Survey indicates four out of five developers now use open source

Summary: Forrester Research's survey shows that most developers, even ones who usually stick with Microsoft Visual Studio, are now using open source.

RALEIGH, N.C. -- At the All Things Open conference, Jeffrey Hammond, aForrester Research VP and Principal Analyst, revealed that four out of five programmers are now using, or have recently used, open source development tools.

Forrester, with Black Duck software and North Bridge Venture Partners, conducted a survey of over 1,400 programmers and found that 84 percent now use open source software. The survey includednot just programmers from open source companies but also developers from traditional proprietary companies such as Microsoft.

Why? The majority of them have switched to open source because they perceive open source development programs as having better performance and reliability. This, as Hammond observed, is a change. "Open source used to be popular because of the lower cost. Now the cost of tools is the least important element for developers."

This popularity, said Hammond,means that "open source is taking over. This is a golden age for developers." A consequence from this is that "We are now seeing open source tech compete with open source tech; it's no longer open-source software vs proprietary."

In addition, the survey reveals the three industries expected to be impacted the most by open source software are education, government, and health care. In these, and other areas, Hammond said, open source projects like Apache Tomcat, the JavaServer Pages (JSP) server, are replacing proprietary programs.

And open source is doing more than just replacing old software. It's also leading the way in new software. Hammond cited big data and NoSQL as areas where open source has become the software groundbreaker. Proprietary software doesn't really stand a chance in these new fields.

Companies are going along with this, according to Hammond, not just because of the cost savings but because they'd rather try an open source solution than deal with the hurdles of acquiring proprietary software.

The survey indicates that open source is leading in several other fields as well, includingcloud/virtualization (73 percent); Content Management Systems (CMS) (66 percent); Mobile (61 percent); Security (59 percent); and network management (57 percent).

However, while development has swung heavily toward open source on the server, datacenter and cloud, on the desktop Windows still rules. The most popular single developer desktop operating system is Windows 7. Indeed, slightly more than two out of three programmers are running Windows, while just over 12 percent use Linux and slightly less run Macs.

More:
Survey indicates four out of five developers now use open source

PrestaShop Announces New Hires to Support Ambitious Growth Plans: New Chief Revenue Officer and Chief Marketing …

Miami, FL (PRWEB) October 29, 2014

PrestaShop, an industry leader in open source software for ecommerce, today announces two executive appointments to support significant growth plans across all parts of the business. Arnaud Bourboulon joins as Chief Revenue Officer and Leah Anathan joins as Chief Marketing Officer.

As Chief Revenue Officer, Arnaud Bourboulon will lead PrestaShops worldwide sales and partner teams. Arnaud is the former Managing Director for Experian CheetahMail France. At Experian, Arnaud was responsible for managing the business transformation of CheetahMail from a pure play email solution to a market leader in cross-channel digital marketing. Prior to Experian, Arnaud spent more than 10 years in leadership positions in the mobile industry. He is the former CEO for the Swiss mobile service provider, MNC, later acquired by Alcatel-Lucent. Under Arnauds leadership the company successfully expanded into the French and US markets with customers such as Orange, SFR and T-Mobile. Prior to MNC, Arnaud was the Head of the Mobile Kiosk Business Venture at Alcatel-Lucent. Arnaud started his career as Product Marketing Director for Mobileway, later acquired by SAP.

As Chief Marketing Officer, Leah Anathan will lead PrestaShops worldwide marketing program and teams. Leah is the former Director of Corporate & Product Marketing at Emailvision. While at Emailvision, Leah led an award-winning rebrand of the company and the launch activities for multiple new products and acquisitions. During this same period, Emailvision grew revenues from $40M-80M and launched operations in over 10 countries. Prior to Emailvision, Leah spent more than 10 years at BMC Software, a $2B leader in IT software and services, where she served in multiple product marketing and product management roles in BMCs US and European operations.

