Skip to main content

Home/ Future of the Web/ Group items matching "Network,"open source",open" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gary Edwards

ArsDigita Community System - Wikipedia, the free encyclopedia - 0 views

  •  
    A history of the ArsDigita Community Software System that first introduced the concept of connective Knowledgeware. Today these systems are known as enterprise ready "social networks". The ArsDigita Community System (ACS) was an advanced Open Source toolkit for developing community web applications developed primarily by developers associated with ArsDigita Corporation. The two most current software toolkits based on this codebase are the OpenACS toolkit and the Red Hat CCM.
Gary Edwards

Do we need two open source office suites? | TalkBack on ZDNet - 0 views

  • Symphony isn't based on Lotus 1-2-3 and AmiPro (WordPro). It's originally based on OpenOffice 1.1.4. And has since been updated by Sun's StarOffice group to OpenOffice 2 something. The history here is that IBM ripped off the OpenOffice 1.1.4 code base when it was still under the dual SSSL-LGPL license. Here it languished as IBM "WorkPlace", finally to be released as Lotus Symphony.
  •  
    Response to ZDNet article about Lotus Symphony and OpenOffice. Dana gets it terribly wrong, claiming that Lotus Symphony is "open Source". I respond by setting the record straight. Couldn't help myself though. I dove into the whole "rip out and replace", government mandates, ODF vs. OOXML thing. ending of course with the transition from client/server to client/Web-Stack/server and the future of the Web.
  •  
    Like this http://www.hdfilmsaati.net Film,dvd,download,free download,product... ppc,adword,adsense,amazon,clickbank,osell,bookmark,dofollow,edu,gov,ads,linkwell,traffic,scor,serp,goggle,bing,yahoo.ads,ads network,ads goggle,bing,quality links,link best,ptr,cpa,bpa
Gonzalo San Gil, PhD.

List Of Tools To Monitor The Health Of Your Linux System | Unixmen - 1 views

  •  
    "Introduction Achieving good performance from a computer or network is an important part of system administration.The monitoring and maintenance of the system is the most important task listed in the checklists for daily tasks of a system and network administrator. There are many commands line utilities created for this purpose."
  •  
    "Introduction Achieving good performance from a computer or network is an important part of system administration.The monitoring and maintenance of the system is the most important task listed in the checklists for daily tasks of a system and network administrator. There are many commands line utilities created for this purpose."
Gonzalo San Gil, PhD.

5 Best Open Source Web Browser Security Apps - 0 views

  •  
    "The Web browser acts as the gateway for a myriad of online services these days. Computer security problems are far from solved, and technology advances provide new ways for malware to infect our devices and enter our business networks. For example, smartphones and tablets offer fresh new fields for malware-and its malicious cousin, "malvertising"-to exploit" [# ! And don't miss... # ! ... the ( 'my' ;) ) Favorite: # http://noscript.net/ (suggested in the article's readers' comments...)]
  •  
    "The Web browser acts as the gateway for a myriad of online services these days. Computer security problems are far from solved, and technology advances provide new ways for malware to infect our devices and enter our business networks. For example, smartphones and tablets offer fresh new fields for malware-and its malicious cousin, "malvertising"-to exploit"
Gonzalo San Gil, PhD.

Why the software world needs a 'no-fly zone' for patents | ITworld - 0 views

  •  
    "Credit: flickr/Bob Bob Now 10 years old, the Open Invention Network protects more than 2,000 software packages Katherine Noyes By Katherine Noyes"
Paul Merrell

Transparency Toolkit - 0 views

  • About Transparency Toolkit We need information about governments, companies, and other institutions to uncover corruption, human rights abuses, and civil liberties violations. Unfortunately, the information provided by most transparency initiatives today is difficult to understand and incomplete. Transparency Toolkit is an open source web application where journalists, activists, or anyone can chain together tools to rapidly collect, combine, visualize, and analyze documents and data. For example, Transparency Toolkit can be used to get data on all of a legislator’s actions in congress (votes, bills sponsored, etc.), get data on the fundraising parties a legislator attends, combine that data, and show it on a timeline to find correlations between actions in congress and parties attended. It could also be used to extract all locations from a document and plot them on a map where each point is linked to where the location was mentioned in the document.
  • Analysis Platform On the analysis platform, users can add steps to the analysis process. These steps chain together the tools, so someone could scrape data, upload a document, crossreference that with the scraped data, and then visualize the result all in less than a minute with little technical knowledge. Some of the tools allow users to specify input, but when this is not the case the output of the last step is the input of the next. Tools Existing and planned Transparency Toolkit tools include include scrapers and APIs for accessing data, format converters, extraction tools (for dates, names, locations, numbers), tools for crossreferencing and merging data, visualizations (maps, timelines, network graphs, maps), and pattern and trend detecting tools. These tools are designed to work in many cases rather than a single specific situation. The tools can be linked together on Transparency Toolkit, but they are also available individually. Where possible, we build our tools off of existing open source software. Road Map You can see the plans for future development of Transparency Toolkit here.
  •  
    If you think this isn't a tool for some very serious research, check the short descriptions of the modules here. https://github.com/transparencytoolkit I'll be installing this and doing some test-driving soon. From the source files, the glue for the tools seems to be Ruby on Rails. The development roadmap linked from the last word on this About page is also highly instructive. It ranks among the most detailed dev roadmaps I have ever seen. Notice that it is classified by milestones with scheduled work periods, giving specific date ranges for achievement. Even given the inevitable need to alter the schedule for unforeseen problems, this is a very aggressive (not quite the word I want) development plan and schedule. And the planned changes look to be super-useful, including a lot of "make it easier for the user" changes.   
Gonzalo San Gil, PhD.

The Internet is one step closer to universal HTTPs | Network World - 0 views

  •  
    "The Electronic Frontier Foundation (EFF), which is on the front lines for protecting digital freedom and preventing censorship of the web, applauded content delivery network provider CloudFlare for the company's recent announcement that it will offer encrypted HTTPs as its default setting for any website it hosts."
  •  
    "The Electronic Frontier Foundation (EFF), which is on the front lines for protecting digital freedom and preventing censorship of the web, applauded content delivery network provider CloudFlare for the company's recent announcement that it will offer encrypted HTTPs as its default setting for any website it hosts."
Gonzalo San Gil, PhD.

How to block network traffic by country on Linux - Xmodulo - 0 views

  •  
    "Last updated on December 11, 2015 Authored by Dan Nanni 10 Comments As a system admin who maintains production Linux servers, there are circumstances where you need to selectively block or allow network traffic based on geographic locations. For example, you "
Paul Merrell

Testosterone Pit - Home - The Other Reason Why IBM Throws A Billion At Linux (With NSA- Designed Backdoor) - 0 views

  • IBM announced today that it would throw another billion at Linux, the open-source operating system, to run its Power System servers. The first time it had thrown a billion at Linux was in 2001, when Linux was a crazy, untested, even ludicrous proposition for the corporate world. So the moolah back then didn’t go to Linux itself, which was free, but to related technologies across hardware, software, and service, including things like sales and advertising – and into IBM’s partnership with Red Hat which was developing its enterprise operating system, Red Hat Enterprise Linux. “It helped start a flurry of innovation that has never slowed,” said Jim Zemlin, executive director of the Linux Foundation. IBM claims that the investment would “help clients capitalize on big data and cloud computing with modern systems built to handle the new wave of applications coming to the data center in the post-PC era.” Some of the moolah will be plowed into the Power Systems Linux Center in Montpellier, France, which opened today. IBM’s first Power Systems Linux Center opened in Beijing in May. IBM may be trying to make hay of the ongoing revelations that have shown that the NSA and other intelligence organizations in the US and elsewhere have roped in American tech companies of all stripes with huge contracts to perfect a seamless spy network. They even include physical aspects of surveillance, such as license plate scanners and cameras, which are everywhere [read.... Surveillance Society: If You Drive, You Get Tracked].
  • Then another boon for IBM. Experts at the German Federal Office for Security in Information Technology (BIS) determined that Windows 8 is dangerous for data security. It allows Microsoft to control the computer remotely through a “special surveillance chip,” the wonderfully named Trusted Platform Module (TPM), and a backdoor in the software – with keys likely accessible to the NSA and possibly other third parties, such as the Chinese. Risks: “Loss of control over the operating system and the hardware” [read.... LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA.
  • It would be an enormous competitive advantage for an IBM salesperson to walk into a government or corporate IT department and sell Big Data servers that don’t run on Windows, but on Linux. With the Windows 8 debacle now in public view, IBM salespeople don’t even have to mention it. In the hope of stemming the pernicious revenue decline their employer has been suffering from, they can politely and professionally hype the security benefits of IBM’s systems and mention in passing the comforting fact that some of it would be developed in the Power Systems Linux Centers in Montpellier and Beijing. Alas, Linux too is tarnished. The backdoors are there, though the code can be inspected, unlike Windows code. And then there is Security-Enhanced Linux (SELinux), which was integrated into the Linux kernel in 2003. It provides a mechanism for supporting “access control” (a backdoor) and “security policies.” Who developed SELinux? Um, the NSA – which helpfully discloses some details on its own website (emphasis mine): The results of several previous research projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. A reference implementation of this architecture was first integrated into a security-enhanced Linux® prototype system in order to demonstrate the value of flexible mandatory access controls and how such controls could be added to an operating system. The architecture has been subsequently mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel, spawning a wide range of related work.
  • ...1 more annotation...
  • Among a slew of American companies who contributed to the NSA’s “mainstreaming” efforts: Red Hat. And IBM? Like just about all of our American tech heroes, it looks at the NSA and other agencies in the Intelligence Community as “the Customer” with deep pockets, ever increasing budgets, and a thirst for technology and data. Which brings us back to Windows 8 and TPM. A decade ago, a group was established to develop and promote Trusted Computing that governs how operating systems and the “special surveillance chip” TPM work together. And it too has been cooperating with the NSA. The founding members of this Trusted Computing Group, as it’s called facetiously: AMD, Cisco, Hewlett-Packard, Intel, Microsoft, and Wave Systems. Oh, I almost forgot ... and IBM. And so IBM might not escape, despite its protestations and slick sales presentations, the suspicion by foreign companies and governments alike that its Linux servers too have been compromised – like the cloud products of other American tech companies. And now, they’re going to pay a steep price for their cooperation with the NSA. Read...  NSA Pricked The “Cloud” Bubble For US Tech Companies
Gonzalo San Gil, PhD.

