Article: European Processor Initiative Tapes Out Their First RISC-V Test Chip

Hardware, Open Source, Software

European Processor Initiative Tapes Out Their First RISC-V Test Chip

The EPI recently announced that it has developed its first RISC-V device, the EPAC1.0, a RISC vector processor using the RISC-V ISA. Using the RISC-V architecture, the device can work with software libraries and other developments in the RISC-V environment. Furthermore, RISC-V removes the need for royalties and licenses when manufacturing processors that free the EPI from any outside commercial interest.

While RISC-V is nowhere near as popular as x86 or ARM, it is starting to gain traction and will undoubtedly become a major competitor. In addition, the use of an open-source ISA enables any manufacturer to create their own code-compatible CPU without worrying about licenses or royalties, which supports the development of lower-priced processors and encourages the use of open-source hardware.

Read full article

Article: How blockchain is providing the foundation for the next generation in cybersecurity

Blockchain, Cyber-Security

How blockchain is providing the foundation for the next generation in cybersecurity

Blockchain as a means of securing data is being used by Barclays to secure fund transfers. Lockheed Martin, a massive US defense contractor, uses blockchain to implement cybersecurity protocol measures in engineering systems, supply chain risk management and software development. It speaks volumes that the security of some of the most dangerous weapons in the world can be trusted to blockchain.

Even the US government itself, recently conducted a report to analyze how blockchain could be used to better secure their network, having concluded 84% of all government agencies fail basic encryption standards.

Read full article

Article: What is Software-Defined Storage?

Hardware, Open Source, Software

What is Software-Defined Storage?

Depending on where you research, Software-Defined Storage, or SDS, will be described as a scalable solution that enables platforms to utilise open-source software and off-the-shelf hardware to create a storage solution that can save money and enable software systems to interact with storage intelligently. Now, for the real definition of SDS!

Software-Defined storage, simply put, is a storage solution that provides advanced storage mechanisms, but these mechanisms are defined in software. Another way to think of it is replacing drive controllers with software. For example, RAID controllers allow for drives to be used in different configurations, but an SDS would remove the RAID controller, and implement this function in software instead.

Read full article

Article: Computational storage: A Computer Weekly analysis series

Hardware, Open Source

Computational storage: A Computer Weekly analysis series

“Computational storage is defined as architectures that provide Computational Storage Functions (CSF) coupled to storage, offloading host processing or reducing data movement. These architectures enable improvements in application performance and/or infrastructure efficiency through the integration of compute resources (outside of the traditional compute & memory architecture) either directly with storage or between the host and the storage. The goal of these architectures is to enable parallel computation and/or to alleviate constraints on existing compute, memory, storage and I/O.”

Article: Business Agility Requires Open APIs and Low-code/No-code

Open Source, Software

Business Agility Requires Open APIs and Low-code/No-code

As more organizations turn to low-code, no-code programming, success cannot be fully realized without the accessibility provided by truly open APIs.

As the pressure to quickly adapt working models and integrate technology continues to be a key factor in business success, more and more organizations will turn to low-code, no-code programming as a method to alleviate support required from IT and development teams. But this success cannot be fully realized without the accessibility provided by truly open APIs. Only then can the organizations rely on a truly agile software backbone to set them up now and into the future.

Read full article

Article: Impact of Next-Gen Blockchains On The Adoption of IoT

Blockchain, Hardware

Impact of Next-Gen Blockchains On The Adoption of IoT

The combination of the advanced and the next generation of blockchain technologies with the IoT sector has the incredible potential and applications of creating the global marketplace. Blockchain technology can meet the demands of a wider range of IoT applications like smart cities, healthcare systems, identity management, voting, smart home, and many more. Blockchain technology can assist the mass adoption of IoT by overcoming so many challenges.

Read full article

Article: Open-source software: freedom from ethics?

Open Source, Software

Open-source software: freedom from ethics?

Open-source software is distributed with a licence that generally allows anyone to use, study, change, or share its source code, without restrictions on how the software is used or by whom. The Open Source Initiative, which governs the most widely used open-source licences, even goes so far as to say that this means “giving evil people freedom, too.” Supporters of the Hippocratic Licence and other ethical licences like it believe it is time for programmers to take a less passive approach.

“It’s time for open-source to grow up and start taking responsibility for how it’s being used. We can’t stick to these […] libertarian ideals of ultimate freedom, when we exist in a society where the work that we do impacts others, sometimes in devastating ways,” said Ehmke. “I love the way open-source has transformed the world, and I think it has potential to continue. But we have to get our house in order.”

Read full article

Article: The Problem with Centralized Internet

Decentralized Internet

The Problem with Centralized Internet

Internet today is about gatekeepers. For instance, if you want to access a website, it requires going through multiple middlemen. First, a domain name server, then a server hosting company, which usually directs you to a third party, i.e; a web hosting service and this happens every time you try to open a website on the internet. These gatekeepers, however, are quite vulnerable to cyber-attacks and also make censorship & surveillance very easy.

By using decentralized internet, we can make sure that the content is accessible to everyone, at all times, and without the intervention of any powerful & unjust middlemen. With this form of internet, we can also exercise our freedom and fight against censorship and unwanted surveillance.

Read full article

Article: Blockchain Reconstructed Cloud Storage Technology

Blockchain, Cloud, Decentralized Internet

Blockchain Reconstructed Cloud Storage Technology

The co-construction and sharing of storage resources, open network, is a natural advantage of decentralized storage reconfiguration edge storage. At the same time, it also adapts to the distributed demand of edge storage, and achieves the effect of more distributed nodes and more robust networks.

Decentralized storage stores data in adjacent edge storage devices or data centers, greatly reducing the physical distance between data generation, calculation and storage.

Read full article

Article: The Role of Blockchain and Decentralization in the Digital Economy

Blockchain, Decentralized Internet

The Role of Blockchain and Decentralization in the Digital Economy

Public Blockchains have mainly been associated with cryptocurrencies only, however they are much more expansive than just cryptocurrencies. Public Blockchains that can onboard millions of open-source developers successfully are resulting in innovation in the way organizations are built, in the way financial services are offered and in the way employees and community members collaborate to more flatter, decentralized, digitized and open-source mechanics.

Read full article