"PrestaShop has one of the most widely adopted ecommerce platforms in the world. Now is the time for us to aggressively grow our business through partnerships, international expansion and growth in the user base, said Benjamin Teszner, CEO of PrestaShop. Im very pleased to have Arnaud and Leah on my leadership team. Their tremendous strategic and operational experience in the technology industry will help to take our business to a whole new level."

Since day one, I truly wanted PrestaShop to be a global company. With a product translated into 65 languages, 5 worldwide offices and a team of 20+ different nationalities, the time has come for PrestaShop to go even further. Thanks to their strong international experience, Leah and Arnaud will definitely play a key role in achieving this goal." said Bruno Lvque, Founder of PrestaShop.

Since 2007, PrestaShops open source software has been downloaded over 4 million times. Today, 200,000 ecommerce stores run on PrestaShop software. Earlier this year, the company announced that it had secured $9.3 Million in a Series B funding round led by XAnge Private Equity, Seventure Partners and Serena Capital. With a total of $15 million in funding, PrestaShop plans to accelerate product development, marketing and international expansion.

About PrestaShop

PrestaShop was founded in 2007 with a mission to provide world class ecommerce software for free through open source innovation. Today more than 200,000 ecommerce stores run on PrestaShop technology. The company provides software that enables merchants to have a fully functional online store at the lowest cost possible. The PrestaShop open source community includes 700,000 merchants, developers and web agencies from around the world. PrestaShop is the proud two-time winner of Packt Publishings Best Open Source Business Application, the winner of Europes Bsoco Award in the 2013 CMS category, and rated #1 Open Source Shopping Cart by EcommerceBytes Sellers Choice Awards in 2013. PrestaShop has offices in the US and France, and is funded by XAnge Private Equity, Seventure Partners and Serena Capital. For more information, please visit http://www.PrestaShop.com

Original post:
PrestaShop Announces New Hires to Support Ambitious Growth Plans: New Chief Revenue Officer and Chief Marketing ...

Timeline: Julian Assange sex allegations

Julian Assange following a court hearing in 2010. Photo: TT

Wikileaks founder Julian Assange is fighting extradition to Sweden where he is facing sex assault allegations. The Local looks at the key points in his case.

August 2010 - Julian Assange is in Sweden and reportedly has sex with two different women. - The Swedish Prosecutor's Office issues an arrest warrant for him following two separate allegations (one of rape and the other of molestation). - Assange denies the allegations against him.

November 2010 - Stockholm District Court approves a request to detain Assange for questioning on suspicion of rape, sexual molestation, and unlawful coercion. - Assange is not present at the questioning and Swedish police issue an international arrest warrant via Interpol.

Many of Assange's supporters have protested against his arrest. Photo: TT

December 2010 - Assange gives himself up to London police and is taken to an extradition hearing. - He is put in custody pending another hearing and latergranted bail but prosecutors appeal and he is sent back to jail until a higher court can consider the issue. - He is later granted bail and his supporters pay to have him freed for 240,000 (2,853,092 million kronor).

February 2011 - A court in south London rules that Assange should be deported to Sweden, something his lawyers appeal against the following month.

June 2012 - After the Supreme Court in London rules that Assange should be deported to Sweden to face questioning, Assange is granted political asylum at the Ecuadorian embassy in London.

Julian Assange has been living at the Ecuadorian embassy in London for two years. Photo: TT

July 2014 - Assange asks Stockholm District Court to reconsider his arrest warrant. The court says the warrant should stay in place, but Assange appeals the decision.

More here:
Timeline: Julian Assange sex allegations

cryptocurrency : The New Palgrave Dictionary of Economics

Cryptocurrency is the name given to a system that uses cryptography to allow the secure transfer and exchange of digital tokens in a distributed and decentralised manner. These tokens can be traded at market rates for fiat currencies. The first cryptocurrency was Bitcoin, which began trading in January 2009. Since then, many other cryptocurrencies have been created employing the same innovations that Bitcoin introduced, but changing some of the specific parameters of their governing algorithms. The two major innovations that Bitcoin introduced, and which made cryptocurrencies possible, were solutions to two long-standing problems in computer science: the double-spending problem and the Byzantine Generals Problem.

