Articles about software

Continuous Lifecycle London 2018

Agile development exposed as techie superstition

At DevOps-focused London conference Continuous Lifecycle* today, Linda Rising challenged the superstition of tech professionals, a group that ought to have some affinity for science. Rising, a consultant, author and COO of The Hillside Group, asked for a show of hands from anyone doing some flavour of agile development. Up …
Thomas Claburn, 16 May 2018
password

Bombshell discovery: When it comes to passwords, the smarter students have it figured

Students who get good grades have better passwords than their less academically successful peers, though this finding should be considered alongside several caveats. JV Roig, consulting director and software developer at Asia Pacific College (APC) in the Philippines, wanted to find out whether school smarts had any bearing on …
Thomas Claburn, 10 May 2018
An executive slowly vanishing

Crypto chat app Signal's disappearing messages found hiding on macOS

Encrypted chat app Signal's disappearing messages may not actually vanish on Apple Macs, thanks to the way the encrypted messaging software interacts with the macOS Notification Center. On Tuesday, security researcher Alec Muffett noted: "If you are using the @signalapp desktop app for Mac, check your notifications bar; …
Man surprised by calculator

Microsoft wants serious, non-gaming developers to make more money

Build Microsoft says it will take less money from Windows developers selling apps in its store, making its marketplace significantly more appealing than competing app stores in certain cases – assuming revenue share rather than market size is the primary consideration. In a blog post published on Monday, to be explained on Tuesday …
Windows 10 by Anton Watman, image via Shutterstock

Microsoft's latest Windows 10 update downs Chrome, Cortana

Microsoft says it's looking into reports that apps including "Hey Cortana" and Google Chrome hang or freeze for those who have installed the recent Windows 10 April 2018 Update. The company suggests trying the Windows logo key + Ctrl + Shift + B to wake the screen or, for laptop users, opening and closing device lid, in an …
Fancy Bear Anonymous bear logo

Fancy that, Fancy Bear: LoJack anti-laptop theft tool caught phoning home to the Kremlin

LoJack for Laptops, a software tool designed to rat on computer thieves, appears to be serving a double purpose – by seemingly working with a Russian state-sponsored hacking team. The application allows administrators to remotely lock and locate, and remove files from, stolen personal computers. It's primarily aimed at …
Nerd fail photo via Shutterstock

if dev == woman then dont_be(asshole): Stack Overflow tries again to be more friendly to non-male non-pasty coders

Code Q&A site Stack Overflow has admitted its community can be hostile to women, people of color, and marginalized groups, and has promised to do better. It's an acknowledgement of charges leveled against the programming community repeatedly over the years. Enumerating various barriers to participation, a 2016 research paper …
Thomas Claburn, 30 Apr 2018
Woman holding keys

Cluster-f*ck! Etcd DBs spaff passwords, cloud keys to world by default

Software called etcd, used for storing data across clusters of containers, has a problem – it does not implement authentication by default and so poses a security risk if deployed without further fiddling. It's also rather widely used because it comes with Kubernetes, the popular container orchestration software. Giovanni …
Thomas Claburn, 20 Mar 2018
The GitHub mascot at GitHub Universe

GitHub Marketplace dev toolmakers get a clue

Community code site GitHub on Monday plans to illuminate its Marketplace, not with lights but with data. The social software development biz opened its online Marketplace last year to provide a central storefront for developer tools that can be integrated with its code repositories. GitHub's bit bazaar provides assorted …
Thomas Claburn, 26 Feb 2018

When clever code kills, who pays and who does the time? A Brit expert explains to El Reg

Analysis On September 26, 1983, Stanislav Petrov, an officer in the Soviet Union's Air Defense Forces, heard an alarm and saw that the warning system he'd been assigned to monitor showed the US had launched five nuclear missiles. Suspecting an error with the system's sensors, he waited instead of alerting his superiors, who probably …
Thomas Claburn, 24 Feb 2018
Jack Gyllenhaal in Enemy

You can resurrect any deleted GitHub account name. And this is why we have trust issues

Analysis The sudden departure of a developer from GitHub, along with the Go code packages he maintained, has underscored a potential security issue with the way some developers rely on code distributed through the community site. The individual identifying himself as Jim Teeuwen, who maintained GitHub repository for a tool called go- …
Thomas Claburn, 10 Feb 2018
Uber CISO John Flynn

PSA: If your security starts and ends with bug bounties, you're gonna have a bad time

Analysis Remember when Uber tried to cover up the fact its AWS datastore containing records on 57 million riders and drivers had been hacked? And that it bunged the hackers $100,000 to shut them up, and then disguised the expense as a bug bounty payout? Who could forget? Certainly not shocked US lawmakers, who held a hearing in …
image of Uber app in London

Tech bad-boy Uber crafts tool to make staff follow the rules in future (er, coding rules, that is)

Despite its astonishing reputation for obliterating HR policy, resisting transit regulations and bending other laws, taxi scourge Uber is rather keen to keep its code clean and ensure it follows the rules. Developers working for the ride app biz have created a software analysis tool called NEAL to enforce code quality, and …
malware_security_648

Feds may have to explain knowledge of security holes – if draft law comes into play

The US House of Representatives this week approved a bill that, given further legislative and executive branch support, will require the American government to account for its handling of software and hardware vulnerabilities. The "Cyber Vulnerability Disclosure Reporting Act," sponsored by Rep Sheila Jackson Lee (D-TX), …
Thomas Claburn, 13 Jan 2018
Hippie peace, image via Shutterstock

Open-source civil war: Olive branch offered in trademark spat... with live grenade attached

A few days before the Christmas holiday, the Software Freedom Law Center (SFLC) made a peace offering of sorts in an ostensible effort to resolve its trademark dispute with the Software Freedom Conservancy (SFC). In September last year, SFLC sued the SFC claiming that the SFC trademark "Software Freedom Conservancy" is …
 Close-up image of power management IC chip on an iPhone 6 logic board.

Yes, your old iPhone is slowing down: iOS hits brakes on CPUs as batteries wear out

Analysis When Apple's iOS 11.2 update arrived on December 2, the release notes touted faster wireless charging support, among other enhancements, but made no mention of a necessary but less appealing augmentation: retarded apps for aging iPhone models. It turns out Apple's mobile operating system includes a throttling mechanism for …
Thomas Claburn, 20 Dec 2017

Kubernetes 1.9 version bump is near – with APIs to extend the system

Assuming a handful of lingering issues can be resolved, the open-source Kubernetes project will introduce version 1.9 on Friday. In a phone interview with The Register, Aparna Sinha, special interest group (SIG) product management lead for Kubernetes and product manager at Google, singled out the general availability …
Thomas Claburn, 15 Dec 2017
container_ship_hamburg_shutterstock_648

Software vendors line up Kubernetes tasting menu for devops

With the advent of KubCon and CloudNativeCon in Austin, Texas, on Wednesday, assorted enterprise vendors have chosen this week to flog their latest devops-oriented wares, before the impending holiday torpor leaves IT folks too distracted, weary or inebriated to care. In the interest of jargon pruning and hype deflation, we …

Create a news alert about software, or find more stories about software.

Biting the hand that feeds IT © 1998–2018