Linux Foundation creates research division to study open source impact
Venture Beast
APRIL 14, 2021
The Linux Foundation is creating a new research unit to provide greater insight into open source technology and the people creating it. Read More.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Venture Beast
APRIL 14, 2021
The Linux Foundation is creating a new research unit to provide greater insight into open source technology and the people creating it. Read More.
Network World
APRIL 7, 2022
Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them. There are different sets of tools for just about every task—network tunneling, sniffing, scanning, mapping.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
TechSpot
APRIL 23, 2021
The Linux Foundation has banned the entire University of Minnesota from contributing to the Linux kernel. The expulsion comes after researchers from the school published a paper titled "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits."
The Verge
APRIL 22, 2021
The University of Minnesota has been banned from contributing to the Linux kernel by one of its maintainers after researchers from the school apparently knowingly submitted code with security flaws. The possibility of bugs slipping through is well-known in the open-source software community.
CTOvision
JULY 21, 2015
The contest between proprietary technology and open source has been ongoing for a decade.Today, some of the most premium technology is open-sourced and free. Even Google's highly prized Borg software is becoming open-sourced. Government push for open source software.
The Verge
APRIL 30, 2021
Fifteen days later, the University of Minnesota was banned from contributing to the Linux kernel. “I I suggest you find a different community to do experiments on,” wrote Linux Foundation fellow Greg Kroah-Hartman in a livid email. None of the University of Minnesota researchers would talk to me for this story.
Scott Lowe
MARCH 15, 2024
Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? TL;DR: It’s not as easy as it might seem.)
ForAllSecure
JANUARY 28, 2020
In recent articles, ForAllSecure has discussed how we were able to use our next-generation fuzzing solution, Mayhem, to discover previously unknown vulnerabilities in several open source projects, including Netflix DIAL reference , Das U-Boot , and more. It is packaged in Debian and in derivative Linux distros such as Ubuntu.
GeekWire
MAY 17, 2023
(Stacklok Photo) A pair of cloud computing vets are jumping back into entrepreneurship with a new startup that helps enterprises vet software supply chains amid a rise in cyber-breaches stemming from open-source code. Stacklok emerged from stealth mode Wednesday, announcing $17.5 The company is led by Craig McLuckie and Luke Hinds.
ForAllSecure
JANUARY 28, 2020
In recent articles, ForAllSecure has discussed how we were able to use our next-generation fuzzing solution, Mayhem, to discover previously unknown vulnerabilities in several open source projects, including Netflix DIAL reference , Das U-Boot , and more. It is packaged in Debian and in derivative Linux distros such as Ubuntu.
ForAllSecure
JANUARY 28, 2020
In recent articles, ForAllSecure has discussed how we were able to use our next-generation fuzzing solution, Mayhem, to discover previously unknown vulnerabilities in several open source projects, including Netflix DIAL reference , Das U-Boot , and more. It is packaged in Debian and in derivative Linux distros such as Ubuntu.
Scott Lowe
MARCH 21, 2017
This post is part of a series of posts sharing other users’ stories about their migration to Linux as their primary desktop OS. As I mentioned in part 1 of the series , there seemed to be quite a bit of pent-up interest in using Linux as your primary desktop OS. Q: Why did you switch to Linux? is awesome).
GeekWire
DECEMBER 30, 2023
Among other roles, he served on the National AI Research Resource Task Force , which advised the White House on policy issues, and he’s working on a project to combat AI-related misinformation in the upcoming elections. ” The need for strong open-source models: “The consolidation of power in AI is a huge risk.
Network World
MARCH 5, 2019
According to Imperva research, a container flaw reported last month (CVE-2019-5736) in Docker's remote API has already been taken advantage of by hundreds of attackers. Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ].
CIO Business Intelligence
OCTOBER 6, 2023
That’s why SaaS giant Salesforce, in migrating its entire data center from CentOS to Red Hat Enterprise Linux, has turned to generative AI — not only to help with the migration but to drive the real-time automation of this new infrastructure.
CIO Business Intelligence
MARCH 24, 2022
IBM LinuxONE III systems run only Linux at prices starting at $135,000. Z upgrades and open source. We have seen the largest growth where clients augment [core] systems with open source — Red Hat Enterprise Linux and OpenShift,” Baker says. Not all enterprises are in the market for big iron.
