End-to-End Encryption Chat App Threema Will Go Open Source – TechNadu

The Threema app has announced that the startup phase is over, and the company is now partnering with the investment company Afinum Management AG. At the same time, they are now initiating the next stage of the project, which is to go open source and also to support the use of the software on multiple devices in parallel (syncing). This is very close to what Signal does, so Threema is entering a space dominated by others, but with amazing credentials and good chances of success.

Threema is one of the most secure and privacy-minded chat apps out there, allowing users to stay completely anonymous, leaving minimal traces on the server infrastructure, and featuring an always-on end-to-end encryption. However, the fact that the clients code was proprietary remained a source of criticism from the community, as preventing people from being able to review your code is a sure way to maintain uncertainty about whats really going on.

Of course, that is not to say that all closed-source software projects arent to be trusted. The main reason why companies like to keep their products code proprietary is to stay ahead of the competition, prevent the copying of features or their uniquely smart implementation, and generally maintain an advantage in the market. Open sourcing the code, though, wins peoples trust overnight and also boosts security by naturally expanding the code reviewing and bug reporting process.

Releasing the clients code also means that people will be free to use it to create forks, just like what happens with Telegram, but this shouldnt be an issue for Threema. After all, one would have to operate a supporting infrastructure and gradually win user trust to have them make the leap. Threema already has several millions of users and is deployed in over 3,000 companies and organizations, so were talking about a well-established project.

The relevant announcement gives a timeline for the open-sourcing of the code, taking place over the next months. As that happens, more and more people who are currently using Signal, Wickr, or Telegram will give Threema a go, so we expect the app to rise in popularity by the end of the year. The big differentiating element it brings over the other options in this market is that a user may create an account without using a phone number.

Another cool thing that was recently added on Threema is support for E2EE video calls, which is a hot topic these days.

Read the original here:
End-to-End Encryption Chat App Threema Will Go Open Source - TechNadu

Verizon tunes up quantum-based technology trial in Washington D.C. to bolster security – FierceTelecom

In order to better keep communications safe and secure from hackers, Verizon recently conducted a trial of quantum key distribution (QKD) in Washington D.C. Verizon said the successful trial positioned it as one of the first carriers in the U.S. to pilot the use of QKD.

Quantum cryptography could provide a solution for the vulnerability of current cryptographic key implementations. Today, cryptographic techniques encrypt data using a secure key, which is only known to the parties using that key for decrypting the messages between them.

Those cryptographic techniques for key generation are based on highly complex mathematical problems that require long calculations to be resolved. With the growth of computational capacity, the time required to solve these problems becomes shorter, which reduces the security of the keys.

Like this story? Subscribe to FierceTelecom!

The Telecom industry is an ever-changing world where big ideas come along daily. Our subscribers rely on FierceTelecom as their must-read source for the latest news, analysis and data on the intersection of telecom and media. Sign up today to get telecom news and updates delivered to your inbox and read on the go.

With the advent of quantum computers, the principles of quantum mechanics could be applied to break the keys used in today's security implementations. By contrast, QKD could be applied to exchange a key between the two ends of a communication. QKD provides protection against the threat posed by quantum computing to current cryptographic algorithms and provides a high level of security for the exchange of data.

RELATED: Telefnica, Huawei trial quantum cryptography on optical network using SDN

Two years ago, Telefnica and Huawei conducted a successful field trial of quantum cryptography on commercial optical networks by using SDN.

In Verizon's QKD trial, live video was captured outside of three Verizon locations in the D.C. area, including the Washington DC Executive Briefing Center, the 5G Lab in D.C and Verizons Ashburn, Virginia office. Using a QKD network, quantum keys were created and exchanged over a fiber network between Verizon's locations.

In the trial, video streams were encrypted and delivered more securely allowing the recipient to see the video in real-time while instantly exposing hackers. A QKD network derives cryptographic keys using the quantum properties of photons to prevent against eavesdropping.

Verizon also demonstrated that data could be further secured with keys generated using a Quantum Random Number Generator (QRNG) that, as the name suggests, creates random numbers that cant be predicted. With QKD, encryption keys are continuously generated and are immune to attacks because any disruption to the channel breaks the quantum state of photons, which signals that eavesdroppers are present.

"The use of quantum mechanics is a great step forward in data security, said IDC Analyst Christina Richmond, in a statement. Verizon's own tests, as well other industry testing, have shown that deriving 'secret keys' between two entities via light photons effectively blocks perfect cloning by an eavesdropper if a key intercept is attempted.