Until the invention of Bitcoin, it was impossible for two parties to transact electronically without employing a trusted third party intermediary. The reason was a conundrum known to computer scientists as the double spending problem, which has plagued attempts to create electronic cash since the dawn of the Internet.

To understand the problem, first consider how physical cash transactions work. The bearer of a physical currency note can hand it over to another person, who can then verify that he is the sole possessor of that note by simply looking at his hands. For example, if Alice hands Bob a $100 bill, Bob now has it and Alice does not. Bob can easily verify his possession of the $100 bill and, implicitly, that Alice no longer has it. Physical cash transfers are also final, in the sense that to reverse a transaction the new bearer must give back the currency note. In our example, Bob would have to hand the $100 bill back to Alice. Given all of these properties, cash makes it possible for different parties, including strangers, to transact without trusting each other.

Now, consider how electronic cash might work. Obviously, paper notes would be out of the picture. There would have to be some kind of digital representation of currency. Essentially, instead of a $100 bill, we might imagine a $100 computer file. When Alice wants to send $100 to Bob, she attaches a $100 file to a message and sends it to him. The problem, as anyone who has sent an email attachment knows, is that sending a file does not delete it from ones computer. Alice will retain a perfect digital copy of the $100 she sends Bob, and this would allow her to spend the same $100 a second time, or indeed a third and fourth. Alice could promise to Bob that she will delete the file once he has a copy, but Bob has no way to verify this without trusting Alice.

Until recently, the only way to overcome the double spending problem was to employ a trusted third party intermediary. In our example, both Alice and Bob would have an account with a third party that they each trust, such as PayPal. Trusted intermediaries like PayPal keep a ledger of all account balances and transactions. When Alice wants to send $100 to Bob, she tells PayPal, which in turn deducts the amount from her account and adds it to Bobs. The transaction reconciles to zero. Alice cannot spend the same $100, and Bob relies on PayPal, which he trusts, to verify this. At the end of the day, all transfers among all accounts reconcile to zero. Note, however, that unlike cash, transactions that involve a third party intermediary are not final, as we have defined it, because transactions can be reversed by the third party.

Like PayPal, the Bitcoin system employs a ledger, which is called the block chain. All transactions in the Bitcoin economy are recorded and reconciled in the block chain. However, unlike PayPals ledger, the block chain is not maintained by a central authority. Instead, the block chain is a public document that is distributed in a peer-to-peer fashion across thousands of nodes in the Bitcoin network. New transactions are checked against the block chain to ensure that the same bitcoins have not been previously spent, but the work of verifying new transactions is not done by any one trusted third party. Instead, the work is distributed among thousands of users who contribute their computing capacity to reconcile and maintain the block chain ledger. In essence, the whole peer-to-peer network takes the place of the one trusted third party.

Bitcoins solution to the double spending problem distributing the ledger among the thousands of nodes in a peer-to-peer network presents another problem. If every node on the network has a complete copy of the ledger that they share with the peers to which they connect, how does a new node connecting to the network know that she is not being given a falsified copy of the ledger? How does an existing node know that she is not getting falsified updates to the ledger? The difficult task of reaching consensus among distributed parties who do not trust each other is another longstanding problem in the computer science literature known as the Byzantine Generals Problem, which Bitcoin also elegantly solved.

The Byzantine Generals Problem posits that a number of generals each have their armies camped outside a city that they have surrounded. The generals know that their numbers are large enough that if half their combined force attacks at the same time they will take the city, but if they do not attack at the same time they will be spread too thinly and will be defeated. They can only communicate via messenger, and they have no way of verifying the authenticity of the messages being relayed. They also suspect that some of the generals in their ranks are traitors who will send fake messages along to their peers. How can this large group come to a consensus on the time of attack without employing trust and without a central authority, especially when there will likely be attempts to confuse them with fake messages?

