Language Selection

English French German Italian Portuguese Spanish

Misc

DOD offers $1b in contracts for auditors

Filed under
Misc

"The Defense Department's inspector general is paying nearly $1 billion to 20 auditing and IT firms to assist the department in improving its bleak financial systems picture."

FREE SOFTWARE MAGAZINE

Filed under
Misc

THE FREE MAGAZINE ON FREE SOFTWARE

"Welcome to the "Free Software Magazine" project. Free Software Magazine is the free magazine for the free software world, available on paper and in electronic format. If you wonder what free software is, you should read this article written by the Free Software Foundation."

Link.

Gas getting pricier, oil demand rises

Filed under
Misc

"With the petroleum industry pumping just barely enough fuel to keep the world's economic engine humming, a buying frenzy on oil markets is setting the stage for sharply higher gasoline prices as early as next week.

Limp Bizkit lead claims hackers stole his sex video

Filed under
Misc

"A lawsuit filed on behalf of Limp Bizkit lead singer Fred Durst alleges that the same people who hacked Paris Hilton's cell phone were able pull a homemade sex video off Durst's computer."

Cronkite denounces the war on drugs.

Filed under
Misc

"Walter Cronkite, 87, former CBS Evening News anchorman, and the man once named the most trusted figure in American public life, has denounced the US drug war."

HP's ex-CEO Fiorina may end up at World Bank

Filed under
Misc

"Ousted Hewlett-Packard chief executive Carly Fiorina is under consideration to be World Bank president, a Bush administration official said, adding that no decision has been made."

Cannabis 'doubles mental health risk'

Filed under
Misc

"Smoking cannabis virtually doubles the risk of developing mental illnesses such as schizophrenia, researchers say. The New Zealand scientists said their study suggested this was probably due to chemical changes in the brain which resulted from smoking the drug."

HP's CEO Search

Filed under
Misc

"The board is looking for an executive search company to help find a replacement for Carly Fiorina, who resigned Feb. 8 at the request of directors who no longer felt she could execute on the strategy she had laid out for the Palo Alto, Calif., company."

Predictions of Gloom and Doom

Filed under
Misc

The Washington Post is reporting predictions of bad times ahead, weather- and atmosphere-wise. Quoting Loretta Mickley of Harvard University's Division of Engineering and Applied Sciences, "If this model is correct, global warming would cause an increase in difficult days for those affected by ozone pollution, such as people suffering with respiratory illnesses like asthma and those doing physical labor or exercising outdoors," referring to a computer model used by climate scientists to predict weather and climate changes.

June Cleaver meets Fortune 500

Filed under
Misc

Spurred by the removal Carly Fiorina as CEO of Hewlett-Packard, Amy Joyce of the Washington Post discusses the double standard women in business face. Barbara Gault states, "Women face a double standard in that if they are too accommodating and feminine, they are seen as weak. Too aggressive, it brings up negative associations for a lot of people..."

Syndicate content

More in Tux Machines

Welcome To The (Ubuntu) Bionic Age: Nautilus, a LTS and desktop icons

If you are following closely the news of various tech websites, one of the latest hot topic in the community was about Nautilus removing desktop icons. Let’s try to clarify some points to ensure the various discussions around it have enough background information and not reacting on emotions only as it could be seen lately. You will have both downstream (mine) and upstream (Carlos) perspectives here. Read more

Programming: Perl, JavaScript, Ick, PowerFake, pylint-django, nbdkit filters

  • An Open Letter to the Perl Community

    Some consider Perl 6 to be a sister language to Perl 5. Personally, I consider Perl 6 more of a genetically engineered daughter language with the best genes from many parents. A daughter with a difficult childhood, in which she alienated many, who is now getting out of puberty into early adulthood. But I digress.

  • Long Live Perl 5!

    While not mentioned in the original Letter, a frequent theme in the comments was that Perl 6 should be renamed, as the name is inaccurate or is damaging.

    This is the topic on which I wrote more than once and those who have been following closely know that, yes, many (but by no means all) in the Perl 6 community acknowledge the name is detrimental to both Perl 6 and Perl 5 projects.

    This is why with a nod of approval from Larry we're moving to create an alias to Perl 6 name during 6.d language release, to be available for marketing in areas where "Perl 6" is not a desirable name.

  • JavaScript Trends for 2018
    Trying to bet on how many new JavaScript frameworks will be released each month, is, the best software engineer’s game in the past 5 years.
  • Ick: a continuous integration system
    TL;DR: Ick is a continuous integration or CI system. See http://ick.liw.fi/ for more information.
  • Introducing PowerFake for C++
    PowerFake is a new mini-framework/tool to make it possible to fake/mock free functions and static & non-virtual member functions in C++. It requires no change to the code under test, but it might need some structural changes, like moving some parts of the code to a different .cpp file; or making inline functions non-inline when built for testing. It is useful for writing unit tests and faking/mocking functions which should not/cannot be run during a test case. Some say that such a feature is useful for existing code, but should not be needed for a code which is written testable from the beginning. But, personally I don’t agree that it is always appropriate to inject such dependencies using virtual interfaces or templates. Currently, it is not supposed to become a mocking framework on its own. I hope that I can integrate PowerFake into at least one existing C++ mocking framework. Therefore, currently it doesn’t provide anything beyond faking existing functions.
  • Introducing pylint-django 0.8.0
    Since my previous post was about writing pylint plugins I figured I'd let you know that I've released pylint-django version 0.8.0 over the weekend. This release merges all pull requests which were pending till now so make sure to read the change log.
  • nbdkit filters
    nbdkit is our toolkit for creating Network Block Device (NBD) servers from “unusual” data sources. nbdkit was already configurable by writing simple plugins in several programming languages. Last week Eric Blake and I added a nice new feature: You can now modify existing plugins by placing “filters” in front of them.

Moving to Linux from dated Windows machines

Every day, while working in the marketing department at ONLYOFFICE, I see Linux users discussing our office productivity software on the internet. Our products are popular among Linux users, which made me curious about using Linux as an everyday work tool. My old Windows XP-powered computer was an obstacle to performance, so I started reading about Linux systems (particularly Ubuntu) and decided to try it out as an experiment. Two of my colleagues joined me. Read more

Security: TPM, Yubikey, Holes, Bricking and Uber

  • Trusted Computing
    The Trusted Platform Module on your computer's motherboard could lead to better security for your Linux system. The security of any operating system (OS) layer depends on the security of every layer below it. If the CPU can't be trusted to execute code correctly, there's no way to run secure software on that CPU. If the bootloader has been tampered with, you cannot trust the kernel that the bootloader boots. Secure Boot allows the firmware to validate a bootloader before executing it, but if the firmware itself has been backdoored, you have no way to verify that Secure Boot functioned correctly.
  • Locking the screen when removing a Yubikey

    I have my Yubikey on my key ring, so whenever I leave my computer, I have to remove the Yubikey. So why not lock the screen automatically?

  • Corporate cultural issues hold back secure software development

    The study of over 1,200 IT leaders, conducted by analysts Freeform Dynamics for software company CA Technologies, finds 58 percent of respondents cite existing culture and lack of skills as hurdles to being able to embed security within processes.

  • Stop installing our buggy Spectre CPU firmware fixes, Intel says
  • Uber shrugs off flaw that lets hackers bypass two-factor authentication

    Security researcher Karan Saini found the bug in Uber's two-factor authentication process, which has yet to be rolled out widely to Uber users. The flaw relates to the way an account is authenticated when users log in, meaning hackers [sic] with someone's username and password can drift pass the 2FA with ease.