Article: Mythbusting The Stigma Around Open Source Technology

Open Source, Software

Mythbusting The Stigma Around Open Source Technology

The most common myth is that changes and edits can be made to an open-source tool by any and all contributors at any time, similar to how one would make corrections and changes to Wikipedia. This is not true. With open-source projects, coders and developers can make enhancements, changes and additions to the code, but what is not as well-known is that those code contributions have to be submitted to the proprietary tool owners via pull request. These pull requests are then reviewed, critiqued and sent back to the contributor for edits and corrections.

Acting as the gatekeepers of their open-source tool, the main developers have the right to control what is and is not added to their tool. They can deny contributions if they feel they are unnecessary, they can return the request with corrections for various reasons such as sloppy code or incomplete additions and they also make suggestions for the contribution to make it more useful when and if it is added to the tool.

Read full article

Article: What Are DAOs And Why You Should Pay Attention

Blockchain, Decentralized Internet

What Are DAOs And Why You Should Pay Attention

Can you imagine a way of organizing with other people around the world, without knowing each other and establishing your own rules, and making your own decisions autonomously all encoded on a Blockchain? Well, DAOs are making this real.

Some of today’s internet users and the next generations are looking forward to starting social organizations, searching for an answer to: “How can we exchange values in a trusted environment? Blockchain enables automated trusted transactions and value exchanges, but even so, internet users around the world want to organize themselves in a “Safe and effective way to work with like-minded folks, around the globe”, according to Ethereum

Article: What is open hardware?

Hardware, Open Source, Software

What is open hardware?

“Open hardware,” or “open source hardware,” refers to the design specifications of a physical object which are licensed in such a way that said object can be studied, modified, created, and distributed by anyone.

Like open source software, the “source code” for open hardware—schematics, blueprints, logic designs, Computer Aided Design (CAD) drawings or files, etc.—is available for modification or enhancement by anyone under permissive licenses. Users with access to the tools that can read and manipulate these source files can update and improve the code that underlies the physical device. They can add features or fix bugs in the software. They can even modify the physical design of the object itself and, if they wish, proceed to share such modifications.

Open hardware’s source code should be readily accessible, and its components are preferably easy for anyone to obtain. Essentially, open hardware eliminates common roadblocks to the design and manufacture of physical goods; it provides as many people as possible the ability to construct, remix, and share their knowledge of hardware design and function.

Read full article

Article: What the ephemerality of the Web means for your hyperlinks

Academia, Access, Knowledge, Media
What the ephemerality of the Web means for your hyperlinks

Linkrot and content drift at this scale across the New York Times is not a sign of neglect, but rather a reflection of the state of modern online citation. The rapid sharing of information through links enhances the field of journalism. That it is being compromised by the fundamental volatility of the Web points to the need for new practices, workflows, and technologies.

Retroactive options––or mitigation––are limited, but still important to consider. The Internet Archive hosts an impressive, though far from comprehensive, assortment of snapshots of websites. It’s best understood as a means of patching incidents of linkrot and content drift. Publications could work to improve the visibility of the Internet Archive and other services like it as a tool for readers, or even automatically replace broken links with ones to archives, as the Wikipedia community has done.

Read full article

Article: The Future of Low-Code is Open

Open Source, Software

The Future of Low-Code is Open

Low-code is at an inflection point within enterprises, as it becomes the platform of choice for digital transformation and application modernization. This is the opportunity for low-code platforms to become a key ingredient of an enterprise application architecture. An open low-code approach will allow application development teams to benefit from the underlying best practices prevalent within the organization.

Low-code is not merely a productivity tool; it has the potential to be a technological and cultural catalyst that drives enterprise innovation and business agility.

Read full article

Article: A People-Centric Approach to Securing Cyberspace

Civil Society, Cyber-Security

Colonial Cyber Attack, Ransomware Impact Raises Alarm About Internet FutureA People-Centric Approach to Securing Cyberspace

Resolving these competing visions of the digital future will be key to reining in cybercrime and defending data privacy from governments and Big Tech, but it will require the same kind of global response that precipitated the rise of the climate change activism. The truth is, if we want to save the internet from becoming the hunting ground of criminal bandits, dictators, demagogues and wealthy tech dilletantes with a political axe to grind, the public itself is going to have to take radical action.

Read full article

Article: VPNs are No More Sufficient to Protect Your Privacy on the Web

Decentralized Internet, Web 3.0

VPNs are No More Sufficient to Protect Your Privacy on the Web

Well, the reason lies in the very word that ails the freedom on the internet today — centralization. Centralized businesses manage and control the VPNs we use today. These central entities offer bandwidth to users for a premium fee, and they store their users’ data on a centralized server. Now, we all know that anything with a centralized infrastructure is highly susceptible to hacks.

It’s best to conclude by saying the same thing we started with: we are fighting a never-ending battle against cybercriminals. While in the future it may be something else, today, one of the best solutions in sight for personal security and privacy on the web seems to be a decentralized private network.

Article: The Problem with Centralized Internet

Decentralized Internet

The Problem with Centralized Internet

Internet today is about gatekeepers. For instance, if you want to access a website, it requires going through multiple middlemen. First, a domain name server, then a server hosting company, which usually directs you to a third party, i.e; a web hosting service and this happens every time you try to open a website on the internet. These gatekeepers, however, are quite vulnerable to cyber-attacks and also make censorship & surveillance very easy.

By using decentralized internet, we can make sure that the content is accessible to everyone, at all times, and without the intervention of any powerful & unjust middlemen. With this form of internet, we can also exercise our freedom and fight against censorship and unwanted surveillance.

Read full article

Article: The Metaverse, Web3, and the Inevitability of NFTs

Crypto, Web 3.0

The Metaverse, Web3, and the Inevitability of NFTs

NFTs’ astronomic rise was the culmination of the initial innovation in 2017, the steadily established infrastructure of exchanges & wallets, and macro tailwinds.

Read full article

Article: New Era Of Privacy Fostered By Decentralized Cloud: Interview With CEO Of Opacity Jason Coppola

Blockchain, Decentralized Internet

New Era Of Privacy Fostered By Decentralized Cloud: Interview With CEO Of Opacity Jason Coppola

Outrageously, data selling activities make up a fair share of profit of such tech giants as Google, Facebook, Amazon and Apple, and also fueling allegedly ‘free’ online resources like Wikipedia. This inevitably points to the fundamental flaw within the system that has to be bailed out before it becomes too late.

Right now, blockchain stands at the forefront of a revolution aiming to brush off the most inferior manifestations of the capitalistic order – and the unquenched appetite for unfair gain at the expense of individual freedom is among them. Instead, this groundbreaking technology maintains the promise of giving back the reins of control in the hands of people to whom it rightfully belongs.

Read full article