NSA Releases A New Technology to Open Source Community

CTOvision

Here is their press release : NSA Releases First in Series of Software Products to Open Source Community. The software is “open source,” which means its code is available to the public – in this case, through the Apache Software Foundation. It is the first in a series of releases of in-house software products by NSA’s Technology Transfer Program (TTP). More information about TTP is available on the NSA.gov Technology Transfer Program page.

My take on open source licenses : spf13.com

SPF13

My take on open source licenses. Open Source licensing can be a confusing and daunting task. Most developers simply adopt licenses of other popular projects. I wanted to shed some light on the most popular licenses and provide some guidance on which one should be used and when. Both licenses are very similar. The BSD license is a bit more specific on how the copyright notice needs to be displayed. Open source.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

NGA Continues To Engage With Open Source Community Via GitHub

CTOvision

They are: geoevents: The GeoEvents project is a dynamic and customizable open source web presence that provides a common operational picture to consolidate activities, manage content, and provides a single point of discovery. Analysis Big Data CTO DoD and IC Configuration Management Distributed revision control Django Geoint Geoint Symposium Git GitHub MITRE Corporation NGA Open Source Programming By Bob Gourley.

Open-sourced Technology Levels the Playing Field Between Tech Giants and Startups

CTOvision

The contest between proprietary technology and open source has been ongoing for a decade.Today, some of the most premium technology is open-sourced and free. Even Google's highly prized Borg software is becoming open-sourced. After Google bowed to the pressure to make Borg an open source technology it’s safe to say open source is winning the tussle. Government push for open source software.

Persistence, Programming, and Picos

Phil Windley

In it, r0ml argues that Postgres as a programming environment feels like a Smalltalk image (at least that's the part that's germane to this post). Persistent state —Picos have state that programs running in the pico can see and alter. Programming Picos.

- Microsoft vs Open Source

Chief Seattle Greek Blog

In this environment, it sure is tempting to chuck Microsoft’s Office and web products and their complicated Enterprise and Select Agreements in favor of open source equivalents. Microsoft’s licensing costs are a large part of our budget, as are the maintenance and licensing costs we pay to Oracle, IBM, ESRI, and many other vendors. And the software for open source is on the web and freely available for such hackers to view!

Ten Reasons to Use Picos for Your Next Decentralized Programming Project

Phil Windley

Summary: Picos are a programming model for building decentralized applications that provide significant benefits in the form of abstractions that reduce programmer effort. Persistence is a core feature that distinguishes picos from other programming models.

DARPA Open Catalog: A repository of DARPA-sponsored software and publications

CTOvision

Some context from that site: Welcome to the DARPA Open Catalog, which contains a curated list of DARPA-sponsored software and peer-reviewed publications. The DARPA Open Catalog organizes publically releasable material from DARPA programs, beginning with the XDATA program in the Information Innovation Office (I2O). XDATA is developing an open source software library for big data.

Students of color are getting flagged to their teachers because testing software can’t see them

The Verge

Proctorio, a piece of exam surveillance software designed to keep students from cheating while taking tests, relies on open-source software that has a history of racial bias issues, according to a report by Motherboard. Illustration by Alex Castro / The Verge.

Choosing LambdaTest for Selenium Automation

Galido

When executing it, we will see how a browser opens on our screen and, without touching anything; the actions that have been previously programmed are carried out. Support Multiple Programming Languages and Frameworks. Selenium also includes a specific domain language for testing to write tests in a wide variety of programming languages, including Java, C #, Ruby, Groovy, Perl, Php and Python. It is an open source software under the Apache 2.0

Tools 76

Steps That Ensure Greater IT Efficiency

Galido

These days, there are browser-based solutions for just about any program imaginable. Pursue an Open Source Policy. Juggling aspects such as licensing and compatibility can be a pain. Thankfully, open source software eliminates many of these types of concerns. Information Technology Blog - - Steps That Ensure Greater IT Efficiency - Information Technology Blog.

Technology Short Take 153

Scott Lowe

Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise load balancing in Kubernetes. of Helm adds the ability to store and work with charts in container (OCI, Open Container Initiative) registries (instead of Helm repositories). And it’s publicly available on GitHub , although not licensed with a typical open source license.

IPv6 68

Analyst One Announces Top Analytical Technologies List

CTOvision

H2O is the open source math & machine learning platform for speed and scale. ClearStory Data is making it easy for business users to find, combine and interactively analyze big, diverse data across first-party and third-party sources for immediate insights. Datameer’s Hadoop-based Big Data Analytics solution makes it easy for business users to discover insights in any data, regardless of its structure, size or source.

