Article: Interoperability a Major Goal in Data Strategies

Data, Governance

Interoperability a Major Goal in Data Strategies

DHS’ domain approach to data helps the agency ensure accuracy, quality and reliability. By dividing all its data into 10 domains, Ileto said, the agency facilitates interoperability and regulatory compliance. Some of these domains address immigration data, child trafficking, biometrics, cybersecurity and emergency preparedness management.

“I would say our biggest accomplishment is effective data governance and the many domains for data management,” Ileto said. “We are in the process of a policy that will help us to address external and internal efforts of making sure data is available or accessible for other domains. Data-sharing agreements are critical to the department’s ability to provide data internally and externally.”

Read full article

Article: Open Source: More Dominant Than You Think

Open Source, Operating Systems, Software

Open Source: More Dominant Than You Think

Simply, open source software is software that is licensed in a way that allows people to freely use, study, modify, and distribute the software. These open source licenses differ greatly from proprietary software licenses, where only the original owner can copy, alter, or distribute the software.

Since open source refers to a wide variety of software programs, the use cases vary greatly. However, a Red Hat open source enterprise report found open source software is critical to infrastructure networks.

95% of respondents said open source software was strategically important to the enterprise’s overall infrastructure strategy, up from 89% in 2019. Only 42% of respondents report using proprietary software, down from 55% in 2019 and respondents expect that to keep falling — this number is expected to be down to just 32% in two years.

Read full article

Article: How Global Forest Watch uses open source to fight deforestation

Innovation, Open Source, Software

How Global Forest Watch uses open source to fight deforestation

“We are highly dependent on the open source frameworks and libraries developed by the community,” Global Forest Watch Engineering Lead Thomas Maschler says. “There is so much innovation coming out of open source software. We tend to be on the early adopter side when it comes to tools and frameworks and we wouldn’t be able to move at the same speed if we would work with proprietary software.”

Read full article

Article: How Open Source is Fueling Space Exploration

Hardware, Innovation, Open Source, Software

How Open Source is Fueling Space Exploration

NASA has been using open-source software in some of its R&D projects for about 10 to 15 years now and it keeps a very extensive catalogue of the open-source code it has used. But open-source tech in space exploration mission has been a rare thought. But space missions are now focused on the use of technologies that are less expensive and more accessible. And therefore open source software in space exploration projects are pretty much be in vogue.

Technology played a key role in the entire Mars mission. For example, the 4-lb helicopters were contractors from recognizable companies like AeroVironment, Lockheed Martin, and Qualcomm. And behind its expansive software were thousands of open source developers from GitHub, the team of developers contributed code, documentation, graphic design, and more to the open source software that made Ingenuity’s launch possible, said a GitHub Blog, celebrating the moment in open source history.

Read full article

Article: How to Know If You Are Under DDoS Attack

Cyber-Security, Software

How to Know If You Are Under DDoS Attack

Nowadays, the term DDoS probably raises the heart rate of most webmasters. Though many don’t know exactly what a DDoS attack is, they do know the effect: an extremely sluggish or shut-down website.

In this article, we’ll focus on how to know if your website is under attack and how to protect it.

Hopefully, we can help you handle DDoS attacks without having a full blown meltdown.

Read full article

Powerful Mobile Phone Surveillance Tool Operates In Obscurity Across The Country

Advanced Cyber I/O

Powerful Mobile Phone Surveillance Tool Operates In Obscurity Across The Country

UNTIL NOW, the Bartonville, Texas, company Hawk Analytics and its product CellHawk have largely escaped public scrutiny. CellHawk has been in wide use by law enforcement, helping police departments, the FBI, and private investigators around the United States convert information collected by cellular providers into maps of people’s locations, movements, and relationships. Police records obtained by The Intercept reveal a troublingly powerful surveillance tool operated in obscurity, with scant oversight. Continue reading “Powerful Mobile Phone Surveillance Tool Operates In Obscurity Across The Country”