"Current technological breakthroughs have proven that both the quantum channel and encrypted data channel can be sent over a single optical fiber. Verizon has demonstrated this streamlined approach brings greater efficiency for practical large-scale implementation allowing keys to be securely shared over wide-ranging networks.

Go here to see the original:
Verizon tunes up quantum-based technology trial in Washington D.C. to bolster security - FierceTelecom

Impact of Corona on Cloud Encryption Software Market : What are the key opportunities? – The News Brok

The globalCloud Encryption Software Marketis carefully researched in the report while largely concentrating on top players and their business tactics, geographical expansion, market segments, competitive landscape, manufacturing, and pricing and cost structures. Each section of the research study is specially prepared to explore key aspects of the global Cloud Encryption Software market. For instance, the market dynamics section digs deep into the drivers, restraints, trends, and opportunities of the global Cloud Encryption Software market. With qualitative and quantitative analysis, we help you with thorough and comprehensive research on the global Cloud Encryption Software market. We have also focused on SWOT, PESTLE, and Porters Five Forces analyses of the global Cloud Encryption Software market.

Leading players of the global Cloud Encryption Software market are analyzed taking into account their market share, recent developments, new product launches, partnerships, mergers or acquisitions, and markets served. We also provide an exhaustive analysis of their product portfolios to explore the products and applications they concentrate on when operating in the global Cloud Encryption Software market. Furthermore, the report offers two separate market forecasts one for the production side and another for the consumption side of the global Cloud Encryption Software market. It also provides useful recommendations for new as well as established players of the global Cloud Encryption Software market.

To know How COVID-19 Pandemic Will Impact Cloud Encryption Software Market/Industry -Request sample copy of this report:https://www.reporthive.com/request_sample/2452489

Major Players:

GemaltoHPEIBMMicrosoftSymantecThales E-SecurityCiphercloudNetskopeTrend MicroParablu

Segmentation by Product:

Collaborative product data management (cPDM)Computer-aided design (CAD)Digital manufacturing (DM)

Segmentation by Application:

BFSIManufacturingHealthcareGovernment

Regions and Countries:U.S, Canada, France, Germany, UK, Italy, Rest of Europe, India, China, Japan, Singapore, South Korea, Australia, Rest of APAC, Brazil, Mexico, Argentina, Rest of LATAM, Saudi Arabia, South Africa, UAE.

Report Objectives

For More Information or Query or Customization Before Buying, Visit at -:https://www.reporthive.com/request_customization/2452489

Table of Contents

Report Overview:It includes major players of the global Cloud Encryption Software market covered in the research study, research scope, and Market segments by type, market segments by application, years considered for the research study, and objectives of the report.

Global Growth Trends:This section focuses on industry trends where market drivers and top market trends are shed light upon. It also provides growth rates of key producers operating in the global Cloud Encryption Software market. Furthermore, it offers production and capacity analysis where marketing pricing trends, capacity, production, and production value of the global Cloud Encryption Software market are discussed.

Market Share by Manufacturers:Here, the report provides details about revenue by manufacturers, production and capacity by manufacturers, price by manufacturers, expansion plans, mergers and acquisitions, and products, market entry dates, distribution, and market areas of key manufacturers.

Market Size by Type:This section concentrates on product type segments where production value market share, price, and production market share by product type are discussed.

Market Size by Application:Besides an overview of the global Cloud Encryption Software market by application, it gives a study on the consumption in the global Cloud Encryption Software market by application.

Production by Region:Here, the production value growth rate, production growth rate, import and export, and key players of each regional market are provided.

Consumption by Region:This section provides information on the consumption in each regional market studied in the report. The consumption is discussed on the basis of country, application, and product type.

Company Profiles:Almost all leading players of the global Cloud Encryption Software market are profiled in this section. The analysts have provided information about their recent developments in the global Cloud Encryption Software market, products, revenue, production, business, and company.

Market Forecast by Production:The production and production value forecasts included in this section are for the global Cloud Encryption Software market as well as for key regional markets.

Market Forecast by Consumption:The consumption and consumption value forecasts included in this section are for the global Cloud Encryption Software market as well as for key regional markets.

Value Chain and Sales Analysis:It deeply analyzes customers, distributors, sales channels, and value chain of the global Cloud Encryption Software market.

Key Findings:This section gives a quick look at important findings of the research study.

