Remove 2015 Remove Open Source Remove Operating Systems Remove Software
article thumbnail

what every open source project needs

SPF13

In the last few years open source has transformed the software industry. From Android to Wikipedia, open source is everywhere, but how does one succeed in it? This presentation was delivered at sinfo.org in Feb 2015. What Every Successful Open Source Project Needs. The Software Era: ?

article thumbnail

Carrier-Grade SDN-Based OpenStack Networking Solution

Scott Lowe

This involves more extensive use of virtual network functions (VNFs) and software-defined infrastructure based on open software and open hardware. exclusively leverages open source software. Shin reinforces that the SKT project (which is apparently called COSMOS?) Park now takes over to discuss ONOS.

Network 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Linux Migration: Other Users’ Stories, Part 4

Scott Lowe

At my new job, I have the option to use any operating system (OS), and I naturally gravitated toward Linux. I used this to get started on my Linux migration journey, focusing on writing my blog and other open source efforts. Q: What hardware are you using with Linux? Getting WebEx to work was the other big-time killer.

Linux 60
article thumbnail

Technology Short Take #58

Scott Lowe

This will be the last Technology Short Take of 2015, as next week is Christmas and the following week is the New Year’s holiday. ACS offers multiple “endpoints,” each of which enables you to use a particular open source container/orchestration tool. Operating Systems/Applications. Cloud Computing/Cloud Management.

Vmware 60
article thumbnail

Data Security and its Importance on the Internet

Galido

Hacking and data breaches are a common thing today, especially with the rise of open source platforms and electronic transactions. In 2015, the Wall Street Journal estimated that the cost of cyber crime in the U.S. A common way for malware to attack is for it to find exploits and vulnerabilities in a system.

article thumbnail

The exciting new AI transforming search — and maybe everything — explained

Vox

TikTok has a generative AI text-to-image system. And the open-source model Stable Diffusion can generate detailed and specific images in all kinds of styles from text prompts. It can help developers make software. Design platform Canva has one , too. But it’s not just creative work that generative AI can produce.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

but in writing it, it inadvertently, or maybe overtly I don't remember captured reverse engineering software that has some protection mechanism in it, and without getting into the details. One of the open source protocols that crashed most often was BusyBox what could happen with a vulnerability in BusyBox in 2016.