail to utilize properly?

    [...]

    The irony of the previous blog post is not lost on me, as I’ve been seduced by the shading and detail of these highres artworks. But every day it’s more obvious that we need to do a dramatic redesign of the app icon style. Perhaps allowing to programatically generate the unstable/nightlies style. Allow a faster turnaround for keeping the style contemporary and in sync what other platforms are doing. Right now, the dated nature of our current guidelines shows.

More Android Leftovers (Mostly Microsoft's Antitrust Push Against Android)

Filed under
Android

Ubuntu 17.10 Reaches End of Life, Existing Users Must Upgrade to 18.04

Filed under
News

Ubuntu 17.10 reached the end of life on 19th July 2018. This means that systems running Ubuntu 17.10 won’t receive security and maintenance updates from Canonical anymore leaving them vulnerable.
Read more

3 big steps toward building authentic developer communities

Filed under
OSS

As more software businesses are selling open source products, we've seen a corresponding rise in the emphasis of building out developer communities around these products as a key metric for success. Happy users are passionate advocates, and these passionate advocates raise overall awareness of a company's product offerings. Attract the right vocal influencers into your community, and customers become more interested in forming a relationship with your company.

Doing community building the right way, however, is a delicate balance. Undercut the needs of your user community in favor of driving sales, and your company will face a decrease in adoption and unfavorable brand awareness. Meanwhile, too little focus on the bottom line isn't good for the company. So how can this tension be balanced effectively, especially in a world in which developers are the "new kingmakers" and meeting their sensibilities is a cornerstone of driving corporate purchasing decisions?

Over the past year, I've thought a lot about how to do effective community building while building the business bottom line. In this article, I'll outline three big steps to take toward building authentic, productive, sustainable developer communities.

Read more

Also: A 4-step plan for creating teams that aren't afraid to fail

Amid the 20th anniversary of open source, Tim O’Reilly warns that platform companies built on open-source software have lost their way

Filed under
OSS

It’s rare to hear Chinese philosophy quoted on stage at a software-development conference. But O’Reilly Media founder and CEO Tim O’Reilly invoked the words of Lao Tzu Wednesday morning during the opening keynotes at OSCON 2018 in hopes of convincing those in attendance — many of whom work for the big internet platform companies of our time — that the tech industry needs to return to the spirit of openness and collaboration that drove the early days of the open-source community before it is too late.

“We have an opportunity with these next generation of systems, to rebuild, to rethink the future, to discover what does it mean to get these systems right,” O’Reilly said. If the first era of the internet was dominated by open protocols, and the second era was dominated by the rise of huge platform companies like Amazon, Google, and Facebook, the third era we’re about to enter presents a chance to get it right again.

Read more

Speech to Text conversion in Linux

Filed under
Linux

This is how you can convert speech to text in Linux systems using Google Docs. There are not much speech recognition software available in Linux systems including native desktop apps. There are some apps available which uses IBM Watson and other APIs to convert speech to text but they are not user-friendly and requires advanced level of user interactions e.g. little bit of programming or scripting in respective languages.

However not many users know that Google Docs provides an advanced level of Speech Recognition using its own AI technologies which can be accessed via Chrome in Google Docs. Any category of user can use this feature to convert speech to text and this requires no advanced level of computer knowledge. The best thing about this feature of Google Docs is you can use it in any Ubuntu derivatives, any Linux distributions including Windows where Chrome is available.

Read more

Ubuntu 17.10 (Artful Aardvark) Reached End of Life, Upgrade to Ubuntu 18.04 LTS

Filed under
Ubuntu

Released nine months ago on October 19, 2017, Ubuntu 17.10 was dubbed "Artful Aardvark" by Canonical CEO Mark Shuttleworth because it was the first release of the Ubuntu Linux operating system to ship with the GNOME desktop environment instead of Unity on the Desktop edition.

To due to the sudden move from Unity to GNOME, Ubuntu 17.10 brought several substantial changes, such as the switch to the next-generation Wayland display server by default instead of X.Org Server, a decision that was reverted with the release of Ubuntu 18.04 LTS (Bionic Beaver), and the discontinuation of the Ubuntu GNOME flavor.

Read more

How to add Linux to your Chromebook

Filed under
Linux
HowTos

It's long been possible to run Linux on a Chromebook. That's no surprise. After all, Chrome OS is a Linux variant. But, doing it by using either Crouton in a chroot container or Gallium OS, a Xubuntu Chromebook-specific Linux variant, wasn't easy. Then, Google announced it was bringing a completely integrated Linux desktop to the Chromebook.

