A great Bengali polymath and noble prize winner in literature once said: “Don’t limit a child to your own learning, for he was born in another time”. With changing times, the systems and customs that govern our society should also change. Source: Tech
Category: Open Source Software
Open Source Software
Red Hat Gets Buy Rating As It Ascends In The Cloud
by
•1 provider of Linux-based open-source operating-system software as it moves deeper into fast-growing areas such as the cloud. So concludes Brian White, an analyst for Cantor Fitzgerald, who initiated coverage on the enterprise software company on Tuesday with a buy rating and a price target of 81. Red Hat stock inched up a fraction, near…
Will Red Hat (RHT) Stock be Helped Today by This Ratings Initiation?
by
•The firm said it initiated coverage on the open source software solutions provider as it believes the company is a market leader and will continue to gain market share. “In our view, Red Hat’s standing as a leading provider of open source software solutions positions the company well for the build out of next generation…
An introduction to the attic backup program
by
•Over the past year or two several new backup utilities have become popular. These new tools tend to avoid the use of files, and just store backups as collections of files. Source: Tech
Uganda Adopts Free And Open Source Software For E-Governance
by
•The Standards News Portal is updated on a daily basis to bring you the most important news about standards – how they are created, how they affect you – and who’s doing what to whom. The Standards News Portal was launched in February 2002 and currently contains 7714 categorized, searchable articles, perhaps the largest archive…
Four Flaws Expose Critical Network Time-Keeping Servers to Attack
by
•Flaws in a popular program implementing the Network Time Protocol, the software used to synchronize servers across the Internet, has administrators scrambling. Four security vulnerabilities in a popular program for synchronizing time on Internet-connected computers could be used to compromise tens of thousands – and possibly millions – of servers, according to security experts. Source:…
SugarCRM Execs Sling Veiled Shot Over API Charges at Salesforce
by
•Though Salesforce wasn’t identified by name, SugarCRM execs warn that the API charges associated with some SaaS providers can sneak up on you as a rising cost . In a SugarCRM world, you install your own instance of the open source software or you have your own instance hosted by a SugarCRM hoster like SiteGrounda…
This Linux grinch could put a hole in your security stocking
by
•A grinch may be snatching away some year-end holiday time, forcing Linux system administrators to fill a gaping security hole in their systems. Named after the proverbially grumpy Dr. Seuss character, the grinch vulnerability could affect all Linux systems, potentially providing attackers with unfettered root access, according to security service provider Alert Logic, which introduced…
Snappy Ubuntu for Docker Containers Comes to Google's Cloud
by
•Canonical , the company behind Ubuntu , one of the most popular Linux distributions, has made snappy Ubuntu Core, a version of the operating system designed for cloud infrastructure and optimized for running Docker containers, available on Google ‘s cloud. Canonical first announced snappy Ubuntu Core earlier this month and made it available on Microsoft…
Canonical's Stripped-Down "Snappy" Ubuntu Comes To Google's Compute Engine
by
•A week ago, Canonical released the first alpha version of its new minimalist ” Snappy ” edition of Ubuntu Core for container farms. To the surprise of many, the launch partner for Snappy was Microsoft’s Azure cloud computing platform . Source: Tech