Version 2.0 of Jenkins, the open source automation server and continuous delivery software development platform, was released last week, a decade after it began life as Hudson, a Sun Microsystems (now Oracle) project.
With the rising popularity of DevOps as a software development and delivery methodology, its community has been focused on making Jenkins easier to use, support delivery pipelines as code, and making it simpler to select and manage the many plugins that are a central part of the Jenkins ecosystem. These changes, the developers insist, are sufficiently large to merit a new version badge - although they are keen to point out that version 2.0 is completely backwards compatible with earlier iterations.
Unity 8 Won't Be the Default Desktop Session for Ubuntu 16.10 (Yakkety Yak)
The Ubuntu Online Summit started just a few moments ago, and you can watch the Ubuntu Engineering team live right now talking about the features planned for the next Ubuntu release.
We reported last week that the development of the Ubuntu 16.10 (Yakkety Yak) operating system had begun, with daily live ISO images being made available for early adopters and public testers who want to track the development cycle of the upcoming Ubuntu release.
This latest data puts the overall Linux market-share at 0.90%, which they indicate as a +0.06% compared to the month prior. Well, back in March, Steam on Linux dropped by 0.06% compared to February, so it's basically the same level as back then.
Are you a fan of multiplayer games? Well it looks like The Ship: Remasted (that's not a typo!) is heading to Linux and it could even be soon. It sounds pretty hilarious too, really want to try it with a few of you.
The Linux Foundation has released the first round of CII Best Practices badges as part of a program designed to improve the quality and security of open-source software.
Announced on Tuesday, the non-profit said the Core Infrastructure Initiative (CII), a project which brings tech firms, developers and stakeholders together to create best practice specifications and improve the security of critical open-source projects, has now entered a new stage with the issue of CII badges to a select number of open-source software.
The best way to establish how vulnerable your network is to a hacker attack is to subject it to a penetration test carried out by outside experts. (You must get a qualified third party to help with penetration testing, of course, and eSecurity Planet recently published an article on finding the right penetration testing company.)
In May last year, a new attack on the Diffie Hellman algorithm was released, called Logjam. At the time, I was working on a security team, so it was our responsiblity to check that none of our servers would be affected. We ran through our TLS config and decided it was safe, but also needed to check that our SSH config was too. That confused me – where in SSH is Diffie Hellman? In fact, come to think of it, how does SSH work at all? As a fun side project, I decided to answer that question by writing a very basic SSH client of my own.