Today, with a properly-equipped Chromebook and the bravery to run canary code, you can run Debian Linux on your Chromebook. Here's how to do it.

This new Chromebook Linux feature is Crostini, the umbrella technology for getting Linux running with Chrome OS. Crostini gets enough Linux running to run KVM, Linux's built-in virtual machine (VM). On top of this, Crostini starts and runs LXC containers. You won't see it, unless you look closely, but it's in those containers that your Debian Linux instances are running.

Read more

Linux File Server Guide

Filed under
Linux

Linux file servers play an essential role. The ability to share files is a basic expectation with any modern operating system in the workplace. When using one of the popular Linux distributions, you have a few different file sharing options to choose from. Some of them are simple but not that secure. Others are highly secure, yet require some know-how to set up initially.

Once set up on a dedicated machine, you can utilize these file sharing technologies on a dedicated file server. This article will address these technologies and provide some guidance on choosing one option over another.

Read more

Security: SSL, Microsoft Windows TCO, Security Breach Detection and SIM Hijackers

Filed under
Security
  • Why Does Google Chrome Say Websites Are “Not Secure”?

    Starting with Chrome 68, Google Chrome labels all non-HTTPS websites as “Not Secure.” Nothing else has changed—HTTP websites are just as secure as they’ve always been—but Google is giving the entire web a shove towards secure, encrypted connections.

  • Biggest Voting Machine Maker Admits -- Ooops -- That It Installed Remote Access Software After First Denying It [Ed: Microsoft Windows TCO]

    We've been covering the mess that is electronic voting machines for nearly two decades on Techdirt, and the one thing that still flummoxes me is how are they so bad at this after all these years? And I don't mean "bad at security" -- though, that's part of it -- but I really mean "bad at understanding how insecure their machines really are." For a while everyone focused on Diebold, but Election Systems and Software (ES&S) has long been a bigger player in the space, and had just as many issues. It just got less attention. There was even a brief period of time where ES&S bought what remained of Diebold's flailing e-voting business before having to sell off the assets to deal with an antitrust lawsuit by the DOJ.

    What's incredible, though, is that every credible computer security person has said that it is literally impossible to build a secure fully electronic voting system -- and if you must have one at all, it must have a printed paper audit trail and not be accessible from the internet. Now, as Kim Zetter at Motherboard has reported, ES&S -- under questioning from Senator Ron Wyden -- has now admitted that it installed remote access software on its voting machines, something the company had vehemently denied to the same reporter just a few months ago.

  • Bringing cybersecurity to the DNC [Ed: Microsoft Windows TCO. Microsoft Exchange was used.]

    When Raffi Krikorian joined the Democratic National Committee (DNC) as chief technology officer, the party was still reeling from its devastating loss in 2016 — and the stunning cyberattacks that resulted in high-level officials’ emails being embarrassingly leaked online.

  • Getting Started with Successful Security Breach Detection

    Organizations historically believed that security software and tools were effective at protecting them from hackers. Today, this is no longer the case, as modern businesses are now connected in a digital global supply ecosystem with a web of connections to customers and suppliers. Often, organizations are attacked as part of a larger attack on one of their customers or suppliers. They represent low hanging fruit for hackers, as many organizations have not invested in operationalizing security breach detection.

    As this new reality takes hold in the marketplace, many will be tempted to invest in new technology tools to plug the perceived security hole and move on with their current activities. However, this approach is doomed to fail. Security is not a "set it and forget it" type of thing. Defending an organization from a breach requires a careful balance of tools and operational practices -- operational practices being the more important element.

  • The SIM Hijackers

    By hijacking Rachel’s phone number, the hackers were able to seize not only Rachel’s Instagram, but her Amazon, Ebay, Paypal, Netflix, and Hulu accounts too. None of the security measures Rachel took to secure some of those accounts, including two-factor authentication, mattered once the hackers took control of her phone number.

GNU/Linux Desktops/Laptops and Windows Spying

Filed under
GNU
Linux
  • Changes [Pop!_OS]

    For the last 12 years, my main development machine has been a Mac. As of last week, it’s a Dell XPS 13 running Pop!_OS 18.04.

    [...]

    Take note: this is the first operating system I’ve used that is simpler, more elegant, and does certain things better than macOS.

  • System76 Opens Manufacturing Facility to Build Linux Laptops

    As it turns out, System76 is making the transition from a Linux-based computer seller, into a complete Linux-based computer manufacturer. The Twitter photos are from their new manufacturing facility. This means that System76 will no longer be slapping their logo on other company’s laptops and shipping them out, but making their own in-house laptops for consumers.

