Home Search
open - search results
If you're not happy with the results, please do another search
The 100:10:1 Method: My Approach to New Open Source Projects
For many years I was whole hog into the open-source movement and at the time I rarely wrote a stitch of code in my...
This Week in Linux News: Linux Foundation’s Open API Initiative Launches, Xiaomi To Sell...
This week in Linux news, The Linux Foundation's Open API Initiative launches, a leading smartphone manufacturer plans to release two Linux laptops in 2016,...
Side By Side: openSuSE Leap and Fedora 23
Two major Linux distributions have been released on consecutive days. I have loaded them both on several of my laptops, and here is what...
Open Source Security Process Part 2: Containers vs. Hypervisors – Protecting Your Attack Surface
In part two of this series, Xen Project Advisory Board Chairman Lars Kurth discusses the different security vulnerabilities of containers and hypervisors. Read Part...
OpenSUSE Leap 42.1 released
The openSUSE Leap 42.1 release is now available. "Version 42.1 is the first version of openSUSE Leap that uses source from SUSE Linux Enterprise...
Open Source R Code to Get New Hub with Help from the Linux Foundation
The R Consortium and the Linux Foundation will fund a new open source developer hub for the R programming language called R-Hub, which complements...
Distribution Release: OpenELEC 6.0
Stephan Raue has announced the release of OpenELEC 6.0, a major new version of the specialist Linux distribution designed for media centres and featuring...
Optimize Web Delivery with these Open Source Tools
Web proxy software forwards HTTP requests without modifying traffic in any way. They can be configured as a transparent proxy with no client-side configuration...
UK To Adopt Open Source Office “GovOffice” Based On LibreOffice
We've been listening news of adopting Open-source by several countries, organisations and companies. This time it's UK. The UK Governmentannounced the deal with an open...
Open Source Security Process — Part 1: A Cloud Security Introduction
In part one of this four-part series, Xen Project Advisory Board Chairman Lars Kurth takes a look at the theories behind cloud security and how they...