Language Selection

English French German Italian Portuguese Spanish

OSS

Open source part of Bulgarian eGovernment tender requirements

Filed under
OSS

The Bulgarian government has added open source as a requirement to its 'Preliminary criteria for the eligibility of eGovernment projects'.
The document states that:
all rights with regard to the interface design and the source code of the project must be transferred from the contractor to the contracting party;
the source code developed for the project must be made publicly available in an online Revision Control System during development;
for all projects, it should be explored whether the whole or part (i.e. libraries, packages, modules) of the software can be based on existing open source software; if it is financially justified, using open source is the preferred approach;
to facilitate the use of the online Revision Control System and to guarantee the real-time availability of the latest version of the source code, the system should function as the central and original repository.

Read more

Leftovers: OSS

Filed under
OSS

Open-Source CMSs Appeal To Control-Oriented Media

Filed under
OSS
Web

Snubbed by local media in their infancy for being too rudimentary, news outlets are taking a growing interest in using open-source content management systems like WordPress and Drupal.

Media companies’ tech execs say they like the open-source CMS platforms because the software now offers all the extras and options that managed CMS platforms do, while also allowing them more creativity and control.

Read more

Also: Execs from Kentico and HIPPO debate pros and cons of open source CMS

Jahia Provides Open Source User Experience Platform to Samsung Subsidiaries as a Global Platform Partner

Google Play Store/Chrome Web Store

Filed under
Android
Google
Mac
OSS

Leftovers: OSS

Filed under
OSS
  • NPR Open Sources "Lunchbox" Tools for Cloud and Social Graphics

    Whether you do some blogging, work as a journalist or just make use of popular social media and cloud computing tools, you probably regularly need to acquire and customize publishable graphics. The good people at NPR are out to make that job easier.

  • 6 top continuous integration tools

    Continuous integration (CI) is an integral part of an agile software development setup. Sprint after sprint, teams strive to "not break the build" while delivering incremental features. But when developers focus completely on adding features, code errors can sometimes creep in and render the software unusable. To stop such errors from being integrated into the software configuration management (SCM), a CI server is the gatekeeper that helps keep a tab on code quality. Even if the code is integrated to SCM, a CI server can quickly tell you what went wrong. In this post, let's take a look at six open source CI server tools that you can use in your agile setup.

  • Now SourceForge For Sale

    After a run of bad publicity and floundering to retain and attract users, parent company DHI today announced SourceForge.net and Slashdot.org are for sale. DHi said the reason was due to a refocus on their employment services. Elsewhere, CoreOS CEO Alex Polvi spoke with InfoWorld.com's Paul Krill about cloud strategies and OpenSource.com wants to know what is your favorite desktop environment.

    It's been a rough year for SourceForge. SourceForge began last Summer by asking users to change their passwords for now reason at all before finally admitting the database had been hacked. Then they were found to be taking over software sources that appeared to have been abandoned and adding spyware into bundled installers. Later projects began fleeing in droves and SourceForge began a campaign to soften their image by reaching out and communicating more with "the community." Today their owner announced the immediate availability of SourceForge.net and as an added bonus, if you dial before midnight tonight, you'll get Slashdot.org too. The announcement said the sale was due to "not successfully [leveraging] the Slashdot user base to further Dice's digital recruitment business." No asking price was given, but DHi paid $20 million for the sites in 2012.

  • Nóirín Plunkett: Remembering Them

    Today I learned of some of the worst kind of news, my friend and a valuable contributor to the great open source community Nóirín Plunkett passed away. They (this is their preferred pronoun per their twitter profile) was well regarded in the open source community for contributions.

  • Getting physical: A $10 device to clone RFID access keys on the go

    A $10 device capable of skimming access cards on the go is soon to be released into the open-source community.

    Radio-frequency identification (RFID) cards are a quick and convenient way for businesses to track as and when their employees are on site, and also act as a way to both restrict and permit access to particular corporate locations. While RFID technology can help secure enterprise offices in this way, the ease in which these access controls can be hacked has hit the spotlight in the form of a tiny device which costs only $10 to make.

