Articles about Source

Cyanogen Inc 'axes 20%' staff

Cyanogen Inc, which develops an alternative flavor of Google's Android, has laid off a bunch of staff. The Seattle-based US startup takes code from the open-source CyanogenMod project, adds in some proprietary features, and tries to get phone makers to ship the package with their handsets. Basically, it seems, that hasn't gone …
Team Register, 23 Jul 2016
1980 olympics weight-lifting champs. By RIA Novosti archive, image #484445 / Dmitryi Donskoy / CC-BY-SA 3.0

OpenStack bronze for Fujitsu

Fujitsu wants to become one of the top three contributors to OpenStack. The company's keen on the open source cloud because it thinks it's an important tool when big business tries to “digitise” processes and applications so they can compete with whichever startup is trying to eat their lunch. The company's using CloudFoundry …
Simon Sharwood, 22 Jul 2016
Shouting match

XtremIO heading for the bin? Total BS, thunders CTO Itzik Reich

Storage industry jungle drums heard by El Reg suggest EMC is axing XtremIO product line development and putting it into maintenance mode due to scalability and data availability issues. EMC vehemently denies this, saying it's absolute FUD. Three independent sources say XtremIO is headed for a maintenance-only retirement home …
Chris Mellor, 21 Jul 2016

EFF declares anti-piracy DMCA unconstitutional in new legal showdown

The Electronic Frontier Foundation (EFF) has launched a lawsuit claiming that a controversial anti-digital-piracy law in the US is unconstitutional. Section 1201 of the Digital Millennium Copyright Act (DMCA) – which became law 18 years ago – has long been controversial due to its heavy restrictions on what people are allowed …
Kieren McCarthy, 21 Jul 2016

Snowden's anti-snoop tool

NSA whistleblower Ed Snowden and hardware guru Andrew “Bunnie” Huang have designed a gizmo that wraps around your iPhone 6 and alerts you when the mobe unexpectedly leaks your location. Basically, if you put your smartphone into airplane mode – ie: maintain radio silence – to avoid being tracked, the gadget will kick off if …
Shaun Nichols, 21 Jul 2016

Stack Overflow takes on technical documentation

Stack Overflow, a popular site for developer and IT admin problem solving, is taking on technical documentation, with support from companies including Microsoft, Paypal, Twilio and Dropbox. The Stack Overflow site was created in 2008 by Jeff Atwood and Joel Spolsky, and originally focused only on developer questions. It was …
Tim Anderson, 21 Jul 2016

UK's digital strategy must account for Brexit, say MPs

The UK government must explain how its long-awaited new digital strategy will be impacted by the country's decision to leave the EU, a committee of MPs has said. The Business, Innovation and Skills (BIS) Committee in the UK parliament made the call in a new report on the digital economy in which it also said there is a need to …
OUT-LAW.COM, 21 Jul 2016
The first color picture of Mars from Viking 1

40 years ago today the US govt sent a taxpayer-funded robot to invade an alien hostile world

Pics The surviving members of the Viking Mars probe team have been celebrating the 40th anniversary of the first probe to make it down onto the surface of the Red Planet, send back pictures, and perform scientific experiments. The Viking 1 lander hit dirt on Mars on July 20, 1976, 16 days late. The probe had been planned for …
Iain Thomson, 20 Jul 2016

Firefox to banish hidden Flash files – and kill off sneaky ad snoopers

Firefox will next month automatically block invisible Flash content that users cannot see when loading a page, says Mozilla as it continues its campaign against Adobe's plugin. This should protect netizens from dodgy webpages that load hidden malicious Flash files that attempt to infect their computers with malware or perform …
Shaun Nichols, 20 Jul 2016
Aster_fraud_Detection_Sphere

Teradata and Nuix are dancing in the dark

Teradata has teamed up with Nuix to enable customers to process "dark data" using its Aster Analytics technology. It says Aster is a more capable analytics engine than Nuix, while Nuix is a more capable data extraction and indexing engine than Aster. Combine the two and, for an eDiscover or compliance infraction detective, …
Chris Mellor, 20 Jul 2016