Flexagon
JUNE 5, 2023
Java and Linux) as well as business platforms such as Oracle, Salesforce, and SAP. Ranked highly as having a strong current offering among 13 ISDP vendors, the report notes that Flexagon builds an end-to-end ISDP that supports traditional forms of software and infrastructure (e.g.,
GeekWire
AUGUST 18, 2021
They’re using standard and open-source tools such as Python and Linux containers to ensure that others can participate or build on their approaches in the future. Instead, the companies took software developed by Microsoft and packaged it up into Linux containers to process astronaut genomes on Spaceborne Computer-2.
SecureWorld News
JUNE 13, 2023
"We are continuing to observe an unyielding surge in the volume of cyberthreats, including advanced malware, botnets, ransomware, cryptojacking, and more," said Callie Guenther, Senior Manager of Cyber Threat Research at Critical Start, in a press release.
Network World
JUNE 22, 2016
In a world where any new software project is built in large part on existing third-party code, finding and patching vulnerabilities in popular open-source libraries is vital to creating reliable and secure applications. Libarchive is an open-source library first created for FreeBSD, but since ported to all major operating systems.
Dataconomy
DECEMBER 25, 2023
Researchers demonstrated the ability to bombard Apple devices with bogus connection requests, triggering an endless torrent of pop-ups and wreaking havoc on notifications. Wall of Flippers is an open-source Python project offers a beacon of hope. But fear not, for a new hero has emerged: Wall of Flippers.
ForAllSecure
JUNE 16, 2020
The Google Chrome web browser, for example, is used on billions of devices and is completely open source, allowing any attacker to review exactly how the software works. Test and evaluation teams that have a basic understanding of Linux can also use fuzzers. Those just starting out should try open source tools.
ForAllSecure
JUNE 16, 2020
The Google Chrome web browser, for example, is used on billions of devices and is completely open source, allowing any attacker to review exactly how the software works. Test and evaluation teams that have a basic understanding of Linux can also use fuzzers. Those just starting out should try open source tools.
ForAllSecure
JUNE 16, 2020
The Google Chrome web browser, for example, is used on billions of devices and is completely open source, allowing any attacker to review exactly how the software works. Test and evaluation teams that have a basic understanding of Linux can also use fuzzers. Those just starting out should try open source tools.
Linux Academy
MARCH 15, 2019
I had the pleasure of speaking with one of our amazing students about his experience training for AWS certifications on Linux Academy. We have a large hospital organization with a clinic with 20-30 healthcare providers and a large research health science division. My job encompasses supporting Linux and VMware on physical servers.
CIO Business Intelligence
AUGUST 11, 2023
Aman Bhullar, CIO of Los Angeles County Registrar-Recorder/County Clerk, has heeded the call, having led a widespread overhaul of antiquated voting infrastructure just in time for the contentious 2020 presidential election — a transformation rich in open source software to ensure other counties can benefit from his team’s work.
ForAllSecure
SEPTEMBER 4, 2020
Researchers from VDA Labs used ForAllSecure Mayhem to discover a stack overflow ( CVE-2020-15359 ) in a popular open source sound utility, MP3Gain. Mayhem has a CLI available to download and that was used on a local Linux host. This is the actual Linux command Mayhem will execute and fuzz inside the Docker build.
ForAllSecure
SEPTEMBER 3, 2020
Researchers from VDA Labs used ForAllSecure Mayhem to discover a stack overflow ( CVE-2020-15359 ) in a popular open source sound utility, MP3Gain. Mayhem has a CLI available to download and that was used on a local Linux host. This is the actual Linux command Mayhem will execute and fuzz inside the Docker build.
ForAllSecure
SEPTEMBER 3, 2020
Researchers from VDA Labs used ForAllSecure Mayhem to discover a stack overflow ( CVE-2020-15359 ) in a popular open source sound utility, MP3Gain. Mayhem has a CLI available to download and that was used on a local Linux host. This is the actual Linux command Mayhem will execute and fuzz inside the Docker build.
