Home Blog Page 1022

Why Intel Made Stephen Hawking’s Speech System Open Source

Innovation

Intel has announced the release Stephen Hawking’s speech system as open source, encouraging innovation and improvements that could open up the technology to people with physical disabilities throughout the world.

Stephen Hawking, who is probably one of the best scientific minds of our time, was diagnosed with ALS at the age of 21. This slowly paralyzed him and eventually took his ability to talk, but with the help of a unique speech system…

Read more at OpenSource.com

BOAR’S Board: The Ultimate Board!

Finally, the board you have always dreamt of, but have always been afraid to ask for! This development board merges three different worlds: pure OS, microcontroller, and FPGA. For the first time, the best of these three technologies can be found in a single board, and can work together for an improved programming experience. The board includes one Raspberry socket, two Arduino Mega shield-compatible sockets, one CPU and one FPGA…

Read more at Open Electronics

LG’s New ‘Rolly’ Wireless Keyboard Turns Into a Pocket Stick

LG just announced the “Rolly,” a Bluetooth keyboard that folds up along the four rows of keys to create a wand-like device that can be tossed in a purse or pocket. LG is hardly the first electronics company to introduce a foldable, ultra-portable wireless keyboard — or even the first to introduce a gadget called the Rolly — but it might be the first to market either as a stick for your pocket.

Unlike ultra-flexible foldable keyboards, the Rolly is made of solid plastic, which gives it a more tactile feel, LG claims; it’s also supposedly more comfortable because it’s just shy of the 18mm key pitch found on most desktop keyboards.

Read more at The Verge

Distribution Release: Scientific Linux 6.7

Pat Riehecky has announced the release of Scientific Linux 6.7, the latest update of the distribution’s legacy branch, built from source package for the recently-released Red Hat Enterprise Linux (RHEL) 6.7: “Scientific Linux 6.7 i386/x86_64. Existing 6x systems should run ‘yum clean expire-cache’. Major differences from Scientific Linux…

Read more at DistroWatch

All Aboard Van Beethoven, Where Oculus Rift Meets The 19th Century

The LA Phil will soon take Beethoven to the streets, in a truck fitted with a virtual-reality headset that immerses listeners in 360-degree, 3D Beethoven. The Oculus Rift, a VR headset generally associated with action-filled video games and fantastical computerized worlds, will soon bring symphonic strains to the streets of Los Angeles. The LA Phil will employ the Oculus Rift as part of Van Beethoven, a mobile virtual-reality experience…

Read more at CNET News

Intel Invests in BlueData for Spinning Up Spark Clusters on the Fly

bluedata

Today Intel Corporation and BlueData announced a broad strategic technology and business collaboration, as well as an additional equity investment in BlueData from Intel Capital. BlueData is a Silicon Valley startup that makes it easier for companies to install Big Data infrastructure, such as Apache Hadoop and Spark, in their own data centers or in the cloud.

 

Read more at insideHPC

Linux Foundation Certification Anniversary Sale – Get Trained And Certified for $149

A year ago this week, we launched our Linux Foundation Certification Program. Since then, we’ve had thousands of people sign up to take these performance-based exams, and more and more employers are asking for these distribution-neutral performance-based certifications.

To celebrate this milestone, we’re selling our Linux Foundation Certified System Administrator exam and English version of LFS201 Essentials of System Administration bundle for an unprecedented $149…

Why Many Companies Aren’t Securing OS Permissions Adequately

foxtech-logoWhen it comes to ensuring that the operating systems in your IT infrastructure are adequately secured, access-permission-wise, some companies and organizations are more up to date — secure, and compliant — than others, according to David Dingwall, architect, and business development manager, Fox Technologies (which has recently conducted an in-depth survey of over 500 IT security professionals concerning their server environment security practices).

Based on his nearly three decades of experience at Fox Technologies, Dingwall sees several main reasons that companies revisit — and update/upgrade — these aspects of their IT security solutions.

The Auditor Cometh

“A lot of our sales are the result of auditors identifying compliance failures that must be addressed — and telling the organization they need to solve the problem, select a vendor, and show a visible project plan complete with schedule,” says Dingwall. “This is probably also how our direct competitors similarly get many sales.”

Aging Infrastructures in Need of a Security Refresh

Another category, according to consists of companies with very mature Unix/Linux infrastructures, whose architectural decisions were made years, even decades ago.