SpectraLogic sits in the Cyberducking stool

Spectra has entered the Cyberduck universe; data stored in SpectraLogic's disk, tape and public cloud repositories can be transferred to/from other on-premises storage and public clouds with a BlackPearl Cyberduck plug-in. Cyberduck is an open source software tool that provides a near-universal file/object transfer facility …
Chris Mellor, 20 Jul 2016
Penguins and wellies, image via Shutterstock

UK.gov digi peeps hunt open source chief

The British government’s Digital Service is looking for a chief penguin to head up open source. GDS has created a brand-new position for an individual to conduct open source technology projects, adoption and working practices for the government's IT arm. Moreover, the chosen candidate will be charged with forging …
Gavin Clarke, 20 Jul 2016
red_hat_648

Red Hat redraws Ansible Tower so even enterprise managers can get it

Red Hat has given its Ansible Tower a good scrubbing down before smoothing the UI to better penetrate big money corporate accounts. Tower is Red Hat’s paid for version of the open source Ansible automation platform, effectively a GUI and services package around the core product. Well, we say GUI, but Tower 3.0, released today …
Joe Fay, 20 Jul 2016
mergers and acquisitions

EMC staffers: We are crashing into Dell within weeks

Staffers at EMC and its subsidiaries are to get Dell email addresses from the start of next month as the proposed mega buy edges closer, insiders have told The Register. EMC shareholders last night approved the $62.4bn bid – somewhat lower than the original $67bn offer due to a slide in VMware’s share price – and Chinese anti- …
Paul Kunert, 20 Jul 2016
Image by beccarra http://www.shutterstock.com/gallery-1124891p1.html

Hacker shows Reg how one leaked home address can lead to ruin

Unrestcon It takes nothing more than a home address for hacker "Nixxer" to find enough information to ruin your life. Nixxer is one of Australia’s most skilled good-guy social engineers and at a recent event, and in subsequent chats with The Reg, demonstrated the potential damage rather than actually ruining a life. But the arsenal he …
Darren Pauli, 20 Jul 2016
Iron Giant

Prometheus 1.0 rises

The Cloud Native Computing Foundation's second project, Prometheus, has hit version 1.0. Prometheus is a white box monitoring tool designed to simultaneously monitor lots of different parts of the stack making up a cloud-native application. That's important, explains core Prometheus developer and SoundCloud engineer Björn …
Simon Sharwood, 20 Jul 2016

DDoS trends: Bigger, badder but not longer

DDoS attacks once again escalated in both size and frequency during the first six months of 2016. Netscout's DDoS mitigation arm Arbor Networks warns that attacks greater than 100Gbps are far from uncommon. The security firm has monitored 274 attacks over 100Gbps in the first half of 2016, versus 223 in all of 2015. The …
John Leyden, 19 Jul 2016
Docker logo

Docker Cloud under fire after DDoS attacks slam DNS, knacker websites

Updated Websites running on the Docker Cloud hosted container management and deployment service were taken down by an apparent DNS outage on Monday. Reg readers and Docker Cloud support forum members complained today that their services were down or suffering intermittent outages with little explanation from Docker. One angry user …
Gavin Clarke, 19 Jul 2016
China will see you on the dark side of the moon

Maxthon web browser blabs about your PC all the way back to Beijing

A web browser developed by Chinese company Maxthon has allegedly been collecting telemetry about its users. Polish security consultancy Exatel warns [PDF] that Maxthon is phoning home information such as the computer's operating system and version number, the screen resolution, the CPU type and speed, the amount of memory …
John Leyden, 19 Jul 2016

Guilt by ASN: Compiler's bad memory bug could sting mobes, cell towers

A vulnerability in a widely used ASN.1 compiler isn't a good thing: it means a bunch of downstream systems – potentially mobile phones and cell towers – will inherit the bug. And an ASN.1 bug is what the Sadosky Foundation in Argentina has turned up, in Objective Systems' software. The research group's Lucas Molas says …
Xen project logo