About us:

Our research base consists of a wide spectrum of premium market research reports. Apart from comprehensive syndicated research reports, our in-house team of research analysts leverages excellent research capabilities to deliver highly customized tailor-made reports. The market entry strategies presented in our reports has helped organizations of all sizes to generate profits by making timely business decisions. The research information including market size, sales, revenue, and competitive analysis offered, is the product of our excellence in the market research domain.

Read the original:
Impact of Corona on Cloud Encryption Software Market : What are the key opportunities? - The News Brok

How to protect the data on your laptop – British GQ

It's likely that your whole life is on your laptop: your financial records, your plans for the future, your entire photo and video library, your company's sales reports, and so on and so on. What you don't want is anyone else gaining unauthorised access to it, or more importantly, to all that data.

The good news is that both Windows and macOS make it easy to lock down your laptop and stop unwelcome visitors from getting into your files. The following steps are not difficult, and you should make sure you set aside time for them.

Make sure you have your own user account set up on your laptop, even if you're the only one who uses itnot only will this keep the kids from messing up your browser bookmarks when they want to play games, it'll also stop anyone else from accessing it. Even if your laptop gets stolen, if there's a password-protected user account on it, there's not much a thief can do beyond resetting it and wiping the data.

Microsoft and Apple know it's important, so you'll find it difficult to set up a new laptop without a user account, but avoid sharing accounts with other people or leaving them unprotected. You can manage user accounts from Accounts in Settings in Windows (via the cog icon on the Start menu), or from Users & Groups in System Preferences (under the Apple menu) on macOS.

Know the options for signing into your laptop and use them wisely.

Screenshot: Microsoft via David Nield

The usual rules about passwords and PINs apply here: Make sure you use a password or a code that no one else is going to be able to guess (but that you're never going to forget), and avoid reusing passwords that you already use on your other digital accounts. You should also tell your laptop to revert to the lock screen after a short period of inactivity. To turn this on, head to Accounts and Sign-in options in Windows Settings, and Security & Privacy and General in macOS System Preferences.

Both Windows and macOS now support biometric authentication for user accounts on laptopsfingerprints and facial recognitionso make use of these features where they're available. They're not an excuse to forget your main account password through, as you'll still need this in certain situations (such as when you restart your laptop, or when you need to make significant changes to the system).

Encryption is (usually) now enabled by default on both Windows and macOS laptops, though it might not be in place on older computers. It essentially makes the data on your hard drive appear scrambled if you don't log into the laptop in the normal waythis means it's much harder for someone to pull the disk drive out of your computer and access the files that are stored on it.

If your Windows laptop is relatively new, it should already have encryption turned on. You can check by clicking the cog icon on the Start menu to get to Settings, then clicking Update & Security and Device encryptionif the encryption option is available but isn't turned on, you can do that from here (follow the instructions to complete the process).

MacBooks will usually apply encryption when you set them up for the first time, unless you specifically opt-out. To make sure encryption is in place, open the Apple menu, then choose System Preferences, Security & Privacy, and FileVaultif FileVault hasn't been enabled on your laptop for whatever reason, then you can turn it on here. Follow the instructions to protect your data using the password associated with your Apple ID.

For an extra level of protection for certain files and folders, you can install a third-party encryption tool as well. This is useful for locking down data stored on external hard drives, for example, or that gets synced across various cloud storage services. VeraCrypt is one of the best options for Windows and macOS, and it's open-source and free to use.

Don't neglect the various protections that are available for specific apps eitherif someone else guesses your password, gets access to your computer when you've stepped away, or borrows your computer with your permission, then this additional security measure will be all that's standing between them and your data.

Different programs come with different options: We can't cover them all here, but just be aware of what's available. In the current Microsoft Office apps, for example, you can add password protection to your documents, spreadsheets and presentations by choosing File, Info, Protect Document and Encrypt with Password (Windows) or Review, Protect and Protect Document (macOS).

There's a similar option available if you use the Pages, Numbers, and Keynote applications that come as part of macOSyou just need to choose File and Set Password to add the protection. As an added bonus, putting a password in place in any of these programs also encrypts the file, so no one will be able to access the data inside without the password.

The Apple Notes program that comes as part of macOS is another utility that has a password protection feature. To lock a note, choose File and Lock Note, then enter a password of your choicejust make sure that it's something that you're going to remember because you won't be able to get back into the note without it.

If the worst should happen and your laptop falls into the wrong hands, then both Windows and macOS come with tools that will let you find your computer on a map and lock it remotely. We wouldn't recommend tracking down the person who has it without the help of the authorities, but locking your laptop or clearing it of any sensitive information (which is available on macOS) is definitely a good idea.

