Language Selection

English French German Italian Portuguese Spanish

Linux

Arduino Yun integrates open-source Arduino architecture with Linux

Filed under
Linux

"Its availability is especially timely for the burgeoning Internet of Things market, opening the door to a whole host of new open-source design opportunities and applications that were previously out of reach using existing Arduino boards."

Read more

Top 10 Linux-Based Gifts for 2013 Under $400

Filed under
Linux

This year's list of the top 10 cool Linux-based gifts has dropped the price limit from $500 to $400, with seven candidates falling below $300. If your budget runs a bit higher, there are plenty of other embedded Linux goodies out there, and if the sky's the limit, you might try the 2014 Motor Trend Car of the Year: the Cadillac CTS. Like the 2013 winner, the Tesla Model S, the CTS features a Linux-based in-vehicle infotainment system. (See Jim Zemlin's recent blog "Automotive Linux Leaves Microsoft and Blackberry QNX in the Dust.")

Read more

Genode 13.11 adds Qt5 QML, Linux TCP/ IP, FUSE file systems

Filed under
Linux

The Genode project has released version 13.11 of their OS framework. This time, the focus lies on exploring new ways for bringing existing protocol stacks to the Genode world. FUSE-based file systems and the Linux TCP/IP stack have become available as user-level libraries, and the improved Qt5 port covers QML. Hardware-wise, the new version extends the support for Exynos-5, Raspberry Pi, and ARM TrustZone.

Read more

Liberating Devices From Android Using Replicant, Not CyanogenMod

Filed under
Linux

CyanogenMod is the best known Android alternative and back in September it was said to be an Android unifier, not a forker [1]. A while later (when it was becoming a well-funded company, CyanogenMod Inc.) it made everything easier to set up [2] and later it got banned from Google’s so-called ‘app’ store [3,4] (which can involve censorship, just like Apple’s).

Read more

GNU/Linux in Games/Consoles Can Topple Sony and Microsoft, Pundits Say

Filed under
Linux
Gaming

As GNU/Linux matures, attracting developers and improving freedom-respecting drivers, the threat to proprietary gaming platforms increases

Read more

Eben Upton comments on open source Pi concerns

Filed under
Linux
OSS

The primary mission of the Raspberry Pi has always been to teach kids how to code the same way the BBC Micro did. In this issue we have another ten fantastic projects you can use it with, but for the Raspberry Pi foundation this is just a happy side-effect of the way they’ve created it. It also doesn’t hurt that these kind of practical applications can get children interested in technology as well.

Read more

Linux Deepin 2013 screen shot tour

Filed under
Linux

Linux Deepin is one of those unique Linux distributions for the desktop whose developers crafted a special desktop environment for it. Called the Depth Desktop Environment (DE), Linux Deepin’s DE is built atop GNOME 3 technologies, but with an interface that’s customized to provide what the developers consider a more user-friendly interface for desktop computing.

Read more

Linux 3.6 To Linux 3.13 Kernel Power Consumption Tests

Filed under
Linux

Ever since spotting a major Linux kernel power regression and increased Linux power usage followed by automatically locating the power regressions, there's requests every so often from Phoronix readers interested in new power-use benchmarks of the kernel.

Read more

Linux Mint 16 'Petra' Cinnamon, MATE editions released

Filed under
Linux

The team took 6 months to work on the Linux Mint 16 Petra and is basically an incremental development over the latest and greatest Linux open source technologies. Some of the improvements in Linux Mint 16 are related to Login Screen, USB Stick support, software manager, performance, artwork and system improvements, and improvement to the main components.

Read more

Linux 3.13, NVIDIA GPUs Won Over November

Filed under
Linux

...this year on Phoronix I alone have written 236 full-length articles and 2,637 news articles on top of my full-time development work on Phoronix Test Suite and its commercial arm and my other business ventures.

Read more

Syndicate content

More in Tux Machines

Five reasons to switch from Windows to Linux

Linux has been in the ascendancy ever since the open source operating system was released, and has been improved and refined over time so that a typical distribution is now a polished and complete package comprising virtually everything the user needs, whether for a server or personal system. Much of the web runs on Linux, and a great many smartphones, and numerous other systems, from the Raspberry Pi to the most powerful supercomputers. So is it time to switch from Windows to Linux? Here are five reasons why. Read more

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud