Post has attachment
Ben Smith writes: Action 1: We are shutting down Google+ for consumers.
...
Over the coming months, we will provide consumers with additional information, including ways they can download and migrate their data.

Post has attachment
Satya Nadella writes: Today, we (+Microsoft) announced an agreement to acquire +GitHub, the world’s leading software development platform. I want to share what this acquisition will mean for our industry and for developers.

Post has attachment
Think of the implications for open source development. Most projects on +SourceForge have at least one international member.

Matt Novak writes: The US Department of Homeland Security (DHS) is expanding the kinds of information that it collects on immigrants to include social media information and search results. The new policy, which covers immigrants who have obtained a green card and even naturalized citizens, will take effect on October 18th.

Post has attachment
KB Sriram, Eduardo Vela Nava, and Stephan Somogyi write: Whether they’re concerned about insider risks, compelled data disclosure demands, or other perceived dangers, some people prudently use end-to-end email encryption to limit the scope of systems they have to trust.

h/t +Google +Electronic Frontier Foundation +American Civil Liberties Union
#E2EMail #encryption #email

Post has attachment
How many of you have switched from IRC clients to Matrix clients for project collaboration?

Post has shared content
We have broken SHA-1 in practice.
http://shattered.io/
What types of systems are affected?
Any application that relies on SHA-1 for digital signatures, file integrity, or file identification is potentially vulnerable. These include:

Digital Certificate signatures
Email PGP/GPG signatures
Software vendor signatures
Software updates
ISO checksums
Backup systems
Deduplication systems
GIT
...
Update yo shit.

Old algorithms are old, and the new (open source, community audited and tested) stuff is better for a reason. Theoretical vulnerabilities become practical ones. Practical ones become scripts. Scripts get wielded by kiddies and profit-sharing criminals and governments to capture and ransom your shit, spoof your identities, fake your transactions, etc.

No one should be relying on SHA-1 by itself anymore.

Post has shared content
Robin Muilwijk writes: For the last three years, I have rounded up the most popular open source project management tools for Opensource.com readers. As there continues to be major reader interest in this area, I decided to take a look back at the tools we covered in 2014 and 2015, and give you updates on all of these projects. I looked to see which projects had new releases, notable new and improved features, and more.

h/t +Opensource.com
#SourceForge #projectmanagement #tools
Stay on top of your projects with these open source tools.

Post has shared content
David Barton writes: Enter Configuration Management
Configuration management is a solution to this problem. A complete solution provides a centralized repository that defines and documents how things are done that can be applied to any system easily and reproducibly. Improvements simply can be rolled out to systems as required. The result is that a large number of servers can be managed by one administrator with ease.

h/t +Linux Journal +SourceForge +Puppet
#SourceForge #linux #administration

Post has shared content
Ahmad Nassri writes: When I began researching how open source projects have succeeded, I realized they share a set of principles that could be considered the tenets of the open development method.

h/t +Opensource.com +SourceForge
#SourceForge #softwaredevelopment #method
"As our workforce world evolves, our software development methods should evolve, too."

Post has shared content
HTTPS on Top Sites
https://www.google.com/transparencyreport/https/grid
Security is a top priority at Google. We are investing and working to make sure that our sites and services provide modern HTTPS by default. We know that the rest of the web is working on moving to HTTPS, and for large sites the move can be challenging.
Let's encrypt all the things! Google's new report tracks how well the world is doing on encrypting the Web.
Securing the web, together
Securing the web, together
security.googleblog.com
Wait while more posts are being loaded