The Internet is Broken: Idealistic Ideas for Building a GNU Network | GNUnet - 0 views

  •  
    "Sat, 02/08/2014 - 15:10 - Christian Grothoff Title The Internet is Broken: Idealistic Ideas for Building a GNU Network Publication Type Conference Paper Year of Publication 2014 Authors Grothoff, C, Polot, B, von Loesch, C Conference Name W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT) Date Published February Publisher W3C/IAB Conference Location London, UK"
Gary Edwards

The Cloud Computing Tsunami | The Numbers from Gartner and Cyrus Golkar - 0 views

  •  
    The cloud computing wave is the most dramatic change I have observed in the computing industry since the wave of the Internet. Cloud computing will significantly change data centers and IT organizations as well as the infrastructure and software vendors' business models. In fact, the cloud computing wave is not just a wave - it is more like a tsunami. What is causing this cloud tsunami? I start with listing 4 of the Gartner top 10 IT predictions for the next three to five years for cloud computing, software as service (SaaS), data center power/cooling efficiency and open source software. All of these predictions indicate that data center efficiency and cost containment will transform the IT industry over the next 5 years. Key Gartner predictions for the data center for the next 5 years:
Gonzalo San Gil, PhD.

SoftEther VPN Project - SoftEther VPN Project - 0 views

  •  
    "SoftEther VPN Project develops and distributes SoftEther VPN, An Open-Source Free ​Cross-platform Multi-protocol VPN Program, as an academic project from University of Tsukuba."
Gonzalo San Gil, PhD.

Public Media Joins Forces for One Big Platform - 0 views

  •  
    Power for The Public Services... For The Public Media... For Every@ne's Voice.
  •  
    NEW YORK - The country's five silos of public radio and television are spilling into each other with a joint program that will allow them - and eventually the public itself - to build apps, stations, websites and other media services combining audio, text and video content from every public radio and television outlet in the country. NPR president and CEO Vivian Schiller appeared at Wired's Disruptive by Design conference Monday morning to announce the new Public Media Platform, a partnership between American Public Media, National Public Radio, Public Broadcasting Services (PBS), Public Radio International and the Public Radio Exchange distribution network. The Public Media Platform is "a series of platforms that will allow all of the content from all of those entities - whether news or cultural products - to flow freely among the partners and member stations, and ultimately, also to other publishers, other not-for-profits and software developers who will invent wonderful new products that we can't even imagine," said Schiller.
  •  
    This strikes me at first blush as a potentially disruptive move by public radio and television stations and networks, somewhat akin to the disruptive free and open source software movement. I.e., because the content is free and will apparently be freely available to the public for recycling, we may see the emergence of a viral free meta-network of the kind that content providers stuck behind paywalls can't imitate. Potentially a significant content commons counter-balancing force to paywall content providers. The devil is in the details and implementation, of course.
Gonzalo San Gil, PhD.

