- Web Server
- Control Panels
- Site Map/RSS Feeds
November 30, 2013
The EFL 1.8 release for the Enlightenment project should be out next week and there's already plans for releasing EFL 1.9 in February!
Today in Open Source: Can Valve triumph over Microsoft and Sony? Plus: Windows 8.1 lacks multiple desktops, and demanding open source developers
Yesterday I ended up buying a new Intel ultrabook for Linux testing at Phoronix. Here's the hardware that will soon be featured in some new Linux benchmarks, plus my reasoning for going with this ultrabook and other thoughts on some of the laptops/ultrabooks this holiday season...
Ralph Langer has written the definitive analysis of Stuxnet: short, popular version, and long, technical version. Stuxnet is not really one weapon, but two. The vast majority of the attention has been paid to Stuxnet's smaller and simpler attack routine -- the one that changes the speeds of the rotors in a centrifuge, which is used to enrich uranium.
A heap-based buffer overflow in Okular might allow a remote attacker to execute arbitrary code or cause a Denial of Service condition.
Krita is KDE's painting and image editing program that soon will see its v2.8 release. With this next Krita release there is new usage of OpenGL 3.x within the open-source program. Under the high quality filtering mode, OpenGL 3.0 is now used for delivering a superior painting/imaging experience.
The GNOME development team is hard at work these days, preparing the upcoming GNOME 3.12 desktop environment. GNOME Music is a new app introduced along with the GNOME 3.10 release, and this new development version introduces several new features and fixes bugs.
Kontron announced a Linux-ready COM Express Type 10 computer-on-module with industrial temperature support, available with a choice of five Intel Atom E3800 (“Bay Trail-I”) system-on-chips and two Celeron Bay Trail M/D SoCs.
Tim Lee, over at the Washington Post's The Switch, has an excellent, detailed look at why the USTR seems to think that patent and copyright maximalism is in the best interests of America. There are two key reasons, which I'll paraphrase as (1) the employees at USTR have strong connections to copyright and patent maximalists, and there's a constant revolving door between USTR and IP maximalists, and (2) they're basically ignorant of how the digital world works today.
Today in Open Source: Beware the Linux.Darlloz worm. Plus: Joe Danger game for Linux, and a screenshot tour of SolydX 201311.
I used to subscribe to an on-line dictionary's word-of-the-day (WOD) program. That entailed signing up, using one's e-mail address, on their web site so that they would, each day, send a different WOD along with its definition to that address. The service proved to be a bit flaky, however, and the e-mails would sometimes get caught up in my spam filter. So, somewhere along the line--perhaps owing to an e-mail address change--I stopped receiving those educational e-mails.I'd had in the back of my mind going back to using that service but hadn't signed up again--all the while having a nagging suspicion that it must be possible, using open source tools, to cobble together some way of doing this sort of thing from my own computer, thereby obviating the need to sign up for some service. But could I, with my modest technical acumen, actually pull this off? Read on to find out the result.
November 29, 2013
VIDEO: HP Distinguished Engineer Monty Taylor explains how the open-source OpenStack cloud platform is moving forward.
As an educator, you don't expect violence in school or prepare yourself for the inevitability of it. Even violence like suicide is far from your mind. Teachers are not prepared for that. Neither are they trained to handle behaviors that can lead to horrific violence: murder as well as fighting, bullying, sexual assualt and harassment, and alcohol and drug use. Despite the heartbreak of violence among youth in school, there is something educators, teachers and administrators alike can do.Self-control and attentional skills can be taught to youth who are exhibiting these riskly behaviors, that cause damage in and of themselves, and can lead to even worse violence.
According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.”
On Sunday, Forbes reported that FindTheBest, an online comparison shopping site, had managed to have a patent being used against it invalidated in federal court. In this case, Denese Cote, a federal judge in N.Y. state found in favor of FindTheBest and invalidated the patent.We may hear more about this case later. After the plaintiff, Lumen View Technology LLC, demanded $50,000 from FindTheBest for infringing their patent, the site filed suit against the patent troll under the RICO act.