Language Selection

English French German Italian Portuguese Spanish

Interviews

The Linux Setup - Eric Hameleers, Slackware Linux

Filed under
GNU
Linux
Interviews
Slack

When you’re interviewing a Slackware developer, you have certain expectations about what they’ll say in terms of controlling your own system and Eric delivers. In fact, he makes the case that Slackware, known as a more challenging system to setup and maintain, is valuable because it requires so much thought. Which is true—I’ve always seen Slackware as one part distro and one part teaching tool. The rest of Eric’s interview is great as he’s a very smart guy who’s spent a lot of time thinking about what makes a distro work, not just in terms of specific software, but also in terms of what’s ultimately best for the user in the long-term.

Read more

Front and back-end developers should make friends

Filed under
Interviews
OSS

I definitely think that open source technologies are what made my self-education of development possible. I think that being able to experiment with open source projects and libraries as a young student was crucial for me in becoming who I am today. Without that exposure, or that access to the development world, I probably would have given up out of frustration thinking the barrier-to-entry was too high or over my head! I'm grateful that I was able to discover the open source world.

Read more

Open source interest at Pinterest

Filed under
Interviews
OSS

As I looked around the 2014 Grace Hopper Celebration of Women in Computing career fair (PDF) floor, I stopped by the Pinterest booth and learned that open source software plays a big role at the company. And even better, Pinterest now plays a big role in the world of open source software, too.

After the career fair, I followed up with the technical lead on the Pinterest Growth engineering team, Ludo Antonov. Ludo says that the Growth team builds the features, core products, and systems that directly help sustainably grow Pinterest to billions of users worldwide. In this interview, he explains the roles open source software plays at the company.

Read more

Advice for front-end developers from Adrian Pomilio of Teradata

Filed under
Interviews
OSS

Prior to the All Things Open conference in Raleigh this year, I asked Adrian Pomilio, UI developer at Teradata, a few questions about the session he'll deliver, his favorite open source tools, and recent trends in UI/UX technology relevant to open source world.

Read more

Coding is fun! Europe Code Week is back

Filed under
Interviews
OSS

The first ever Europe Code Week took place last year and was largely an experiment to test things out. Opensource.com covered it in an interview with Julie Cullen, the Irish Ambassador, asking her what activities were planned in her home country. This year, Europe Code Week has even more activities planned, over 1000 and counting! To get more insight on the event, I interviewed Alja Isakovic, one of the Young Advisors and organizers for the Europe Code Week program. In this interview, she shares some of last year's successes and tells us what people can look forward to this year.

Read more

Behind the scenes with CTO Michael DeHaan of Ansible

Filed under
Interviews
OSS

He gives an idea of what the Ansible open source community is all about, including the rewards and challenges of working with users who also happen to be talented developers. He answers this and more, like what he'd work on if he could just add one more hour to the day.

Read more

Diversity is a crucial component of meritocracy

Filed under
Red Hat
Interviews
OSS

The culture and environment in an open source community makes a big difference, and the same is true for company cultures. A lot has been written about this issue elsewhere, and you can find some great examples of how this happens on the Geek Feminism Wiki FLOSS webpage. In open source communities and at Red Hat, there's a strong desire for meritocracy—letting the best ideas win, regardless of their source. But diversity is a crucial component of meritocracy. How can we be confident that we have access to the very best ideas, if we are missing the perspectives of distinct groups of the population? Including people from many different backgrounds and cultures leads to greater diversity of thought and ideas. Research indicates that diverse groups are more innovative and make better decisions. For the technology industry and for open source communities, the lack of women is particularly concerning, because women represent half of the global population and workforce. In the past few years, I've also become increasingly interested in the role of unconscious bias and how it impacts the job application and interview process. Our human tendency is to instinctively prefer and value people who send unconscious signals that they're one of us—that they share our beliefs, background, or other social interests. It's easy for us to overlook the contributions of someone who comes from a different gender or culture. We don't even realize that we're doing it, and we construct explanations for our preferences that seem rational. Unconscious bias a fascinating topic, and plenty has been written about it, so I encourage everyone to seek out that information and put it to good use. It's something that Red Hat now educates our associates on, as part of our job interviewer training. I think it's equally relevant when it comes to cultural norms within open source communities.

Read more

Jono Bacon: How to Build Exponential Open Source Communities

Filed under
Interviews
Ubuntu

Open source projects live and die by their communities. Cultivating that core group of developers, administrators, users and other contributors who work together to improve the code base is no easy task, even for experienced community managers. There are some tried-and-true methods to follow, however, pioneered by some of the best open source communities around.

Read more

Open source as second nature to this project leader

Filed under
Red Hat
Interviews

Heiko Rupp, a contributor to Opensource.com and Principal Software Engineer and Project Lead for the RHQ project at Red Hat, shares with us in this Community Spotlight the hardware he wishes were more open in his life. Heiko also gives a glimpse into his day-to-day on the RHQ-Project, an enterprise management solution for JBoss middleware projects and other server-side applications.

Read more

Elasticsearch director tells us how the magic happens

Filed under
Interviews
OSS

I was introduced to open source nearly 15 years ago by a friend when I asked him what that foot thing was bouncing around on his screen saver. He then explained what GNOME was and what open source software was. I was hooked immediately; the philosophy and methodology made perfect sense to me. It took awhile for it to become the focus of my career, but it's been an incredibly rewarding path.