Scott Lowe
JANUARY 28, 2016
The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers. As a partial counterpoint to the increased use/visibility of Linux in the networking industry, check out Ivan’s take on Dell’s OS10 announcement. Networking.
Scott Lowe
JANUARY 28, 2016
The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers. As a partial counterpoint to the increased use/visibility of Linux in the networking industry, check out Ivan’s take on Dell’s OS10 announcement. Networking.
CTOvision
DECEMBER 21, 2013
As CSO, Mike is responsible for Cloudera’s product strategy, open source leadership, engineering alignment and direct engagement with customers. Prior to Cloudera Mike was CEO of Sleepycat Software, makers of Berkeley DB, the open source embedded database engine. in Electrical and Computer Engineering.
CTOvision
JANUARY 23, 2014
As CSO, Mike is responsible for Cloudera’s product strategy, open source leadership, engineering alignment and direct engagement with customers. Prior to Cloudera Mike was CEO of Sleepycat Software, makers of Berkeley DB, the open source embedded database engine. Bob Gourley, Editor, CTO Vision.
GeekWire
APRIL 2, 2021
As his son is now approaching his third birthday, Ramesh is working with researchers in pursuit of a gene therapy to correct Raghav’s rare condition, and he is spearheading a first-of-its-kind effort to help others do the same. Researchers estimate there are more than 6,000 different rare diseases. Click to enlarge.).
Scott Lowe
MAY 27, 2022
Researchers have uncovered a potential security flaw in Apple Silicon CPUs; more details in this 9to5Mac article. I’m not sure how I feel about security researchers calling this flaw “not that bad.” This will become even more useful, in my opinion, when Linux support is added. Servers/Hardware. Kubernetes 1.24
ForAllSecure
OCTOBER 13, 2020
In this episode, one researcher explains how he successfully escaped the Chrome sandbox, and how bug bounties must just be a good thing resulting in better security for us all. And in between contracts, we like to do vulnerability research on open source software or major high-impact software targets.
ForAllSecure
OCTOBER 13, 2020
In this episode, one researcher explains how he successfully escaped the Chrome sandbox, and how bug bounties must just be a good thing resulting in better security for us all. And in between contracts, we like to do vulnerability research on open source software or major high-impact software targets.
ForAllSecure
OCTOBER 13, 2020
In this episode, one researcher explains how he successfully escaped the Chrome sandbox, and how bug bounties must just be a good thing resulting in better security for us all. And in between contracts, we like to do vulnerability research on open source software or major high-impact software targets.
Linux Academy
JULY 23, 2019
Kubernetes is an open-source platform that helps manage containers. So before jumping straight into using Kubernetes, research alternatives that are available like these: Explore Alternatives to Kubernetes. The post Don’t Use Kubernetes Until You’ve Asked This Question appeared first on Linux Academy. What is Kubernetes?
ForAllSecure
NOVEMBER 24, 2020
I mean, it was open source, right? And this is open source software, meaning that there’s some developers or some project behind it that has already built out the basics of what you need to put it into your code and start using it. What I want to know is how that vulnerability was able to persist for so long.
ForAllSecure
NOVEMBER 24, 2020
I mean, it was open source, right? And this is open source software, meaning that there’s some developers or some project behind it that has already built out the basics of what you need to put it into your code and start using it. What I want to know is how that vulnerability was able to persist for so long.
Dataconomy
APRIL 13, 2023
A Virtual Network Computing port is a network port that is used by VNC servers and clients to establish a connection over a network The VNC technology was developed by the British company Olivetti Research Laboratory in the late 1990s and is currently maintained and extended by RealVNC Ltd. and the open-source community.
ForAllSecure
NOVEMBER 24, 2020
I mean, it was open source, right? And this is open source software, meaning that there’s some developers or some project behind it that has already built out the basics of what you need to put it into your code and start using it. What I want to know is how that vulnerability was able to persist for so long.
CIO Business Intelligence
MARCH 11, 2024
E anche se tutti i momenti-che-importano sono importanti, ce ne sarà uno che farà alzare le mani e dire: ‘Me ne vado’“, dice Nicholas Kozlo, analista senior della divisione People and Leadership di Info-Tech Research Group. Barrett osserva che i manager tendono a fuggire anche quando le aziende ristagnano o si contraggono.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content