Xen roadmap hints

Xen Project chairperson Lars Kurth has revealed some future directions for the open source virtualisation project. In a new Q&A to mark the recent 4.7 release, Kurth said he expects future versions will continue to offer big revisions to core features. “Some new capabilities, such as restartable Dom0’s, and additional …
Simon Sharwood, 19 Jul 2016
open_door_648

US gov open data, code push

The White House has set a deadline of September 15 for all US government departments to post details of their "open government" plans. The letter [PDF] from the country's chief technology officer Megan Smith and chief information officer Tony Scott requires all departments to post what they are doing with a host of open …
Kieren McCarthy, 18 Jul 2016

For $800 you can buy internet engineers' answer to US government spying

The long-awaited response from internet engineers to Edward Snowden's revelations of mass surveillance by the US government has been launched in Berlin. The CrypTech project launched an alpha prototype of its open-source crypto-vault at the 96th meeting of the Internet Engineering Task Force (IETF), and held a two-day workshop …
Kieren McCarthy, 18 Jul 2016
Opera singers

Opera sells open-source Chromium browser for $600m to Chinese bods

Opera will sell its web browser technology to Chinese investors for $600m after a larger sale worth $1.2bn fell apart. The Norwegian company said in a filing to the Oslo Børs stock exchange that it had agreed to an arrangement that will see the Chinese-backed Golden Brick Capital Management private equity fund take control of …
Shaun Nichols, 18 Jul 2016
Man loads in blanket into the washing machine. Photo by Shutterstock

Facebook and Google show how the world really will be blanketed in 5G

Facebook has outdone even Google recently, in its efforts to shake up the mobile industry and accelerate the delivery of broadband services (and its revenue generators) to the entire planet. This is no longer just about using balloons and new spectrum to push affordable wireless access to underserved communities. It is about …
Wireless Watch, 18 Jul 2016

Euro IP study finds 25 Tor-and-Bitcoin-loving pirate business models

Knock us over with a feather: a study by the European Union Intellectual Property Office (EUIPO) has found that those who infringe intellectual property for a living are quite fond of anonymity technologies that cover their tracks. The Office last week emitted a Deloitte-penned study titled Research on Online Business Models …
Simon Sharwood, 18 Jul 2016
The Mosque at the Taj Mahal, shot from within the Taj Mahal through the marble screens

India tweaks tech colleges to 'become real power in software'

India's decided its massive successes of the last 20 years aren't enough and will tweak its Indian Institutes of Information Technology (IITs) to create home-grown technology colossi. India's IITs are among the most sought-after educational institutions on Earth: about 1.1 million youngsters sit entrance exams to fight for 10, …
Simon Sharwood, 18 Jul 2016
linux_tux_cloud_648

Intel's SGX tiptoes towards Linux

Intel has fulfilled a promise made in April to open-source a Linux driver for its SGX technology. SGX – Software Guard Extensions – first landed in 2013, and allows programmers to lock up code and data inside containers enforced by the CPU. The idea is to create an environment to assure people "clouding" their enterprise …
Mambo Unlimited's gold bug. Pic: Steve Caplin

OpenSSH has user enumeration bug

A bug in OpenSSH allows an attacker to check whether user names are valid on a 'net-facing server - because the Blowfish algorithm runs faster than SHA256/SHA512. The bug hasn't been fixed yet, but in his post to Full Disclosure, Verint developer Eddie Harari says OpenSSH developer Darren Tucker knows about the issue and is …
Robot touches screen with finger. Photo via Shutterstock

Did mock cop bot trot on fraught tot? Maybe not

The maker of the security guard robot that allegedly ran down a toddler in a Silicon Valley shopping mall last week has claimed its droid is innocent. Sixteen-month-old Harwin Cheng hit the headlines worldwide after his parents claimed he was knocked down and run over by a 300lb Knightscope K5 bot at the Stanford Shopping …
Shaun Nichols, 15 Jul 2016
Man looking up spiral staircase inside deltalis mountain data centre