Read more

Syndicate content

More in Tux Machines

OpenELEC 8.0.2 Embedded Linux Entertainment OS Is Out with Mesa 17.0.4, More

The OpenELEC 8.0 open-source embedded Linux entertainment operating system received its second maintenance update, versioned 8.0.2, which fixes various issues reported by users lately and updates some core components. Read more

Red Hat Financial News

  • Red Hat announces latest version of Ansible
  • Red Hat On An Expansion Spree In India
    Red Hat is aggressively expanding its operations in India. The company recently announced the opening of two new offices in Bangalore and New Delhi. With the opening of the new offices, Red Hat is expanding its footprint in India with a goal of supporting interest for open source solutions and services from customers and partners and further promoting the benefits open source solutions can offer enterprises in India. Red Hat now has six offices in India, including additional facilities in Bangalore and New Delhi, and offices in Mumbai and Pune. Red Hat’s new Bangalore office is a 14,000 sq. ft. facility at Lavelle Road. It is designed to act as a training and enablement center for customers and partners. Through the new facility, which features a cafeteria, and space for networking, meetings, training and certification exams, and an indoor game zone, Red Hat aims to bring its open, collaborative culture to life. The additional New Delhi office is a 12,405 sq.ft facility located close to the international airport at Aerocity, designed with an eye toward enabling collaboration with customers throughout the region.
  • Somewhat Positive Press Coverage Very Likely to Affect Red Hat (RHT) Stock Price
  • Red Hat Inc (RHT) Releases Q1 Earnings Guidance

Security Leftovers

  • Security updates for Monday
  • Recursive DNS Server Fingerprint Problem

    Our goal is to identify hijacked resolvers by analyzing their fingerprints, in order to increase safety of Internet users. To do that, we utilize data collected via RIPE Atlas (atlas.ripe.net).

  • Online developer tutorials are spreading XSS and SQL injection flaws

    The researchers, from across three universities in Germany and Trend Micro, checked the PHP code bases of more than 64,000 projects on Github and uncovered more than 100 vulnerabilities that they believe might have been introduced as a result of developers picking up the code that they used from online tutorials.

  • BrickerBot, the permanent denial-of-service botnet, is back with a vengeance

    BrickerBot, the botnet that permanently incapacitates poorly secured Internet of Things devices before they can be conscripted into Internet-crippling denial-of-service armies, is back with a new squadron of foot soldiers armed with a meaner arsenal of weapons.

  • Reproducible Builds: week 104 in Stretch cycle
  • Webroot antivirus goes bananas, starts trashing Windows system files
    Webroot's security tools went berserk today, mislabeling key Microsoft Windows system files as malicious and temporarily removing them – knackering PCs in the process. Not only were people's individual copies of the antivirus suite going haywire, but also business editions and installations run by managed service providers (MSPs), meaning companies and organizations relying on the software were hit by the cockup. Between 1200 and 1500 MST (1800 and 2100 UTC) today, Webroot's gear labeled Windows operating system data as W32.Trojan.Gen – generic-Trojan-infected files, in other words – and moved them into quarantine, rendering affected computers unstable. Files digitally signed by Microsoft were whisked away – but, luckily, not all of them, leaving enough of the OS behind to reboot and restore the quarantined resources.
  • How The Update Framework Improves Security of Software Updates
    Updating software is one of the most important ways to keep users and organizations secure. But how can software be updated securely? That's the challenge that The Update Framework (TUF) aims to solve. Justin Cappos, assistant professor at New York University, detailed how TUF works and what's coming to further improve the secure updating approach in a session at last week's DockerCon 17 conference in Austin, Texas. Simply using HTTPS and Transport Layer Security (TLS) to secure a download isn't enough as there have been many publicly reported instances of software repositories that have been tampered with, Cappos said.
  • Security Updates for Ubuntu Phone to End in June
    Security updates for Ubuntu phone and tablet will end this June, Canonical has confirmed. Current OTA updates are currently limited to critical fixes and security updates — a decision we were first to tell you back in January. But after June 2017 Canonical “will no longer deliver any further updates”.
  • Canonical to stop supporting Ubuntu Phone in June
    Canonical had already announced development of its Ubuntu Phone software was ending. Now we know when the final nail goes in the coffin: June.
  • Malware Hunts And Kills Poorly Secured Internet Of Things Devices Before They Can Be Integrated Into Botnets
    Researchers say they've discovered a new wave of malware with one purpose: to disable poorly secured routers and internet of things devices before they can be compromised and integrated into botnets. We've often noted how internet-of-broken-things devices ("smart" doorbells, fridges, video cameras, etc.) have such flimsy security that they're often hacked and integrated into botnets in just a matter of seconds after being connected to the internet. These devices are then quickly integrated into botnets that have been responsible for some of the worst DDoS attacks we've ever seen (including last October's attack on DYN).

GNOME/GTK News

  • The Way GNOME Handles Wallpapers Really Annoys Me
    I love GNOME Shell — and no, not just because I’ve little choice now that is Ubuntu’s default desktop! But the more I use GNOME the more I learn that the desktop environment, like every other, has its own share of quirks, bugs and inconsistencies. Like the following appreciably niche niggle in the the way GNOME handles desktop wallpapers.
  • Drag-and-drop in lists
    I’ve recently had an occasion to implement reordering of a GtkListBox via drag-and-drop (DND). It was not that complicated. Since I haven’t seen drag-and-drop used much with list boxes, here is a quick summary of what is needed to get the basics working.