On Windows, go to Update & Security in Settings, then choose Find my device and make sure the feature is enabled. If you and your laptop should become separated, log into your Microsoft account on the web and click Devices then Find My Device. You can't wipe your device remotely when it comes to Windows, but you can at least lock it so that it can't be accessed without a password.

On macOS the feature is called "Find My," but you need to make sure you've enrolled your Mac into the Find My service firstfrom System Preferences, choose Apple ID, then iCloud, then click Options next to Find My Mac. As long as the Find My Mac entry in the list is ticked, you'll be able to locate your laptop.

You'll find Find My as an app on your iPhone or iPad, if you have one, and you can also get at it though iCloud on the web. You can lock a MacBook remotely, or completely erase everything on it, or mark it as lost (which displays a custom message on screen if you want to try and get it back, as well as muting incoming notifications on the laptop).

NOW READ

Best smartphones for the ultimate upgrade

Best tablets for Netflix, gaming, art and everything

The best tech gifts for gadget geeks

Read the original here:
How to protect the data on your laptop - British GQ

Cloud Encryption MARKET 2020 BY MANUFACTURERS, REGIONS, TYPE AND APPLICATION, FORECAST TO 2027 – Scientect

A research report on theCloud Encryption Market 2020is being published by CMI. This is a key document as far as the clients and industries are concerned to not only understand the competitive market status that exists currently but also what future holds for it in the upcoming period, i.e., between 2020 and 2027. It has taken the previous market status of 2013 2018 to project the future status. The report has categorized in terms of region, type, key industries, and application.

Major Geographical Regions

The study report on Global Cloud Encryption Market 2020 would cover every big geographical, as well as, sub-regions throughout the world. The report has focused on market size, value, product sales and opportunities for growth in these regions. The market study has analyzed the competitive trend apart from offering valuable insights to clients and industries. These data will undoubtedly help them to plan their strategy so that they could not only expand but also penetrate into a market.

Were ready to celebrate the upcoming International Youth Day with a discount offer for real buyers. Apply CMIFIRST1000 coupon code SAVE 1000USD

The downloadable PDF brochure consists of a table of contents, a research framework, and a research method.

Get a free PDF brochure: https://www.coherentmarketinsights.com/insight/request-pdf/1344

The main players in this Cloud Encryption market are: Cipher Cloud Inc. (U.S.), Hytrust Inc. (U.S.), Gemalto N.V. (the Netherlands), IBM Corporation (U.S.), Secomba GmbH (Germany), Sky-high Networks Inc. (U.S.)., Sophos Group Plc. (U.K.), Vormetric (U.S.), Boxcyrptor (U.S.), Viivo, Wave System, Symantec Corporation (U.S.), and Thales e-Security Corporation (France).

What Our Report Offers:

The research provides answers to the following key questions:

Note The Covid-19 pandemic is impacting society and the overall economy across the world. The impact of this pandemic is growing day by day as well as affecting the supply chain. The COVID-19 crisis is creating uncertainty in the stock market, massive slowing of supply chain, falling business confidence, and increasing panic among the customer segments. The overall effect of the pandemic is impacting the production process of several industries. This report on Cloud Encryption Market provides the analysis on impact on Covid-19 on various business segments and country markets. The reports also showcase market trends and forecast, factoring the impact of COVID -19 Situation.

Apply the promo code CMIFIRST1000. Save $1000 and Get a Premium Report Sample for FREE

Buy this research report now @https://www.coherentmarketinsights.com/insight/buy-now/1344

About Coherent Market Insights:

Coherent Market Insights is a prominent market research and consulting firm offering action-ready syndicated research reports, custom market analysis, consulting services, and competitive analysis through various recommendations related to emerging market trends, technologies, and potential absolute dollar opportunity.

Contact Us:

Name: Mr. Raj Shah

Phone: US +12067016702 / UK +4402081334027

Email:[emailprotected]

Visit Our Blogs: https://www.coherentmarketinsights.com/blog/

Original post:
Cloud Encryption MARKET 2020 BY MANUFACTURERS, REGIONS, TYPE AND APPLICATION, FORECAST TO 2027 - Scientect

Mintegral SDK Going Open-Source For Increased Transparency And Security – PRNewswire

BEIJING, Sept. 4, 2020 /PRNewswire/ --Following recent allegations raised about the ad data collected by the Mintegral SDK, Mintegral has announced its SDK will officially become open-source. While Mintegral denies recent allegations, the move to open-source the SDK is seen as a way to increase transparency within the ad-tech industry and provide complete visibility into its inner workings.