  • OpenDaylight Beryllium Takes Shape

    Colin Dixon, Technical Steering Committee Chair (TSC) at the OpenDaylight Project and a Principal Engineer at Brocade, said that the thing he's most proud of during the Lithium release cycle was that it landed on time, without too much pain. He commented that the maturity of the overall project has grown over the last two years, making a stable release cadence possible.

Coverity Report Finds Open Source Code Quality Beats Commercial Code

Filed under
OSS

Synopsys has announced the release of its annual Coverity Scan Open Source Report, which is widely followed. The 2014 report details the analysis of nearly 10 billion lines of source code through the Coverity Scan service and commercial usage of the Synopsys Testing Platform.

For the report, the company analyzed code from more than 2,500 open source C/C++ projects as well as an anonymous sample of commercial projects in 2014. Additionally, the report highlights results from several popular, open source Java and C# projects that have joined the Coverity Scan service since March 2013. Here are findings.

Read more

Also: Coverity Scan Open Source Report Shows Commercial Code Is More Compliant to Security Standards than Open Source Code

Open Source Usage in Large Enterprises

Filed under
OSS

It is obvious that open source is much used today and plays an important role in many organizations, but how used is it in large enterprises? This question has been addressed in a recent study called The Open Source Era, conducted by Oxford Economics, a venture with Oxford University dedicated to forecasting and quantitative analysis, and WIPRO, an IT, consulting and outsourcing company.

Read more

Free software advocates heckle town of Pesaro

Filed under
OSS

Italian proponents of the use of free and open source software by public administrations are protesting a decision by the town of Pesaro to switch from using OpenOffice to a proprietary cloud-based office solution. They say the city has garbled the cost calculations and omitted a required software assessment study.

Read more

Syndicate content

More in Tux Machines

Security News

  • Tuesday's security updates
  • New Open Source Linux Ransomware Divides Infosec Community
    Following our investigation into this matter, and seeing the vitriol-filled reaction from some people in the infosec community, Zaitsev has told Softpedia that he decided to remove the project from GitHub, shortly after this article's publication. The original, unedited article is below.
  • Fax machines' custom Linux allows dial-up hack
    Party like it's 1999, phreakers: a bug in Epson multifunction printer firmware creates a vector to networks that don't have their own Internet connection. The exploit requirements are that an attacker can trick the victim into installing malicious firmware, and that the victim is using the device's fax line. The firmware is custom Linux, giving the printers a familiar networking environment for bad actors looking to exploit the fax line as an attack vector. Once they're in that ancient environment, it's possible to then move onto the network to which the the printer's connected. Yves-Noel Weweler, Ralf Spenneberg and Hendrik Schwartke of Open Source Training in Germany discovered the bug, which occurs because Epson WorkForce multifunction printers don't demand signed firmware images.
  • Google just saved the journalist who was hit by a 'record' cyberattack
    Google just stepped in with its massive server infrastructure to run interference for journalist Brian Krebs. Last week, Krebs' site, Krebs On Security, was hit by a massive distributed denial-of-service (DDoS) attack that took it offline, the likes of which was a "record" that was nearly double the traffic his host Akamai had previously seen in cyberattacks. Now just days later, Krebs is back online behind the protection of Google, which offers a little-known program called Project Shield to help protect independent journalists and activists' websites from censorship. And in the case of Krebs, the DDoS attack was certainly that: The attempt to take his site down was in response to his recent reporting on a website called vDOS, a service allegedly created by two Israeli men that would carry out cyberattacks on behalf of paying customers.
  • Krebs DDoS aftermath: industry in shock at size, depth and complexity of attack
    “This attack didn’t stop, it came in wave after wave, hundreds of millions of packets per second,” says Josh Shaul, Akamai’s vice president of product management, when Techworld spoke to him. “This was different from anything we’ve ever seen before in our history of DDoS attacks. They hit our systems pretty hard.” Clearly still a bit stunned, Shaul describes the Krebs DDoS as unprecedented. Unlike previous large DDoS attacks such as the infamous one carried out on cyber-campaign group Spamhaus in 2013, this one did not use fancy amplification or reflection to muster its traffic. It was straight packet assault from the old school.
  • iOS 10 makes it easier to crack iPhone back-ups, says security firm
    INSECURITY FIRM Elcomsoft has measured the security of iOS 10 and found that the software is easier to hack than ever before. Elcomsoft is not doing Apple any favours here. The fruity firm has just launched the iPhone 7, which has as many problems as it has good things. Of course, there are no circumstances when vulnerable software is a good thing, but when you have just launched that version of the software, it is really bad timing. Don't hate the player, though, as this is what Elcomsoft, and what Apple, are supposed to be doing right. "We discovered a major security flaw in the iOS 10 back-up protection mechanism. This security flaw allowed us to develop a new attack that is able to bypass certain security checks when enumerating passwords protecting local (iTunes) back-ups made by iOS 10 devices," said Elcomsoft's Oleg Afonin in a blog post.
  • After Tesla: why cybersecurity is central to the car industry's future
    The news that a Tesla car was hacked from 12 miles away tells us that the explosive growth in automotive connectivity may be rapidly outpacing automotive security. This story is illustrative of two persistent problems afflicting many connected industries: the continuing proliferation of vulnerabilities in new software, and the misguided view that cybersecurity is separate from concept, design, engineering and production. This leads to a ‘fire brigade approach’ to cybersecurity where security is not baked in at the design stage for either hardware or software but added in after vulnerabilities are discovered by cybersecurity specialists once the product is already on the market.