“Now they are depending on infrastructures behind their DMZ that are not secure,” says Dingwall. “A common reason we see is that they are using very old directory services, and hasn’t been an IT priority to upgrade them… but some directory services have been end-of-life’d. These are organizations that are successful, and have large infrastructures, but whose IT departments haven’t been given the time and resources to address this. For example, in the survey we had done recently, about 10% of the responding organizations are still using NIS or NIS+… which have been EOL’d a few years ago.”

(This particular issue isn’t recent, either — here’s an Oracle blog post from 2005 about migrating from NIS/NIS+ to LDAP.)

And when auditors come in with a checklist including a box for ‘do you depend on any software that’s been End-of-Life’d,’ that box gets checked. “So now these organizations now have to have a replacement program and hopefully IT now has the clout to get the resources to make this happen,” says Dingwall.

That 10% outstanding NIS dependent figure came as a surprise, says Dingwall. “We didn’t expect that many, because we hadn’t had the data. It’s a huge market opportunity for all of us who are in this sector.”

In looking for a new access privilege management tool, “Make sure the product and its vendor can integrate and replace in a straightforward way,” cautions Dingwall. “Newer vendors may not know what NIS migration looks like, or integrating it may not be in their core competencies.”

New, Growing Infrastructures, IPOs, and Acquisitions

Another category of companies needing better OS security tools, according to Dingwall, is “the companies building brand-new infrastructures — particularly startups.”

“Startups can easily go from ten to a hundred servers in their first year, and have 10,000 — probably as cloud instances — by year 3,” says Dingwall. And, he adds, “People building new IT infrastructures understand databases, fulfillment, and other interfacing and API issues– but they may not understand system security well.”

And even if IT isn’t breached, “When they are looking at an IPO, or being acquired, in come the acquisition team,” says Dingwall. “In the process of full disclosure, security holes may come up, because managing those concerns wasn’t part of the original system design.”

Branch and Remote Offices Need Security, Too

Companies’ branch and remote offices have growing security concerns, says Dingwall. “For example, small retail branches, gas stations, retail banking, and surprisingly, mining, and distributed oil and gas operations, where each or location has one or two servers — that have to be on premises in order for operations to work — for each Point-of-Sale device and other gear to talk to. And you can guarantee somebody in the branch or local site will have to do local administration — make sure local backups happen, and make sure the link to the central site is up.”

Typically, says Dingwall, “Those organizations have spent time working on the central infrastructure, but the branches have been left unchanged for the past 25-30 years. They may have changed platforms [[in the branches[[ a few times over the decades, from UNIX to Windows Server to Linux. But they are still discrete machines that need their access security updated.”

Perimeter-Only Defense Isn’t Sufficient Anymore

“If you are only defending your IT perimeter, once an intruder penetrates inside, nothing prevents them from ‘walking around inside’ — gaining access to a root account, or to a sysadmin account that has approval to get to root,” says Dingwall. “And many breaches aren’t detected for a month or more. That’s more than enough time for an intruder to download and crack entries in an encrypted password file, steal data, and more.”

So, stresses Dingwall, “You need internal security as well — and to move through the network or elevate privilege on a server has to require than just a password. Ideally, use something like two-factor identification, some form of real-time identity authentication, and use least-privilege access models.”

Getting from “Uh-Oh” to Ok

The challenge, says Dingwall, is “helping the company understand the nature of the security issues in terms of privilege management, identifying what their current IT environment does and doesn’t do, what today’s requirements are… and that they need a plan, budget and schedule to meet today’s requirements.”

DDingwallFox Technologies, Inc. helps companies protect corporate information assets with network security and access management software as well as striving to simplify compliance and streamline administration with an access management and privileged account control solution. Fox Technologies’ access management software centrally enforces granular access entitlements in real time across diverse server environments. To learn more about BoKS ServerControl visit: www.foxt.com/boks.

Experimental Unity Editor Now Available For Linux

Following last month’s state of Unity on Linux, an experimental build of the Unity Editor is now available. This experimental Unity Editor build for Linux is based off Unity 5.1.0f3 and is able to export from Linux to Linux/OSX/Windows binaries, WebGL, WebPlayer, Android, Tizen, and Samsung TV.

Read more at Phoronix

GitHub Combats DDoS Cyberattack

The code repository has mitigated a new DDoS attack following a crippling salvo experienced in March. 

The code repository, used to host code ranging from security systems to application frameworks as well as data dumps, was made aware of connectivity problems on Tuesday at approximately 10.40 BST. Following an investigation into the issue, the website’s team realized they were under a distributed denial-of-service (DDoS) attack, yet again.

Read more at ZDNet News