  • Extension adding Windows Timeline support to third-party browsers should have raised more privacy questions

    Windows Timeline is a unified activity history explorer that received a prominent placement next to the Start menu button in Windows 10 earlier this year. You can see all your activities including your web browser history and app activity across all your Windows devices in one place; and pickup and resume activities you were doing on other devices. This is a useful and cool feature, but it’s also a privacy nightmare.

    You may have read about a cool new browser extension that adds your web browsing history from third-party web browsers — including Firefox, Google Chrome, Vivaldi, and others — to Windows Timeline. The extension attracted some media attention from outlets like MSPoweruser, Neowin, The Verge, and Windows Central.

Syndicate content

More in Tux Machines

KDE and GNOME: Kubuntu 18.04 Reviewed, Akademy, Cutelyst and GUADEC

  • Kubuntu 18.04 Reviewed in Linux ( Pro ) Magazine
    Kubuntu Linux has been my preferred Linux distribution for more than 10 years. My attraction to the KDE desktop and associated application set, has drawn from Kubuntu user, to a tester, teacher, developer, community manager and councilor. I feel really privileged to be part of, what can only be described as, a remarkable example of the free software, and community development of an exceptional product. This latest release 18.04, effectively the April 2018 release, is a major milestone. It is the first LTS Long Term Support release of Kubuntu running the “Plasma 5” desktop. The improvements are so considerable, in both performance and modern user interface ( UI ) design, that I was really excited about wanting to tell the world about it.
  • Going to Akademy
    Happy to participate in a tradition I’ve admired from afar but never been able to do myself… until this year. My tickets are bought, my passport is issued, and I’m going to Akademy! Hope to see you all there!
  • System76's New Manufacturing Facility, Ubuntu 17.10 Reaches End of Life, Google Cloud Platform Marketplace, Stranded Deep Now Available for Linux and Cutelyst New Release
    Cutelyst, a C++ web framework based on Qt, has a new release. The update includes several bug fixes and some build issues with buildroot. See Dantti's Blog for all the details. Cutelyst is available on GitHub.
  • GUADEC 2018 Videos: Help Wanted
    At this year’s GUADEC in Almería we had a team of volunteers recording the talks in the second room. This was organized very last minute as initially the University were going to do this, but thanks to various efforts (thanks in particular to Adrien Plazas and Bin Li) we managed to record nearly all the talks. There were some issues with sound on both the Friday and Saturday, which Britt Yazel has done his best to overcome using science, and we are now ready to edit and upload the 19 talks that took place in the 2nd room. To bring you the videos from last year we had a team of 5 volunteers from the local team who spent our whole weekend in the Codethink offices. (Although none of us had much prior video editing experience so the morning of the first day was largely spent trying out different video editors to see which had the features we needed and could run without crashing too often… and the afternoon was mostly figuring out how transitions worked in Kdenlive).
  • GUADEC 2018
    This year I attended my second GUADEC in beautiful Almería, Spain. As with the last one I had the opportunity to meet many new people from the extended GNOME community which is always great and I can’t recommend it enough for anybody involved in the project. [...] Flatpak continues to have a lot of healthy discussions at these events. @matthiasclasen made a post summarizing the BoF so check that out for the discussions of the soon landing 1.0 release. So lets start with the Freedesktop 18.07 (date based versioning now!) runtime which is in a much better place than 1.6 and will be solving lots of problems such as multi-arch support and just long term maintainability. I was really pleased to see all of the investment in BuildStream and the runtime from CodeThink which is really needed in the long term.