The move to open-source SDK

Mintegral's move to open-source SDK allows mobile developers access to learn exactly how it works, without any concerns around unwanted code and/or functionality. Since everyone will be able to access it (and improve upon it), this will make the Mintegral open-source SDK more secure. In turn, it will be easier and faster to identify & address any risk as the SDK will undergo constant review by the mobile community.

Open-source SDK is the future

Moving to open-source SDKs benefits the whole mobile ad industry, by providing its customers and end-users with increased transparency and security, while further emphasizing features like speed, quality, and customizability. With this move, Mintegral is also encouraging other members of the mobile industry to do the same in order for the entire advertising ecosystem to thrive.

"We are about to move our industry-leading SDK to an open-source environment, and I am excited about the possibilities that come with it, not just for our team, but for all our partners, and ultimately everyone in the mobile ad industry. I believe transparency is a crucial tool towards a stronger and safer industry, and we will work hard to make sure that our partners and our clients will constantly benefit from the highest transparency and security standards available," said Erick Fang, Mintegral CEO.

As the industry demands more transparency from its players, Mintegral believes it's important to provide full clarity around the SDK and its capabilities. As a COPPA-certified member, and fighting ad fraud with the adoption of App-Ads.txt; to getting open measurement SDK certification from IAB Tech Lab and adding support for Sellers.json and Supply Chain Object, Mintegral has always been a major advocate for data privacy, security, and transparency.

What's next?

Mintegral plans on rolling out the open-source SDK within the next week and will notify their partners and clients as soon as such changes have been made. Mintegral will also release a breakdown of how the SDK operates in a future article. For more news regarding this matter, clients are welcome to reach out to the Mintegral team or follow news through the Mintegral blog.

Contact: [emailprotected]

SOURCE Mintegral

https://www.mintegral.com/en/

Excerpt from:

Mintegral SDK Going Open-Source For Increased Transparency And Security - PRNewswire

Four Out of Eight Doesn’t Cut It: The IP Safeguards that Most Lawyers Miss When Protecting Software – IPWatchdog.com

Eight safeguards are essential for a full, robust software protection regime. [But most lawyers] only learned about four of them in law school. In todays world, lawyers need to go beyond law school and include real-world, practical solutions to augment the legal protections that are their bread and butter.

Software is an extremely valuable good for those who produce it because it provides value to the softwares end users. That value, however, also makes it a target for those who would prefer to obtain the value without compensating the software producer. As a result, like with any valuable asset, software suppliers and Internet of Things (IoT) companies must implement safeguards to protect it. Since software is intellectual property, attorneys who work for or advise software producers (which, lets be honest, is just about every technology company these days, given the addition of hardware manufacturers via the ubiquity of their smart devices to the existing desktop, mobile, and SaaS applications that we all use in both our personal and business lives), are frequently asked to advise on how to best protect this valuable asset. Unfortunately, as discussed below, most lawyers only deliver half of what they should.

Eight safeguards are essential for a full, robust software protection regime. Despite that, most lawyers talk about only four of them. In their defense, they only learned about four of them in law school, which is why thats their go-to advice. But in todays world, lawyers need to go beyond law school and include real-world, practical solutions to augment the legal protections that are their bread and butter. This article will review all eight, but the bulk of the discussion will illustrate the importance and usefulness of the four less-frequently discussed methods.

The first four methodswhich lawyers already know about and take action onfocus on protecting software from a purely legal perspective:

While each legal protection discussed above is great and must be considered, the truth is that the best outcome for the software producer is when they never have to rely on the legal protections at all. Enforcing legal rights is expensive, time consuming and distracting to a software producer that would much rather focus on developing the next product instead of defending the last one. How do you do that? How do you avoid having to actually rely on the legal protections we just laid out? By using technology to prevent the software from being misused or overusedintentionally and unintentionallyin the first place. Below are some practical solutions your clients can deploy:

The final software protection strategy is less about protection of the software producers rights; its more related to solidifying the foundation of the software producers products. Most commercial code today relies to some degree (and often to a great degree) on the use of open source software components. Open source software, as referenced above, is code developed by third parties and then incorporated into a software producers final product. While theres usually no fee charged by the open source provider, the open source code is subject to contractual requirements. Given that this whole article is about how to protect your clients software from misuse, it would be ironic if your client then failed to take the necessary steps to ensure it didnt misuse open source software! Unfortunately, open source software is unmanaged by most companies. On average, most software producers are aware of and manage a mere 5% of the open source software used in their products. Failure to fully document and understand open source usage and to comply with relevant obligations can undo all of the careful work taken through the first seven safeguards above.With this in mind, the final safeguard is:

In 1941, baseballs Ted Williams of the Boston Red Sox finished the season with a .406 batting average, meaning he successfully reached base in .406 of his at bats. In the 79 years since, no one has equaled that feat, heralded as one of baseballs unbreakable records. While thats impressive, it means Mr. Williams failed almost 60% of the time! In the world of software protection, the good news is that most lawyers are out-hitting Ted Williams, usually deploying 50% of the protection schemes available to them. The bad news: 50% isnt cause for celebration. Using the additional four practical protections discussed above is what will provide a comprehensive approach to protecting software. Eight out of eightthats something to celebrate.

Image Rights acquired by 123RF.com

Marty Mellican is Vice President and Associate General Counsel at Revenera (formerly known as Flexeras Supplier Division).

Visit link:

Four Out of Eight Doesn't Cut It: The IP Safeguards that Most Lawyers Miss When Protecting Software - IPWatchdog.com

Q&A: Open Source advocate David Strejc on why the Czech IT industry is so overpriced – Expats.cz

When the initial wave of news regarding the coronavirus crisis and response from the Czech government first came out back in March, Expats.cz experienced a surge in traffic that saw our numbers balloon to record highs at peak times. Our news server couldnt handle the volume, and immediately crashed as the traffic spiked.

Thankfully, we had the right support on hand: David Strejc of WPDistro, a Prague-based developer who specializes in WordPress and open source solutions. Since migrating to WPDistros servers six months ago, our news site hasnt seen any downtime at all.

David is also a long-term advocate of Open Source software solutions, and provides the CRM system AutoCRM, which builds upon a solution used by more than 50,000 companies worldwide.

We recently spoke with David about the Information Technology sector in the Czech Republic, how it compares to the rest of the world, and whats in store for the future.

Hi David! Whats your IT background and expertise?

Im a long-term IT guy, currently 16 years in the IT business. Ive worked for two telco providers, O2 and T-Mobile, as IT Architect and Senior Solution designer, respectively, established the company Easy Software with my partners, and sold my share in it. They are currently providing SaaS around the globe for more than 3000 companies. I was an IT Architect, CTO there.

What about IT here in the Czech Republic?

On one side we are the fifth biggest software producer in terms of absolute numbers here in the Czech Republic. Companies like Red Hat and others rely on Czech programmers. We are second in some programming skill tests sometimes behind Slovaks. We have great people in IT, highly-skilled, hard-working.

On the other hand, we are four years behind actual trends in US.

How can this be?

There is huge difference between the IT sector, and companies which are IT product consumers. Take an average factory or a classic office, for example. They still mentally live in 90s. And many producers of software here in the Czech Republic make software designed for this kind of mentality. Updates come twice a year, no one answers your email for more than a week, and no one picks up your urgent call for support.

What do you think of world trends in IT compared to the Czech Republic?

Take companies like Facebook, Google, and now even Microsoft. We live in crazy times where the current trend is to deploy software changes, security patches, new features and so on in matter of days. Sometimes daily. Even more. This is called CI/CD. Continuous integration, continuous deployment.

Is this what makes IT/ICT so expensive to have skilled people pushing code so quickly to production?

Actually, it is not. It is the opposite. The extreme overpricing of IT here in the Czech Republic, and other countries too, is due to the duplication of work.

Take for example CRM or ERP systems. There are dozens of them. Even here in the Czech Republic we have nearly 50 well-established companies producing the same solutions. And all of them are producing the same thing, reinvented 50 times. Multiply those 50 software solutions by 1020 programmers each, and you get extreme monthly costs.

Isnt that OK? Isnt software about freedom of choice?

Exactly. But when you buy one of those solutions you are done. Your freedom of choice ends when you implement one of these classically-produced software solutions. We have a great example here in the Czech Republic where our Ministry of Finance has a nearly 30-year-old software yes, you read that correctly financing bureaus thanks to old contracts with IBM who didnt bother to give us permission to use their software without them again, you read it correctly. It is still their software due to their policy we cant simply switch to another supplier.

And it is the same with nearly all of those classic Czech software producers. Duplicating work, catching their customers into a vendor-locking net like fish, and than like parasites draining money from them for every patch, every software update, every overpriced feature. Once you are caught you can say goodbye to your IT freedom. Those companies need the money to feed their highly overpriced programmers who are duplicating the same functions as their competitors.

