Open Source is Not Just About Cost

While some in the past have associated open source with cost – it’s the cheaper alternative to proprietary approaches – that’s not the point anymore. The innovation model for open collaboration enables multiple competitive vendors to co-operate on core functionality and then compete on value added support and services.

via Red Hat CEO: Open Source is Not Just About Cost – Datamation.

TreeSheets

It’s like a spreadsheet, immediately familiar, but much more suitable for complex data because it’s hierarchical.

It’s like a mind mapper, but more organized and compact.

It’s like an outliner, but in more than one dimension.

It’s like a text editor, but with structure.

Have a quick look at what the application looks like on the screenshots page, see how easy it is to use in the tutorial (out of date, the live in-app tutorial works much better!), then give it a download (above).

via TreeSheets.

Linux Group Tests

The original objective in starting the compilation was to dispel the FUD that Linux does not have the necessary software to compete with Windows. Over time, the aim of the compilation was to enable Linux users, whatever their level of computing experience, to identify software of all types that is worth exploring. With the huge range of open source software available, there is simply not enough time for users to evaluate every application even within a single category of software.

The compilation is being frequently updated and new articles added on a regular basis.

via Linux Group Tests – Part 1 – Linux Links – The Linux Portal Site.

BSA Study Demonstrates Open Source’s Economic Advantage

So what this all boils down to is that the fundamental premise of the latest BSA study – that licensed proprietary software is better in many ways than pirated copies – actually applies to open source software even more strongly, with the added virtues that the software is free to try, to use and to modify. That means the potential economic impact of free software is also even greater than that offered by both licensed and unlicensed proprietary software. It’s yet another reason for governments around the world to promote the use of open source in their countries by everyone at every level.

via BSA Study Demonstrates Open Source’s Economic Advantage – Open Enterprise.

DRBL – About

DRBL (Diskless Remote Boot in Linux) is free software, open source solution to managing the deployment of the GNU/Linux operating system across many clients. Imagine the time required to install GNU/Linux on 40, 30, or even 10 client machines individually! DRBL allows for the configuration all of your client computers by installing just one server (remember, not just any virtual private server) machine

via DRBL – About.

DRBL uses PXE/etherboot, NFS, and NIS to provide services to client machines so that it is not necessary to install GNU/Linux on the client hard drives individually. Once the server is ready to be a DRBL server, the client machines can boot via PXE/etherboot (diskless). “DRBL” does NOT touch the client hard drives, therefore, other operating systems (e.g. MS Windows) installed on the client machines will be unaffected. This could be useful in, for example, during a phased deployment of GNU/Linux where users still want to have the option of booting to Windows and running some applications only available on MS windows. DRBL allows great flexibility in the deployment of GNU/Linux.

When should you open source your code

As an organization or even individual there always seem to be questions when considering whether or not to make your project or code snippet open source. Many times, it starts with trying to figure out which license to use. But there are many other things to consider. We derived a list for you the next time you ask yourself: Should I open source my code?

via When should you open source your code? | opensource.com.

Vyatta.org Community

The free community Vyatta Core software(VC) is an award-winning open source network operating system providing advanced IPv4 and IPv6 routing, stateful firewalling, IPSec and SSL OpenVPN, and more. When you add Vyatta to a standard x86 hardware system, you can create an enterprise grade network appliance that easily scales from DSL to 10Gbps. Vyatta is also optimized to run in VMware, Citrix XenServer, Xen, KVM, and Hyper V, providing networking and security services to virtual machines and cloud computing environments. Vyatta has been downloaded over 1,000,000 times, has a community of hundreds of thousands of registered users and counts dozens of fortune 500 businesses among its commercial customers.

via Welcome to Vyatta.org | Vyatta.org Community.

On this site, you’ll find all the downloads, tools, documentation, and community resources to help you get up and running with your own Vyatta-based system. Ask questions in the Forums. Propose new features and vote on existing proposals. Participate and have fun. We have been working together with our community for over five years to continue to enhance the world’s leading software-based network OS.

Why Your Startup Should Be Open Source

Rather than staying limited to a small team perhaps even a single developer, fostering an open source community will open the doors to potentially unlimited contributions from other developers, especially ones who happen to use your software; this type of feedback is thus a great indicator of major pain points your users have with your product. Even among your users who aren’t programmers, the GitHub issues system is an incredibly useful tool for tracking bug reports and feature requests.

via Why Your Startup Should Be Open Source – by Peer.fm formerly Napster.fm | citizentekk.

Time To Set Up That Honeypot

Still not sure where to start? Take a look at the Active Defense Harbinger Distribution (ADHD) project, which is part of the Samurai family of Linux-based LiveCD distributions. ADHD provides a bootable ISO that contains the two previously mentioned tools and many others that are specifically focused on providing early warning detection of attacker activity. Some of those are more geared toward alerting, because, technically, no computers should be communicating with the honeypot so all traffic has the potential to be considered malicious.

via Tech Insight: Time To Set Up That Honeypot — Dark Reading.