In essence, this is the same problem faced by Bitcoins miners, the specialised nodes that verify new transactions and add them to the distributed ledger. Bitcoins solution is to require additions to the ledger to be accompanied by the solution to a mathematical problem that is very difficult to solve but simple to verify. (This is much like calculating prime factors; costly to do, but easy to check.) New transactions are broadcast in a peer-to-peer fashion across the network by parties to those transactions. Miners look at those transactions and confirm by checking their copy of the ledger (the block chain) that they are not double-spends. If they are legitimate transactions, miners add them to a queue of new transactions that they would like to add as a new page in the ledger (a new block in the block chain). While they are doing this, they are simultaneously trying to solve a mathematical problem in which all previous blocks in the block chain are an input. The miner that successfully solves the problem broadcasts his solution to the problem along with the new block to be added to the block chain. The other miners can easily verify whether the solution to the problem is correct, and if it is they add that new block to their copy of the block chain. The process begins anew with the new block chain as an input of the problem to be solved for the next block.

The mathematical problem in question takes an average of 10 minutes to solve. This is key because the important thing is not the solution itself, but that the solution proves that the miner has expended 10 minutes of work. On average, a new block is added to the block chain every 10 minutes because the problem that miners must solve takes on average 10 minutes to solve. However, if more miners join the network, or if computing power improves, the average time between blocks will decrease. To maintain the rate at which blocks are added to six per hour, the difficulty of the problem is adjusted every 2016 blocks (every two weeks). Again, the key here is to ensure that each block takes about 10 minutes to discover.

View post:
cryptocurrency : The New Palgrave Dictionary of Economics

Factbox: Bitcoin Investments

MOSCOW, September 22 (RIA Novosti) The value of Bitcoin stood at almost $400 as of Monday, September 22, with more and more people and businesses turning to the cryptocurrency because of the speed and low cost of bitcoin transactions.

Bitcoin was first introduced in 2009. Unlike the US dollar, or any other traditional currency, bitcoins aren't printed or backed by a central government. They are created by individuals and businesses using high-powered computers. Creators of bitcoins are allowed to keep some of what they create as payment for the service. The rest is sold on unregulated online exchanges.

After purchasing a bitcoin, the buyer gets two strings of numbers called a public key and a private key. For encryption and convenience purposes, the numbers are often expressed as letters and digits. The public key is the number a person must know in order to send bitcoins to a given individual. The private key is the number that only you are supposed to know. By "signing" a transaction with their private key, a user authorizes the movement of all or some of the bitcoins from their trading account, or virtual" wallet," into another.

CoinDesk, an online publication that tracks digital currencies, estimates that by the end of this year there will be eight million bitcoin "wallets," and 100,000 companies that accept bitcoins.

All bitcoin transactions are instantly published in a ledger so that anyone can keep track of the overall money supply. The ledger floats on a collaborative online document, rather than a centrally managed account. Users have adopted this mechanism for shopping, transferring money and speculation.

For users, the perceived value of Bitcoin, or any other cryptocurrency, can be compared to the price of a tool in limited supply. Demand is fueled by parties interested in peer-to-peer forms of payment that don't involve banks and other intermediaries, making such payments cheaper and faster. For investors, a cryptocurrency becomes attractive the more popular it proves to be among users.

Other virtual currencies, such as Litecoin, Namecoin, Peercoin and Ripple, have developed out of the bitcoin technology and have added improvements on that platform. Litecoin is the second-largest cryptocurrency in terms of market capitalization.

Investors don't have to mine coins or speculate on the exchanges to make money in cryptocurrencies. Some observers recommend investing in companies that use or service cryptocurrency and other peer-to-peer payment forms.

These include companies that process payments, including Colored Coins or Ripple Labs Inc., with open-source protocols that allow users to trade anything of value instantly online for virtually no cost. These companies are in the early stages of development and so, by and large, are not publicly traded.