Your next storage will be invisible (for a while)

In the last two or three years I've talked a lot about "Flash & Trash." A two-tier storage strategy to best cope with the increasing demand of high IOPS and low latency from primary applications on the one hand, and high capacity, associated with throughput at times, on the other. This kind of need depends on the type of …
Woman watches TV with cat, uses remote to change channel. Photo by Shutterstock

Ad blockers responsible for rise in upfront TV ad sales, claims report

The upfront market for broadcast and cable networks has taken an unexpected U-turn from last year’s dip, seeing an increase in advertising sales of $800m to $18.6bn in the most recent completion. According to research firm Media Dynamics, this 4.5 per cent increase in TV ad revenue is a blow to OTT video platforms on PCs and …
Faultline, 15 Jul 2016

Security gurus get behind wheel of driverless car debate

Security experts have already waded into the UK government's consultation into self-driving technologies. The two month session comes against a backdrop of increasing concerns about connected cars. Infosec vendors argue security needs to be considered alongside other issues such as changes to driving regulations (the Highway …
John Leyden, 15 Jul 2016
CHILE -FEBRUARY 6: Moais in Rapa Nui National Park on the slopes of Rano Raruku volcano on Easter Island, Chile. Photo by Shutterstock

The History Boys: Object storage ... from the beginning

Backgrounder This is a terrific object storage history map from Silicon Valley object storage guy Philippe Nicolas*, who has put together a spreadsheet detailing the history of content-addressable storage (CAS**) – otherwise generally known as object storage. I have heard so many odd things about suppliers and technologies in this market …

ANZ Bank staffers drop slick incident response tool for Mandiant mobs

Security boffins at ANZ, one of Australia's largest banks, have offered their nightHawk incident response tools for organisations running free Mandiant tools. Mandiant's open source platform is fit for enterprises requiring incident response at scale, and can run off a laptop for many investigations. ANZ bank security …
Darren Pauli, 15 Jul 2016
Nexus 6P

Google's Nexii stand tall among Android's insecure swill

Nexus devices are, unsurprisingly, the most secure Androids, says security outfit Duo. The devices are regarded as Google's flagship Android device on account of its operating system running the stock Android open source project (AOSP). Android phones from other manufacturers nearly always add custom modifications and are …
Darren Pauli, 15 Jul 2016
Man with head in the cloud

Amazon acquires Cloud9

Amazon has acquired Cloud9 to bolster development offerings on AWS. The two companies announced the deal on Thursday, with Cloud9 CEO Ruben Daniels pledging to continue to develop the company's independent cloud developer tools while working under AWS. "It's still business as usual – we'll continue to work with our Ace Open …
Shaun Nichols, 15 Jul 2016

Ivory tower drops water bombs on dumpster fire

A veritable Who's Who of the tech industry have signed an open letter aggressively criticizing Donald Trump and his proposed presidential policies. "We are inventors, entrepreneurs, engineers, investors, researchers, and business leaders working in the technology sector," the letter begins. "We are proud that American …
Kieren McCarthy, 14 Jul 2016

EU eyes flaw in Google’s cash machine

Analysis The European Commission has opened an aggressive new front in its battle with Google, one that Google thought it had secured years ago. And this is one that starts to gnaw away at Google’s core cash generation business. As well as advancing its prosecution of Google over vertical search, the new third area where the Commission …
Andrew Orlowski, 14 Jul 2016
Tin Can Telephone

AT&T's ECOMP code to land soon at Linux Foundation

AT&T says it's just about ready to release its virtualisation automation software, amounting to more than eight million lines of code: its Enhanced Control, Orchestration, Management and Policy platform – ECOMP – will soon land at the Linux Foundation. The company says the platform is the basis for its target to virtualise 75 …
Twiki