Q&A with Fred Hutch’s new chief data officer on building a data ecosystem at an institutional scale

GeekWire

He develops tools to help understand massive-scale genomic and biomedical data and has helped generate online learning programs that have enrolled more than 8 million people. Incoming Fred Hutch chief data officer Jeffrey Leek. Photo courtesy of Leek).

Building Decentralized Applications with Pico Networks

Phil Windley

Building a system of picos for a specific application requires programming them to perform the proper lifecycle management tasks to create the picos that model the application. Their programming determines what rulesets are installed in the sensor picos.

Picos at the Edge

Phil Windley

Picos are already encapsulations of computation with isolated state and programs that control their operation. If you're interested in the pico engine, the pico engine is an open source project licensed under a liberal MIT license.

Breaking Down the Product Benefits

ForAllSecure

Because protocol fuzzers license per test suite, users have access to the test suite for regression testing as well. The quality of results -- defects found as well as test suite -- from open source fuzzers is largely dependent on implementation.

SDLC 52

Breaking Down the Product Benefits

ForAllSecure

Because protocol fuzzers license per test suite, users have access to the test suite for regression testing as well. The quality of results -- defects found as well as test suite -- from open source fuzzers is largely dependent on implementation.

SDLC 52

Online romance scammers stole more hearts (and money) in 2020 than 2019

Vox

That’s one big red flag,” Emma Fletcher, a program analyst at the FTC’s bureau of consumer protection, told Recode. I mean, they copied my picture into their driver’s licenses, into passports. Open Sourced is made possible by Omidyar Network.

Malware and Antivirus Systems for Linux

Galido

In order to better understand antivirus programs, it may be beneficial to firstly understand the malware itself. Programmers who develop Linux do not ignore the existence of the virus, but in the beginning they make “open” operating system and there are literally thousands of possibilites for it to be attacked, since it’s vulnerable at this stage. If the user is not sure whether a file is in fact a malware, it can scan software and sandbox the program.

Linux 64

The Hacker Mind: Shellshock

ForAllSecure

How could open source software be vulnerable for so long? That meant I tested the release candidates -- not the final product you’d buy in the stores - for consumer-grade antivirus programs, desktop firewalls, and desktop Intrusion detection systems.

The Hacker Mind: Shellshock

ForAllSecure

How could open source software be vulnerable for so long? That meant I tested the release candidates -- not the final product you’d buy in the stores - for consumer-grade antivirus programs, desktop firewalls, and desktop Intrusion detection systems.

Relationships in the Self-Sovereign Internet of Things

Phil Windley

These and other complicated workflows are all supported by a standards-based, open-source, protocol-supporting system for secure, privacy-preserving messaging. DIDComm supports a Discovery protocol that allows Alice, say, to determine if Doug is open to engaging in a sale transaction.

Game Gear Micro review: peak Sega

The Verge

There are lots of ways to play Game Gear games if you really want to, whether it’s through the 3DS Virtual Console or less official means like the countless open-source emulator handhelds out there. Other games have had easy modes or cheat codes programmed in.

How to speed up your computer

Galido

Is your hard drive full of duplicate files, old programs and settings? Here are some free tools to help remove unnecessary files and programs. CCEnhancer is actually a plugin for CCleaner, which lets the program work with a wider variety of applications, around 500 more than what’s possible on the default version. Registry backup and cleaning, program cache and temp file dumping, duplicate file search, a file shredder and more are available in this free suite of programs.

IntelliDyne’s ITAC Published Top 10 Tech Trends In 2015 For Government Enterprise Infrastructure Management

CTOvision

LPTA Vs. Best Business Value – With Shared Services and Pay-Per-Use licensing, LPTA decisions will be judged on business metrics such as business impact, network efficiency and real-time reporting as part of a new evaluation paradigm. Higher Workload Through Data Virtualization – More apps, open-source software and big data will stream through the networks, which will demand efficient virtualization, workflow automation to handle the increased traffic and ally security concerns.

Trends 226

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

As I produce this episode, there's a dangerous new vulnerability known informally as Log4Shell, it’s a flaw in an open source Java logging library developed by the Apache Foundation and, in the hands of a malicious actor, could allow for remote code injection. Open to open SSL.

Things To Understand To Prevent Data Loss

Galido

Hiring of CISO (Chief Information Security Officer) has a large role to play with the planning and enforcement of the data loss prevention program. Domain controller software may range from a licensed-based Windows Server to an open-source alternative such as Samba software. Information Technology Blog - - Things To Understand To Prevent Data Loss - Information Technology Blog.

Announcing Pico Engine 1.0

Phil Windley

I describe picos and their API and programming model in more detail elsewhere. Pico-engine-core combines pico-framework with facilities for rendering KRL , the rule language used to program rulesets. The pico engine is an open source project licensed under a liberal MIT license.

