In this week's edition of our open source news roundup, we take a look at Microsoft's investment in Cyanogen, U.S. government budget data on GitHub, the debut of the Raspberry Pi 2, and more! Open source news roundup: January 31 - February 6, 2015
Today there is no shortage of thoughtfully designed wearable devices promising to improve our health and quality of life, but amidst the ongoing technological deluge—do you think the future will be wearable or anti-wearable?
Open source evangelist Brian Proffitt explains open source to his father-in-law by way of book analogy. His explanation of course is open to use and improvement.
Getting started with contributing to open source can be tricky, so the following is a list of suggestions I have as a women in the community for other women and girls out there to make it easier.
Dr. Nazir Peroz (Head of the ZiiK) on rebuilding tech in Afghanistan and a new IT center at the University of Herat.
A story of working in government and the apps coming out of Code for America. Reposted via Creative Commons.
The Lean Startup is a book, a movement, and a method known by many. In short, it can be said that the Lean Startup philosophy "seeks to eliminate wasteful practices and increase value producing practices during the product development phase." But, let's take a step back and look at how it all got... Read more
There’s now an accelerating trend of businesses adopting strategies reflective of the open source way—creating new value through development of some kind of purpose-driven community committed to open exchange and collaboration, prototype-driven solutions, and "the best ideas win."
Nitish began sharing his stories with us on open source in May this year. Then, he wrote another one in June and July. In his first article, he explained how to write secure code using Open Web Application Security Project guidelines. Next, Nitish compared three giants in open source content... Read more
In my previous on article on Docker Security, I wrote that containers do not contain. In this second part, I cover the security features that have been added to Docker to attempt to control processes within a container.