Red Hat Teams with Telefonica, Expands Focus on OpenStack and Telecom - 0 views

  •  
    "Earlier this month, when Red Hat was busy delivering a flurry of OpenStack-related announcements, news also came from the company that it is collaborating to drive Network Functions Virtualization (NFV) and telecommunications technology into OpenStack. Red Hat is forming alliances aimed at delivering a carrier-grade telecommunications offering based on Linux, Kernel-based Virtual Machine (KVM), and OpenStack. "
  •  
    "Earlier this month, when Red Hat was busy delivering a flurry of OpenStack-related announcements, news also came from the company that it is collaborating to drive Network Functions Virtualization (NFV) and telecommunications technology into OpenStack. Red Hat is forming alliances aimed at delivering a carrier-grade telecommunications offering based on Linux, Kernel-based Virtual Machine (KVM), and OpenStack. "
Gary Edwards

Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Enterprise | WIRED - 0 views

  •  
    TAILS anonymous Operating System- excerpt: "When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA's prying eyes. It's called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box. You install it on a DVD or USB drive, boot up the computer from the drive and, voila, you're pretty close to anonymous on the internet. At its heart, Tails is a version of the Linux operating system optimized for anonymity. It comes with several privacy and encryption tools, most notably Tor, an application that anonymizes a user's internet traffic by routing it through a network of computers run by volunteers around the world. Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn't store any data locally. This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources. "The installation and verification has a learning curve to make sure it is installed correctly," Poitras told WIRED by e-mail. "But once the set up is done, I think it is very easy to use." An Operating System for Anonymity Originally developed as a research project by the U.S. Naval Research Laboratory, Tor has been used by a wide range of people who care about online anonymity: everyone from Silk Road drug dealers, to activists, whistleblowers, stalking victims and people who simply like their online privacy. Tails makes it much easier to use Tor and other privacy tools. Once you boot into Tails - which requires no special setup - Tor runs automatically. When you're done using it, you can boot back into your PC's normal operating
Paul Merrell

The End of the Internet As We Know It - 2 views

  • We owe everything we love about the Web to net neutrality, the principle that the Internet is an open platform and service providers like AT&T, Comcast, and Time Warner can’t dictate where you go and what you do online. Without net neutrality, the Web would look a lot like cable, with the most popular content available only on certain tiers or with certain providers. (Imagine AT&T as the exclusive home of Netflix and Comcast as the sole source of YouTube.)
  • In 2010, the Federal Communications Commission tried to establish concrete rules to protect net neutrality. But the agency ended up caving to pressure from the biggest phone and cable companies and left huge loopholes standing in the way of a truly open Internet. And now Verizon is in court challenging those rules — and the FCC’s authority to draft and enforce them to protect consumers and promote competition. That’s because under the Bush administration, the FCC decided to give away much of its authority to oversee our broadband networks. The current FCC could fix the problem by reclaiming this authority, but it hasn’t yet. If the FCC loses the case and fails to take the necessary action to reverse course, the agency will be toothless as the biggest Internet providers run amok and destroy everything we love about the Internet. Indeed, the second it looks like the FCC is going to be defeated, you can expect all the telecoms and ISPs to join hands and declare they’ve reached an agreement to self-regulate.
  • If this happens, they’ll win and we’ll lose. Online privacy will be a thing of the past. (If you thought it already was, believe me, things could get worse.) The ISPs will try to read all of your content so they can sell you to advertisers. New “troll tolls” will force content creators and others to pay discriminatory fees just to reach people online — and will require the rest of us to pony up for “premium” content. Does that sound Orwellian? That’s because it is. But this is no far-fetched scenario. It’s time for us to stand up and fight for our online rights. We need to tell the FCC to stop messing around. It’s time for the agency to fix its past mistakes — and establish strong net neutrality protections that are 100 percent loophole-free.
Gonzalo San Gil, PhD.

FAQ · syncthing/syncthing Wiki - 0 views

  •  
    "How do I access the web GUI from another computer?"
Gonzalo San Gil, PhD.

WebTorrent Desktop - 0 views

  •  
    "Whether it's video from the Internet Archive, music from Creative Commons, or audiobooks from Librivox, you can play it right away. You don't have to wait for it to finish downloading. WebTorrent - network of peers WebTorrent Desktop connects to both BitTorrent and WebTorrent peers. It can talk to peers running Transmission or uTorrent, and it can also talk to web pages like instant.io."
Gonzalo San Gil, PhD.

voip-info.org - voip-info.org - 0 views

  •  
    "This Wiki covers everything related to VOIP, software, hardware, VoIP service providers, reviews, configurations, standards, tips and tricks and everything else related to voice over IP networks, IP telephony and Internet Telephony. Your contributions are welcome, please read the How to add information to this wiki page and the Posting Guidelines before you post."
Gonzalo San Gil, PhD.

IPTABLES VS FIREWALLD | Unixmen - 0 views

  •  
    "Today we will walk through iptables and firewalld and we will learn about the history of these two along with installation & how we can configure these for our Linux distributions."
« First ‹ Previous 41 - 60 of 75 Next ›
Showing 20 items per page