Latest News

  • 5 Productivity Apps on Snap

    5 Productivity Apps on Snap

    5 Linux productivity apps I depend on every day, and how to install them from Snap. In fact, some of these apps are only available via Snap, a great source for so much software that may not be available to install in your native package manager. Snap packages make it possible to install applications on Read more

  • What you missed at FOSDEM 2024

    What you missed at FOSDEM 2024

    February 8, 2024 BRUSSELS — The cobblestones of Brussels are likely still humming from the frantic footwork of 8,000 Free and Open Source Software Developers’ European Meeting participants. While the coffee cups have been cleared and the beer taps silenced, the impact of this vibrant Open Source conference lingers. If you missed the chance to Read more

  • Why use Open Source LLMs?

    Why use Open Source LLMs?

    Large Language Models (LLMs) can be proprietary to a given company, or open source and free for anyone to access and modify. While proprietary LLMs are often larger, the benefits of transparency, fine-tuning, and community contributions make open source an attractive alternative. Both proprietary and open source LLMs share risks, including inaccuracies, bias, and security Read more

  • Post-Quantum Cryptography Alliance

    Post-Quantum Cryptography Alliance

    Linux Foundation launches Post-Quantum Cryptography Alliance with AWS, Cisco, IBM and others. In an open and collaborative move to address cryptographic security challenges posed by quantum computing, the Linux Foundation announced the launch of the Post-Quantum Cryptography Alliance (PQCA). The founding members of this initiative include Amazon Web Services (AWS), Cisco, IBM, IntellectEU, NVIDIA, QuSecure, Read more

  • How ACL Masks Let You Fine-Tune File Permissions

    How ACL Masks Let You Fine-Tune File Permissions

    ACL masks let you set the maximum allowed permissions for a file on Linux. Find out what they mean, and why they’re so essential. Are you using Access Control Lists (ACLs) but are confused about the concept of masks? You’re not alone. Let’s dive into this important concept by taking a look at what they Read more

  • Critical Vulnerability Affecting Distros Allows for bootkits

    Critical Vulnerability Affecting Distros Allows for bootkits

    Buffer overflow in bootloader shim allows attackers to run code each time devices boot up. Linux developers are in the process of patching a high-severity vulnerability that, in certain cases, allows the installation of malware that runs at the firmware level, giving infections access to the deepest parts of a device where they’re hard to Read more