White hat hacker AI bots prepare for DARPA's DEF CON cyber brawl

The research wing of the US military has picked the seven teams who will compete to build machine-learning software that can find and patch bugs automatically to fend off hackers. The DARPA Cyber Grand Challenge will be held at the DEF CON hacking conference next month. The agency has put up $2m in prize money in the unlikely …
Iain Thomson, 13 Jul 2016
Gunther Oettinger, EU digital commissioner. Photo by Shutterstock - must mark as editorial use only

EU operators’ 5G manifesto misses the point

Never before have events coincided so neatly to demonstrate the gap between mobile operators’ thinking about 5G, and how future networks will really be deployed for disruptive effect. While Europe’s leading MNOs were presenting a backwards-looking "5G Manifesto" to the European Commission, veiling pleas for net neutrality …
Wireless Watch, 13 Jul 2016
Rusted car

Next month's Firefox 48 is looking Rusty – and that's a very good thing

Mozilla says it will next month ship the first official Firefox build that sports code written in its more-secure-than-C Rust programming language. The Firefox 48 build – due out August 2 – will include components developed using Rust, Moz's C/C++-like systems language that focuses on safety, speed and concurrency. It's hoped …
Shaun Nichols, 12 Jul 2016
Chef Automate gives Chef, InSpec and Habitat a single dashboard

Chef Automate: Firm's DevOps odds 'n' sods crammed into one parcel

ChefConf Chef has announced Automate, a new product which incorporates all its main DevOps tools into one bundle. The announcement was made at the company's ChefConf event currently under way in Austin, Texas. Chef Automate is essentially a bundle of several existing products – Chef, Chef Delivery, InSpec and Habitat – with …
Tim Anderson, 12 Jul 2016
Image by gyn9037 http://www.shutterstock.com/gallery-691846p1.html

Nukeware: New malware deletes files and zaps system settings

Lazy but sneaky cybercrooks are slinging a new ransomware variant that falsely claims to have encrypted files when in reality it has deleted them. Ranscam tricks victims by falsely claiming that files have been moved onto an hidden, encrypted partition. In reality the malware has deleted files and comprehensively messed with …
John Leyden, 12 Jul 2016

Github licence checker

Libraries.io founder Andrew Nesbitt has launched a handy service to check code dependencies and licence compliance every time code is pushed into Github, lessening the pain of an annual review. Dependency CI will offer “much lower cost and faster than traditional CI systems, as it does a lot more work up front in the form of …
Andrew Orlowski, 12 Jul 2016

LG’s modular gambit stalls

LG’s bold design move to include an expansion slot for bespoke removable modules in its flagship phone isn’t paying off. The company has reshuffled management and admitted that the "latest flagship G5 smartphone failed to generate sales”, but didn’t say by how much. Korean source Aju Business Daily suggests LG will lower its …
Andrew Orlowski, 12 Jul 2016
Image: Marvel

Aussie researcher claims 'Antminer' bitcoin boxen can be broken

Australian security researcher Tim Noise says scores of popular Antminer Bitcoin mining devices could be commandeered. Noise demonstrated how a vulnerability in the configuration of the open source mining program CGminer running on an Antminer box can be abused to redirect the efforts of massive mining operations to fill an …
Darren Pauli, 12 Jul 2016
Smashed computer

Apple crumbles: Mac sales slump while Dell, HP Inc, Lenovo shift PCs

Apple was the biggest loser in a Q2 that saw PC shipments down across the board. Research house Gartner reports that on the year-ago quarter, global shipments fell by 5.2 per cent overall, though the North American market showed some signs of life with a modest 1.4 per cent gain. Globally, Lenovo remained the single biggest …
Shaun Nichols, 12 Jul 2016

Google slammed over its 'free' school service

Two Swedish researchers have torn into Google's free school service, accusing the online giant of purposefully misleading users in order to continue profiting from the sale of children's data. Maria Lindh and Jan Nolin from the University of Borås have published a research paper [note: paid access] that digs into the policies …
Kieren McCarthy, 11 Jul 2016