Red Hat and Fedora

Android: Video Editors, Antitrust/Forks, and Fuchsia OS

OSS Leftovers

  • Mitre to Use Open Source Tool for Cyber Evaluations on 8 Companies
    Mitre will deploy an open source tool to assess the cybersecurity capabilities of eight companies and subsequently release findings in October as part of an initiative by the nonprofit research organization, ExecutiveBiz reported Thursday. The Washington Business Journal reported Tuesday that Mitre will utilize its Adversarial Tactics, Techniques and Common Knowledge platform to help conduct evaluations on the cyber offerings of Carbon Black (Nasdaq: CBLK), CounterTack, CrowdStrike, Cylance, Endgame, Microsoft (Nasdaq: MSFT), RSA and SentinelOne.
  • News:-Apache’s Project Kafka has released stable latest version 1.1.1
    Apache Kafka is a distributed streaming platform to publish, store, subscribe, and process the records. Kafka is broadly used for real-time streaming of the data between systems or applications. There are various applications in which Kafka is used like samza and confluent for Real-time Financial Alerts. Big brand names like The NewYork Times, Pinterest, Zalando, Rabobank, LINE, trivago are few of them who are using Kafka.
  • Creating Open-Source Projects Companies Want to Sponsor
  • IBM reflects on open source some 20 years into it
    Open source might be a relatively new trend in telecom, but it’s been around at least 20 years, and that’s something OSCON 2018 organizers want to make sure attendees here are aware. The open source convention known as OSCON hosts developers, IT managers, system administrators and just plain geeks who want to learn the latest in blockchain, Kubernetes or other technical arenas and hear inspiring stories about open source. The convention is back in Portland this week after having been held in Austin, Texas, the past two years. In telecom, operators want their vendors to deliver based on open source platforms. Various initiatives are under way, but not every vendor is rushing to the party. Through the Open Networking Foundation (ONF), for example, operators are developing reference designs so that everyone in the supply chain knows what solutions operators plan to procure and deploy.
  • Perspecta Participates in Open Source Summit as Conference Sponsor; Mac Curtis Comments
    Perspecta (NYSE: PRSP) served as a sponsor of the 7th Annual Open Source Summit organized by the Open Source Electronic Health Record Alliance to discuss the use of open source software in industry and government, ExecutiveBiz reported July 13.
  • Get rich with Firefox or *(int *)NULL = 0 trying: Automated bug-bounty hunter build touted
    Do you love Firefox, Linux, and the internet? Are you interested in earning money from the comfort of your own home? Are you OK with a special flavor of Firefox quietly gobbling up memory in a hunt for exploitable security bugs? If so, Mozilla has a deal for you. The open internet organization (and search licensing revenue addict) would like you to go about your usual browsing business with a special Firefox build designed to automatically report potential security flaws in the software back to the mothership. If you do so, and the reported error turns out to be a legit exploitable vulnerability that Firefox engineers can fix, you'll be rewarded as if you'd submitted the errant code to Mozilla's bug bounty program. That's right, kids. Your aimless online procrastination could be your ticket to riches through the ASan Nightly Project.
  • Why an ops career
    It’s been a great “family reunion” of FOSS colleagues and peers in the OSCON hallway track this week. I had a conversation recently in which I was asked “Why did you choose ops as a career path?”, and this caused me to notice that I’ve never blogged about this rationale before. I work in roles revolving around software and engineering because they fall into a cultural sweet spot offering smart and interesting colleagues, opportunities for great work-life balance, and exemplary compensation. I also happen to have taken the opportunity to spend over a decade building my skills and reputation in this industry, which helps me keep the desirable roles and avoid the undesirable ones. Yet, many people in my field prefer software development over operations work.
  • Free and open source software for public health information systems in India
  • David's Progress on The Free Software Directory, internship weeks 2-3
    I'm working on creating a list of free software extensions for Mozilla-based browsers on the Free Software Directory based on data from addons.mozilla.org. This is needed because the official extensions repository includes many proprietary extensions. I found out that it's not possible to use the addons.mozilla.org API to list add-on collections, so I submitted a bug report for this. To my surprise they declined my suggestion, so I had to add a function to my program to parse it manually. Then I went on and wrote a detailed README file to describe the philosophy for the project to make it easy for anyone to contribute. I merged my source code to the Savannah GNU package called Free Software Directory, which also has scripts for importing data from Debian. I started a collection of IceCat add-ons and recommended IceCat (and Abrowser) to use it in Tools -> Add-ons (about:addons) -> Get Add-ons.
  • PHP version 5.6.37, 7.0.31, 7.1.20 and 7.2.8
  • An Introduction to Using Git
    If you’re a developer, then you know your way around development tools. You’ve spent years studying one or more programming languages and have perfected your skills. You can develop with GUI tools or from the command line. On your own, nothing can stop you. You code as if your mind and your fingers are one to create elegant, perfectly commented, source for an app you know will take the world by storm.
  • Open Source and Standard-Essential Patents: More Alike Than Not
    The unspoken question that this paper raises in my mind is whether it may be incorrect to speak of Open Source and standardization as separate activities at all.  Instead, Open Source might correctly be viewed as a species of standardization activity, with particular license conditions and membership conditions. The success of Open Source activities—and other standards that implement royalty-free commitments, such as Bluetooth—shows that there’s a place in the continuum of standards policy for royalty-free licensing when participants wish that to be the case.