The most notable danger associated with bitcoin transactions is fraud.

Go here to read the rest:
Factbox: Bitcoin Investments

FBI finds a ‘second Snowden’

WASHINGTON, Oct. 28 (UPI) -- An unidentified "second leaker," after Edward Snowden, is under investigation for disclosing sensitive intelligence secrets.

A suspect under investigation allegedly passed information regarding the U.S. government's terrorist watch list to The Intercept, a news website associated with Snowden, Yahoo News reported Monday. It added law enforcement and intelligence sources said the FBI searched the Virginia home of a government contractor who is believed to have disclosed sensitive information regarding the Terrorist Identities Datamart Environment; they added a criminal investigation has begun in the matter.

Details of the watch list obtained from Snowden, published on the Intercept, were dated August 2013, months after the website first published information obtained from Snowden, a former NSA contractor. It fostered speculation of the existence of a second person providing the website with information, Yahoo News said.

U.S. Department of Justice spokesman Marc Raimondi reportedly commented, "Investigators are continuing to pursue it (the case against the alleged second leaker), but are not ready to charge yet."

Existence of a second person who allegedly turned over sensitive material to reporters was mentioned in the documentary film Citizenfour, directed by The Intercept co-founder Laura Poitras, released last week. The film reportedly shows Snowden excited to learn of a new leak in U.S. intelligence.

The film suggests the second leaker provided Snowden with information outlining "the rulebook for placing people on a variety of watch lists," The Intercept journalist Jeremy Scahill reportedly in an interview on the radio program "Democracy Now" last week. Scahill reportedly added the source is "an extremely principled and brave whistleblower," the International Business Times reported Tuesday.

2014 United Press International, Inc. All Rights Reserved. Any reproduction, republication, redistribution and/or modification of any UPI content is expressly prohibited without UPI's prior written consent.

More:
FBI finds a 'second Snowden'

Documentary on Snowden Debuts in U.S. Theatres

SAN FRANCISCO: "Citizenfour," a documentary about former U.S. intelligence operative Edward Snowden, garnered praise and criticism in its debut at U.S. theatres, while the U.S. remains divided between those who consider him a hero and others who call him a traitor.

The movie, directed by U.S. journalist Laura Poitras, opens with a blurred image of a tunnel filmed from a moving vehicle.

Poitras, who now lives in Berlin, explains how authorities started stopping her routinely at U.S. airports when she took on producing documentaries about government abuses, and recalled how she got an anonymous e-mail from an individual using the "citizenfour" screen name in 2013.

"You ask me why I chose you. I didn't. You did," the director, who is not seen on the screen, reads in a voiceover of one of the messages she received from Snowden.

Snowden, who obtained temporary asylum in Russia after a massive disclosure of National Security Agency's confidential and secret documents, invited Poitras and American journalist Glenn Greenwald to meet him in Hong Kong to tell them about the U.S. government's surveillance of private citizens and foreign countries.

Audiences can see how this meeting evolved between June 3 and 10, 2013, in room 1014 of the Hong Kong Mira Hotel.

"Citizenfour" describes Snowden's "courage and idealism" when confronted with the dark and malicious powers hunting him, which led The New York Times to label the documentary "biased and partisan", an opinion shared by New York Magazine critic David Edelstein.

The Times noted that a number of journalists who cover subjects such as national security and technology, like Fred Kaplan of Slate magazine, and Michael Cohen, a former Guardian reporter, have also criticised "omissions and simplifications" in Poitras's film.

Criticism aside, The Times said "Citizenfour" highlights, as few films have done so far, the invisible and ubiquitous presence of the modern state, a leviathan endowed with far-reaching coercive resources.

The film reveals that Snowden's girlfriend, who lived with him when the then contractor for the NSA gathered the documents, has joined him in Russia.

Continued here:
Documentary on Snowden Debuts in U.S. Theatres