Article: Improving Open-source Software Security for Java Developers

Open Source, Software

Improving Open-source Software Security for Java Developers

Whether it be next-generation supply chain attacks like the Codecov incident or social engineering attempts to deliberately introduce vulnerabilities in the Linux kernel code, threats against developers are consistently evolving and come from least expected places.

The introduction of vulnerable code in an upstream repository or a published release – whether intentional or not, can threaten the security of the wider software supply chain, especially for open-source components that are trusted and consumed by thousands.

Therefore, introducing automatic pre-flight security checks before a component enters the distribution stage can help spread awareness among software publishers and highlight insights that might have otherwise been missed.

Bringing awareness to security issues lurking in applications in this way safeguards the wider software supply chain from known bugs and vulnerable dependencies.

Read full article

Article: The internet paradigm shift is here: Are you prepared for Web 3.0?

Decentralized Internet, Open Source, Operating Systems, Web 3.0

The internet paradigm shift is here: Are you prepared for Web 3.0?

The Web 3.0 — with all the components of its stack, from networking, computing, storage to end-user applications — is being developed. This new era that embraces freedom, flexibility, accessibility and reliability involves a massive change — a paradigm shift — that will allow users to adopt decentralized and censorship-resistant solutions in order to become self-sovereign. Within the next generation of platforms, computing providers are striving to build open and fairer systems to prepare for this paradigm shift.

Improved technology, user experience and education of users is pertinent to the preparation for the next paradigm shift. Web 3.0 will bring us a fairer internet with uninterrupted services, reduced data breaches and more freedom and capability to run applications anywhere in the world on a decentralized platform. It’s only a matter of time before end users realize the better infrastructure needed to support the digitization of the world — and this next chapter in our human history.

Read full article

Article: European Processor Initiative Tapes Out Their First RISC-V Test Chip

Hardware, Open Source, Software

European Processor Initiative Tapes Out Their First RISC-V Test Chip

The EPI recently announced that it has developed its first RISC-V device, the EPAC1.0, a RISC vector processor using the RISC-V ISA. Using the RISC-V architecture, the device can work with software libraries and other developments in the RISC-V environment. Furthermore, RISC-V removes the need for royalties and licenses when manufacturing processors that free the EPI from any outside commercial interest.

While RISC-V is nowhere near as popular as x86 or ARM, it is starting to gain traction and will undoubtedly become a major competitor. In addition, the use of an open-source ISA enables any manufacturer to create their own code-compatible CPU without worrying about licenses or royalties, which supports the development of lower-priced processors and encourages the use of open-source hardware.

Read full article

Article: Covid-19 Vaccination Passes Could Catalyze Self-Sovereign Identity Adoption

Data, Decentralized Internet, Open Source, Software

Covid-19 Vaccination Passes Could Catalyze Self-Sovereign Identity Adoption

Article: How cryptographic ledgers are helping geospatial researchers deal with information overload

Blockchain, Data

How cryptographic ledgers are helping geospatial researchers deal with information overload

Out of all the potential use cases of geospatial services, it could be that location-based real-time monitoring applications are the fastest growing. Some experts believe that these are expected to be the biggest drivers of the Earth Observation field in coming years, which could end up creating an unprecedented amount of data. Existing GIS solutions for long had to deal with increasingly large datasets, but this could potentially portend the creation of exponentially massive ones.

Computer industry representatives believe that blockchain-based solutions could be used to manage these geospatial datasets regardless of their physical size. Agricultural supply chain managers have been turning to distributed cryptographic ledgers to manage GIS data collected in that industry. Programmers might soon start to apply these to the observation industry, which has been one of the biggest information-creators in recent years.

Read full article

Article: Open source is a community, not a brand

Cloud, Open Source, Software

Open source is a community, not a brand

While free and open, open source can be complex and require expertise to maintain, support and operate. According to the Perforce report, it’s important to partner with industry leaders to maximize open-source success through migration help, ongoing management and support. Additionally, an open-source strategy that can clarify the open source initiatives, governance, role of internal resources and external support can help pave the way for open source in the enterprise.

“Finding success with open-source software as an enterprise organization requires a fully formed strategy – especially as it applies to critical areas like support,” said Rod Cope, CTO at Perforce Software

Read full article

Article: Industry Collaboration and Augmentation – the OSS Way

Open Source, Software

Industry Collaboration and Augmentation – the OSS Way

In the current environment in our industry, it’s often hard to see through the relentless noise related to private eco-systems. It’s also hard to see past how this approach will only get worse moving forward, with large publishers and other platform players increasingly following suit and an ecosystem of federated walled-gardens emerging as a result. At a glance it would appear that everyone is simply seeking to consolidate what they have in terms of audiences and solutions for buyers – and in the short-term, it may initially seem unlikely that we’ll see any increased levels of collaboration.

As a guiding example of active collaboration, one needs to look no further than open-source software and how it’s exploded over the past 30 years or so. Developers of software that has an open source license willingly allow anyone to download, collaboratively improve upon, and distribute the software without paying fees to the original creator.

Read full article

Article: Mythbusting The Stigma Around Open Source Technology

Open Source, Software

Mythbusting The Stigma Around Open Source Technology

The most common myth is that changes and edits can be made to an open-source tool by any and all contributors at any time, similar to how one would make corrections and changes to Wikipedia. This is not true. With open-source projects, coders and developers can make enhancements, changes and additions to the code, but what is not as well-known is that those code contributions have to be submitted to the proprietary tool owners via pull request. These pull requests are then reviewed, critiqued and sent back to the contributor for edits and corrections.

Acting as the gatekeepers of their open-source tool, the main developers have the right to control what is and is not added to their tool. They can deny contributions if they feel they are unnecessary, they can return the request with corrections for various reasons such as sloppy code or incomplete additions and they also make suggestions for the contribution to make it more useful when and if it is added to the tool.

Read full article

Article: An opportunity to redesign computer architectures

Data, Hardware, Software

An opportunity to redesign computer architectures

Can a computational storage device (CSD) provide similar efficiency gains for data processing?  Xilinix and Samsung have developed a smart SSD, which uses a field programmable gate array (FPGA) chip to accelerate certain data processing functions. One example where this is being used is for anomaly detection, where computational storage is used to scan 25 Tbytes of data in just 25 minutes.

It’s very early days in the evolution of computational storage. Existing enterprise storage providers do not see many indicators that it is set to take off. But data is exploding, and needs processing. Given the prospect that Quantum computing will disrupt classical computing, CSDs may well offer a way to satisfy voracious data appetite of a quantum computer.

Read full article

Article: The business benefits of using an open-source cloud

Cloud, Data, Open Source, Software

The business benefits of using an open-source cloud

Even before the pandemic led to increased remote work migration, many organisations were becoming increasingly reliant on cloud solutions to streamline systems and workflow. But as with any enterprise technology, implementing cloud solutions comes with questions about the best way for individual businesses to harness their benefits.

By now, we’re realising that using a single cloud vendor can lead to limitation and that a flexible, multi-vendor strategy is better for innovation. Although using a variety of cloud environments gives businesses the ability to adapt to changing business requirements, it also requires integration. Open source gives organisations an answer to this: It offers unmatched flexibility while also cutting the costs of software acquisition.

Read full article