Ofcom blesses Linux-powered, open source DIY radio ‘revolution’

Small scale DAB radio was (quite literally) conceived in an Ofcom engineer’s garden shed in Brighton, on a Raspberry Pi, running a full open source stack, in his spare time. Four years later, Ofcom has given the thumbs up to small scale DAB after concluding that trials in 10 UK cities were judged to be a hit. We gave you an exclusive glimpse into the trials last year, where you could compare the specialised proprietary encoders with the Raspberry Pi-powered encoders. “We believe that there is a significant level of demand from smaller radio stations for small scale DAB, and that a wider roll-out of additional small scale services into more geographic areas would be both technically possible and commercially sustainable,” notes Ofcom. Read more

nginx

Case in point: I've been using the Apache HTTP server for many years now. Indeed, you could say that I've been using Apache since before it was even called "Apache"—what started as the original NCSA HTTP server, and then the patched server that some enterprising open-source developers distributed, and finally the Apache Foundation-backed open-source colossus that everyone recognizes, and even relies on, today—doing much more than just producing HTTP servers. Apache's genius was its modularity. You could, with minimal effort, configure Apache to use a custom configuration of modules. If you wanted to have a full-featured server with tons of debugging and diagnostics, you could do that. If you wanted to have high-level languages, such as Perl and Tcl, embedded inside your server for high-speed Web applications, you could do that. If you needed the ability to match, analyze and rewrite every part of an HTTP transaction, you could do that, with mod_rewrite. And of course, there were third-party modules as well. Read more

Linux and Open Source Hardware for IoT

Most of the new 21 open source software projects for IoT that we examined last week listed Linux hacker boards as their prime development platforms. This week, we’ll look at open source and developer-friendly Linux hardware for building Internet of Things devices, from simple microcontroller-based technology to Linux-based boards. In recent years, it’s become hard to find an embedded board that isn’t marketing with the IoT label. Yet, the overused term is best suited for boards with low prices, small footprints, low power consumption, and support for wireless communications and industrial interfaces. Camera support is useful for some IoT applications, but high-end multimedia is usually counterproductive to attributes like low cost and power consumption. Read more