The ACLU is suing Los Angeles over its controversial scooter tracking system

The Verge

The lawsuit centers on the Los Angeles Department of Transportation’s use of a digital tool called the Mobility Data Specification program (MDS), which the agency created as a way to track and regulate electric scooters operating on its streets. Photo by Mario Tama/Getty Images.

Build your first MongoDB App in Ruby @ StrangeLoop 2013

SPF13

Prior ruby experience is NOT required for this, though you should be familiar with basic web programming in a similar language (javascript, php, perl, python, etc). Document * Open source * High performance * Horizontally scalable * Full featured MongoDB is a __ database. * MongoDB is an open source project * On GitHub * Licensed under the AGPL * Commercial licenses available * Contributions welcome Open Source.

Build your first MongoDB App in Ruby @ StrangeLoop 2013

SPF13

Prior ruby experience is NOT required for this, though you should be familiar with basic web programming in a similar language (javascript, php, perl, python, etc). Document * Open source * High performance * Horizontally scalable * Full featured MongoDB is a __ database. * MongoDB is an open source project * On GitHub * Licensed under the AGPL * Commercial licenses available * Contributions welcome Open Source.

How Much Testing Is Enough? Understanding Test Results With bncov And Coverage Analysis

ForAllSecure

” Whether you’re writing unit tests for your programs or finding bugs in closed-source third-party software, knowing what code you have and have not covered is an important piece of information. Sometimes you don’t have the original source code.

Should the OpenStack Community Embrace Amazon & Google?

Data Center Knowledge

Should the OpenStack community focus on creating an open source alternative to Amazon and Google? In an open letter to the OpenStack community, co-founder and CTO Randy Bias is making the case that OpenStack must embrace other public clouds rather than set themselves up as an open alternative to the mega-clouds. Bias’ open letter goes on to discuss how AWS has grown and controlled the innovation curve in the public cloud. Cloudscaling Unveils Open Cloud System.

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Clearly having individual vendors provide the security wasn’t working, so the state moved toward adopting open source software. Vamosi: So, open source software and more testing. Does moving to open source make sense?

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Clearly having individual vendors provide the security wasn’t working, so the state moved toward adopting open source software. Vamosi: So, open source software and more testing. Does moving to open source make sense?

How Much Testing Is Enough? Understanding Test Results With bncov And Coverage Analysis

ForAllSecure

” Whether you’re writing unit tests for your programs or finding bugs in closed-source third-party software, knowing what code you have and have not covered is an important piece of information. In this article, we’ll introduce bncov, an open source tool developed by ForAllSecure, and demonstrate how it can be used to answer common questions that arise in software testing. Sometimes you don’t have the original source code.

HOW MUCH TESTING IS ENOUGH? UNDERSTANDING TEST RESULTS WITH BNCOV AND COVERAGE ANALYSIS.

ForAllSecure

” Whether you’re writing unit tests for your programs or finding bugs in closed-source third-party software, knowing what code you have and have not covered is an important piece of information. In this article, we’ll introduce bncov, an open source tool developed by ForAllSecure, and demonstrate how it can be used to answer common questions that arise in software testing. Sometimes you don’t have the original source code.

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Clearly having individual vendors provide the security wasn’t working, so the state moved toward adopting open source software. Vamosi: So, open source software and more testing. In the summer of 2018 during Rootz, a program to teach kids hacking during the annual DEF CON conference in Las Vegas, Nevada, an eleven-year-old hacker exploited an online imitation of the State of Florida’s Election Site in a matter of minutes.

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

So the standards body that oversees the development of Bluetooth standards and licensing. And the coffee spur was an attempt to show manufacturers of hands free sets that pre-programmed pin that cannot be changed by the user would not be the ideal way to handle security in this respect.

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

It is pertinent that we check all software; not just a few programs or those a developer chooses to submit. Most tools today require source code and are built with developers in mind. In academia, our research focused on program verification but with a twist.

Analyzing MATIO And stb_vorbis Libraries With Mayhem

ForAllSecure

To facilitate this mission, we have looked to the open source world for exemplar software we can analyze with our next-generation fuzzer Mayhem, in order to get a stronger sense of its effectiveness and ease of integration into existing projects.

Low-Code Development 101: Understanding the Basics

mrc's Cup of Joe Blog

It’s a common source of problems in many businesses. These tools allow for the creation of business applications through graphical user interfaces instead of traditional programming. This opens the door to technological improvements, as IT can finally focus on areas that can push the business forward. Second, closely examine the security options before licensing any development tool. Others are licensed on a per-database basis, and allow unlimited users.