Home Search

open - search results

If you're not happy with the results, please do another search

Out-of-date, insecure open-source software is everywhere

Synopsys has found that 99% of commercial software programs include at least one open-source component. But 91% of those included out of date or abandoned open-source code.

Open source subscription-based models will become more appealing: Red Hat

Red Hat is using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies.

How to value cloud-based open source software services

Enterprises are moving to the public cloud, both developers and infrastructure engineers are finding some very compelling reasons to “go open” in the cloud.

India Looks To Open-Source Aarogya Setu App As Security Concerns Spike

Niti Aayog’s programme director Arnab Kumar has now said that the apex body is committed to open-sourcing Aarogya Setu.

Open source algorithms for network graph analysis help discover patterns in data

Tim Pitman, Team Leader StellarGraph Library said solving great challenges required broader context than often allowed by simpler algorithms.

The best way to protect the US electrical grid is with open source

Recently, President Donald Trump signed an executive order to protect the US electricity grid from cyber attacks by blocking power-equipment imports from "foreign adversaries."...

5 Open Source Tools Every Digital Nomad Needs

With a foundation tool like Nextcloud, you’ll find that adding a few more pieces to the puzzle will perfectly round out your nomad toolkit just fine.

How Tesla uses open source to generate resilience in modern electric grids

Two key open source projects--Kubernetes and Akka--have a lot to do in Tesla's vision of the electric grid.

ScyllaDB Announces 4.0 Release of Its Open Source NoSQL Database

Scylla delivers performance of millions of OPS on a single node, scales out to hundreds of nodes and consistently achieves a 99% tail latency of less than one millisecond.

GitHub Takes Aim at Open Source Software Vulnerabilities

Open source projects are generally ad hoc; they don't necessarily have a clear process in place for people to submit vulnerabilities, or the resources available for someone to patch them.