And this leads to high prices for the end consumer.

Its a classic case of reinventing the wheel. But many, many, many times over. And you need many, many, many inventors.

And the HR market is happy. Programmers and IT guys cost a lot of money, HR takes them as resource/product and delivers them into company where they last for two years, and then they move to another one. Job companies are happy, programmers are happy they ask for more and more. The only unhappy one is the final customer who comes from outside of the IT sector.

Not only is the final product highly overpriced, but the customer is also locked into the vendor, and this staffing fluctuation in the IT industry causes even more trouble. Because Franta, lead programmer at ABC Softcorp s.r.o., is suddenly gone. And no one knows what exactly this function is for, or how we will solve that, and now we have to rename half of our code because it is written in Czech yes, this is still the case, they are naming variables in the Czech language.

Is there an alternative? How is IT made in other countries, like the US?

These days, my long-term predictions are coming true. For 16 years I have been an Open Source advocate. Not because of the price. Not because of the security (it can be proven that OSS is more secure than classic software take OpenBSD for example), not because I can dig into code, but because of the resources. Because when we compete too much, we destroy, we die.

Companies like Facebook, Google, LinkedIN and many many others based in US now even Microsoft, who loves Linux and Open Source they have discovered that IT is such a different area, that we can produce software that even competitors collaborate on.

Give us an example.

Engineers at Red Hat are producing an Open Shift platform for development, for example. And their customers have dedicated teams of their own engineers sitting in offices or home offices patching, debugging, and improving this huge platform. So customers are helping with their time, money, project management and all that stuff to have better software from their supplier.

And this is across the entire modern IT world. My old way of doing things in Unix way is now becomes a reality. IT companies who compete and try to destroy their competitors like here in the Czech Republic will die out. Companies that support each other will produce more complex, more stable solutions for less money which is Open Source software in many cases. MariaDB, which is OSS, says they can replace Oracle, which costs $50,000 for one core per year.

Are there any other advantages of OSS?

You can say, I dont like you anymore, producer of ABC OSS software. I will take Youngsters Ltd. they know what they are doing, they are young and full of energy. They pick up my phone after one ring, they answers my emails immediately. And the OSS producer cant say: you cant do that, it is our licensed software which we are only leasing you. Everything is ours. No Youngsters Ltd. will take over support and development of the new features. But a whole community of developers is contributing to bug fixes, feature requests, and deciding the best plan for this ABC OSS software.

You dont have to use Microsoft SQL or Oracle which only adds expenses for no value. MariaDB clusters are now used even in mission-critical areas of the banking industry. Facebook runs the biggest cluster of MySQL databases in the world. Imagine what Facebooks bills for Oracle would be if they were using it.

Youve mentioned Facebook do you like what theyre doing?

I am not big fan of social networks, but I am big fan of the philosophy. Unix is more of a philosophy than only a software. It is way of doing things. And I love it. Facebook has inspired me in many ways. They produced the first versions of Facebook using PHP programming language (which many so-called skilled programmers hate) and have used MySQL databases from beginning. Craziness? I dont think so. PHP programmers were many times cheaper, had more availability, and were easier to hire.

Cheaper and more effective. Open Source from beginning. Even now Facebook produces Open Source software and gives it to public, such as React and many others that are not as well known.They alsocreated the Open Compute Project. They give out designs and plans for hardware, servers, racks and so on.

And this is the philosophy of Open Source, Unix, and original hacker culture. Do it for fun. Do it for the lowest available cost, because we live in agile world and we want to see proof of concept in the shortest available time. We dont want to wait year or two the whole industry can shift somewhere else. We want a software solution now so we can put our hands on it and tweak it to fit our needs.

This sounds like an entirely different approach to producing software.

Its actually very old concept. But when Microsoft, Oracle and others took over the industry in 80s and 90s with their waterfall methods and postponing of releases, planing years ahead they changed peoples perspectives. Now, pure technology is winning over overpriced business. In 2019, CNBC produced a video about Open Source software taking over whole industry.

Are you afraid of Open Source? Do you consider it unsecure? You are using it daily. Its in your pocket in the form of Android or iOS. When you are browsing web using Chrome or Firefox as a user and on the other side there is Apache or Nginx, which are both Open Source. More than 60% of virtual machines on Azure are Linux, Facebook runs on MySQL clusters, Google has put their container platform Omega into public form in Kubernetes, every last one of the top 500 supercomputers in the world runs Linux. The current zeitgeist is Open Source.

And do you produce Open Source in your current company?

