Google Alert - Linux

Google
Linux
As-it-happens update March 8, 2018
NEWS
Kali Linux hit the Microsoft App Store this week. It's very nearly been reduced to a one-click install for Windows 10 users, and has clear appeal for experienced users. But if you're thinking of trying out the infamous and powerful penetration testing Linux distribution for the first time now that it's a free and ...
Google Plus Facebook Twitter Flag as irrelevant
We're interested in articles on cool projects you've done with Linux/open source/RPi, etc. We'd also like tutorials/howtos, real-world stories, articles on using FOSS to do something unusual or large-scale. Other topics to consider: IoT, machine learning, AI, containers, security, Python—really anything ...
Google Plus Facebook Twitter Flag as irrelevant
ZDNet reports this morning that Microsoft Azure's CTO believes AI and machine learning are driven by open source and the cloud, as he announced at The Linux Foundation's Open Source Leadership Summit: "AI technologies and techniques are experiencing a renaissance. Open-source technologies ...
Google Plus Facebook Twitter Flag as irrelevant
At the Open Source Leadership Summit (OSLS), the Cloud Native Computing Foundation (CNCF), which sustains and integrates open-source, cloud native technologies such as Prometheus and containerd, and Chen Goldberg, Google Cloud's director of engineering, announced that Kubernetes is the ...
Google Plus Facebook Twitter Flag as irrelevant
The Google Chrome team reported it moved Chrome 65 to the stable channel for Windows, Mac and Linux with the latest update containing 45 security fixes, with at least nine rated as "high". Chrome 65.0.3325.146, containing the patches, will be rolled out in the next few weeks, Google said and while it ...
Google Plus Facebook Twitter Flag as irrelevant
A vulnerability in Cisco Prime Collaboration Provisioning (PCP) Software could allow an unauthenticated, local attacker to log in to the underlying Linux operating system. The vulnerability is due to a hard-coded account password on the system. An attacker could exploit this vulnerability by connecting to ...
Google Plus Facebook Twitter Flag as irrelevant
See more results | Edit this alert
You have received this email because you have subscribed to Google Alerts.
RSS Receive this alert as RSS feed
Send Feedback

Popular Posts