Home Search

open - search results

If you're not happy with the results, please do another search

Review: 6 Slick Open Source Routers

If you want to buy a router specifically to be modded, you might be best served by working backward. Start by looking at the...

Why Enterprises Are Flocking to Open Source

As the leader of an open source foundation, I have a unique perspective on the way open source technologies are catalyzing the digital transformation...

This Week in Open Source News: Emotional Chatbots, LF Networking Fund & More

This week in open source and Linux news, developer Eugenia Kuyda's fascinating open source-built chatbot is emotionally intelligent,  The Linux Foundation forms new networking...

Call for Proposals Now Open – Speak at Open Source Summit Japan, North America,...

Open Source Summit Japan, North America and Europe are the leading conferences for developers, architects and other technologists – as well as open source...

Mitigating Known Security Risks in Open Source Libraries

This is an excerpt from Securing Open Source Libraries, by Guy Podjarny.  Read the preceding chapter or view the full report. There are several ways to fix vulnerable packages,...

ELC + OpenIoT: From Cloud Computing to Robot Apocalypse

It’s time once again for that grand gathering of embedded Linux geeks known as the Embedded Linux Conference (ELC), as well as the co-located,...

A Look Inside Facebook’s Open Source Program

Open source becomes more ubiquitous every year, appearing everywhere from government municipalities to universities. Companies of all sizes are also increasingly turning to open source software. In...

This Week in Open Source News: The Linux Foundation Launches Networking Fund

This week in open source/Linux news, The Linux Foundation announced a restructuring of their networking projects under one umbrella, Slack launches on Linux, and...

How We Built an Intrusion Detection System on AWS using Open Source Tools

It’s roughly a year now that we built an intrusion detection system on AWS cloud infrastructure that provides security intelligence across some selected instances...

Finding Vulnerable Open Source Packages

Finding Vulnerable Packages Now that you understand what a known vulnerability is, let’s start going through the four steps needed to address them: find, fix,...