We focus on the harder part of Open Source. We provide support, writing the little pieces of code which are not yet available because we are mainly working with WordPress, which is a great example of Open Source taking over the world. WordPress is powering 38% of the top 10,000 websites in the world. It actually powers more than 35% of entire web industry in the world. And its still growing.

This is great example of many developers collaborating on one platform. Microsoft uses WordPress on their news.microsoft.com, Facebook uses it on about.fb.com, the White House is using it, The New York Times, Tech Crunch, and many other big brands.

The advantages are obvious. You can instantly hire a developer who is familiar with the code, with the principles, with the documentation and culture. Web administrators in companies are familiar with the interface they are working in. If your supplier, which can be even us, doesnt suit your communication style, you can search Google for new one and find them in two minutes.

Is WordPress the only solution you specialize in?

We focus on bigger e-commerce sites and lets say high-end WordPress websites for now. But we find our company brain elsewhere. We have a great Open Source CRM software that is enormously powerful in matters of flexibility, speed, software philosophy (it is headless, so it can easily be connected with any other application through REST API). Right now we are building a website to offer this solution to other companies here in the Czech Republic and around Europe.

For more information about WPDistro, and how they can help your online business, visit their official website.

More:

Q&A: Open Source advocate David Strejc on why the Czech IT industry is so overpriced - Expats.cz

Threema encrypted messaging apps will soon be open source – SlashGear

Threema, an encrypted messaging service that offers a substantial number of features, has announced a big business change that may increase some otherwise skeptical users trust in the platform. In its announcement, the Threema team said its messaging apps will soon be made fully open source, making it easier to independently review the apps security and verify their code.

While theres no lack of secure messaging apps on the market, some of them are more private than others. There are messaging services where the messages reside on the companys servers, then there are encrypted messaging services where the company isnt able to access the users data. Threema falls into the latter category.

Unlike apps like Telegram, which is more targeted at the average consumer, Threema is a higher-end product that includes a variety of features, including support for voice and text messages, groups, distribution lists, and sending files like MP3s and PDFs. As well, users can share locations and images/videos.

When compared alongside the more popular encrypted messaging app Signal, there was both an upside and a downside. The upside? Threema assigns the user a unique ID, eliminating the need to use a phone number. The downside? Threema wasnt open-source, unlike Signal, something that was a concern for some potential users.

In its update on Thursday, Threema announced that it has partnered with Afinum Management AG and that it is making its apps open source. This open-source change only applies to the apps, not the backend, but Threema notes that it has and will continue to conduct regular external reviews. Likewise, Threema says its users will soon be able to use multiple devices in parallel without compromising their data.

More:

Threema encrypted messaging apps will soon be open source - SlashGear

12 thoughts on Building An Open Source ThinkPad Battery – Hackaday

If you own a laptop thats got a few years on the clock, youve probably contemplated getting a replacement battery for it. Which means you also know how much legitimate OEM packs cost compared to the shady eBay clones. You can often get two or three of the knock-offs for the same price as a single real battery, but they never last as long as the originals. If they even work properly at all.

Which is why [Alexander Parent] decided to take the road less traveled and scratch built a custom battery for his ThinkPad T420. By reverse engineering how the battery pack communicated with the computer, he reasoned he would be able to come up with an open source firmware that worked at least as well as what the the third party ones are running. Which from the sounds of it, wasnt a very high bar. From a more practical standpoint, it also meant hed be able to create a higher capacity battery pack than what was commercially available should he chose to.

A logic analyzer wired in between one of the third party batteries and a spare T420 motherboard allowed [Alexander] to capture all the SMBus chatter between the two. From there he wrote some Arduino code that would mimic a battery as a proof of concept. He was slowed down a bit by an undocumented CRC check, but in the end he was able to come up with a fairly mature firmware that even allows you to provide a custom vendor name and model number for your pack.

The code was shifted over to an ATtiny85, with a voltage divider wired up to one of the pins so it can read the pack voltage. [Alexander] says his firmware still doesnt do a great job of reporting the actual battery capacity remaining, but its close enough for his purposes. He came up with a simple PCB design to hold the MCU and support components, which eventually he plans on putting inside of a 3D printed case that actually plugs into the back of his T420.

This project is obviously still in a relatively early stage, but were very interested to see [Alexander] take it all the way. The ThinkPad has long been the hackers favorite laptop, and we can think of no machine more worthy of a fully open hardware and software battery pack.

Read this article:

12 thoughts on Building An Open Source ThinkPad Battery - Hackaday