OggCamp2014 - snails tales video
Dave Hingley #39;s OggCamp 2014 talk about using open source software for producing animation.
By: Titanium Bunker
See more here:
OggCamp2014 - snails tales video - Video
OggCamp2014 - snails tales video
Dave Hingley #39;s OggCamp 2014 talk about using open source software for producing animation.
By: Titanium Bunker
See more here:
OggCamp2014 - snails tales video - Video
Blender: Vorstellung der Open Source Software Blender
In diesem Video wird euch ganz kurz die Open-Source Software vorgestellt die sich Blender nennt. Es ist ein sehr komplexes und umfangreiches Programm worauf ...
By: InformatikTV
Read the original post:
Blender: Vorstellung der Open Source Software Blender - Video
Competition Among Proprietery and Open Source Software Firms
Competition among Proprietary and Open Source Software Firms: The Role of Licensing on Strategic Contribution Open-source software (OSS) firms are increasingly using service-based business...
By: INFORMS
Read the original post:
Competition Among Proprietery and Open Source Software Firms - Video
Summary: Forrester Research's survey shows that most developers, even ones who usually stick with Microsoft Visual Studio, are now using open source.
RALEIGH, N.C. -- At the All Things Open conference, Jeffrey Hammond, aForrester Research VP and Principal Analyst, revealed that four out of five programmers are now using, or have recently used, open source development tools.
Forrester, with Black Duck software and North Bridge Venture Partners, conducted a survey of over 1,400 programmers and found that 84 percent now use open source software. The survey includednot just programmers from open source companies but also developers from traditional proprietary companies such as Microsoft.
Why? The majority of them have switched to open source because they perceive open source development programs as having better performance and reliability. This, as Hammond observed, is a change. "Open source used to be popular because of the lower cost. Now the cost of tools is the least important element for developers."
This popularity, said Hammond,means that "open source is taking over. This is a golden age for developers." A consequence from this is that "We are now seeing open source tech compete with open source tech; it's no longer open-source software vs proprietary."
In addition, the survey reveals the three industries expected to be impacted the most by open source software are education, government, and health care. In these, and other areas, Hammond said, open source projects like Apache Tomcat, the JavaServer Pages (JSP) server, are replacing proprietary programs.
And open source is doing more than just replacing old software. It's also leading the way in new software. Hammond cited big data and NoSQL as areas where open source has become the software groundbreaker. Proprietary software doesn't really stand a chance in these new fields.
Companies are going along with this, according to Hammond, not just because of the cost savings but because they'd rather try an open source solution than deal with the hurdles of acquiring proprietary software.
The survey indicates that open source is leading in several other fields as well, includingcloud/virtualization (73 percent); Content Management Systems (CMS) (66 percent); Mobile (61 percent); Security (59 percent); and network management (57 percent).
However, while development has swung heavily toward open source on the server, datacenter and cloud, on the desktop Windows still rules. The most popular single developer desktop operating system is Windows 7. Indeed, slightly more than two out of three programmers are running Windows, while just over 12 percent use Linux and slightly less run Macs.
More:
Survey indicates four out of five developers now use open source
Miami, FL (PRWEB) October 29, 2014
PrestaShop, an industry leader in open source software for ecommerce, today announces two executive appointments to support significant growth plans across all parts of the business. Arnaud Bourboulon joins as Chief Revenue Officer and Leah Anathan joins as Chief Marketing Officer.
As Chief Revenue Officer, Arnaud Bourboulon will lead PrestaShops worldwide sales and partner teams. Arnaud is the former Managing Director for Experian CheetahMail France. At Experian, Arnaud was responsible for managing the business transformation of CheetahMail from a pure play email solution to a market leader in cross-channel digital marketing. Prior to Experian, Arnaud spent more than 10 years in leadership positions in the mobile industry. He is the former CEO for the Swiss mobile service provider, MNC, later acquired by Alcatel-Lucent. Under Arnauds leadership the company successfully expanded into the French and US markets with customers such as Orange, SFR and T-Mobile. Prior to MNC, Arnaud was the Head of the Mobile Kiosk Business Venture at Alcatel-Lucent. Arnaud started his career as Product Marketing Director for Mobileway, later acquired by SAP.
As Chief Marketing Officer, Leah Anathan will lead PrestaShops worldwide marketing program and teams. Leah is the former Director of Corporate & Product Marketing at Emailvision. While at Emailvision, Leah led an award-winning rebrand of the company and the launch activities for multiple new products and acquisitions. During this same period, Emailvision grew revenues from $40M-80M and launched operations in over 10 countries. Prior to Emailvision, Leah spent more than 10 years at BMC Software, a $2B leader in IT software and services, where she served in multiple product marketing and product management roles in BMCs US and European operations.
"PrestaShop has one of the most widely adopted ecommerce platforms in the world. Now is the time for us to aggressively grow our business through partnerships, international expansion and growth in the user base, said Benjamin Teszner, CEO of PrestaShop. Im very pleased to have Arnaud and Leah on my leadership team. Their tremendous strategic and operational experience in the technology industry will help to take our business to a whole new level."
Since day one, I truly wanted PrestaShop to be a global company. With a product translated into 65 languages, 5 worldwide offices and a team of 20+ different nationalities, the time has come for PrestaShop to go even further. Thanks to their strong international experience, Leah and Arnaud will definitely play a key role in achieving this goal." said Bruno Lvque, Founder of PrestaShop.
Since 2007, PrestaShops open source software has been downloaded over 4 million times. Today, 200,000 ecommerce stores run on PrestaShop software. Earlier this year, the company announced that it had secured $9.3 Million in a Series B funding round led by XAnge Private Equity, Seventure Partners and Serena Capital. With a total of $15 million in funding, PrestaShop plans to accelerate product development, marketing and international expansion.
About PrestaShop
PrestaShop was founded in 2007 with a mission to provide world class ecommerce software for free through open source innovation. Today more than 200,000 ecommerce stores run on PrestaShop technology. The company provides software that enables merchants to have a fully functional online store at the lowest cost possible. The PrestaShop open source community includes 700,000 merchants, developers and web agencies from around the world. PrestaShop is the proud two-time winner of Packt Publishings Best Open Source Business Application, the winner of Europes Bsoco Award in the 2013 CMS category, and rated #1 Open Source Shopping Cart by EcommerceBytes Sellers Choice Awards in 2013. PrestaShop has offices in the US and France, and is funded by XAnge Private Equity, Seventure Partners and Serena Capital. For more information, please visit http://www.PrestaShop.com
Original post:
PrestaShop Announces New Hires to Support Ambitious Growth Plans: New Chief Revenue Officer and Chief Marketing ...
Easy Quantum Cryptography, QKD by SK Telecom of Korea
SK Telecom, byword of Challenge and Innovation got a successful demonstration of its QKD system at Busan World IT Show 2014. If you need this video, please contact us with kwaksh@sk.com.
By: Sean Kwak
The rest is here:
Easy Quantum Cryptography, QKD by SK Telecom of Korea - Video
Cryptography from Compression Functions: The UCE Bridge to the ROM
Cryptography from Compression Functions: The UCE Bridge to the ROM by Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi. Talk at Crypto 2014.
By: TheIACR
Continue reading here:
Cryptography from Compression Functions: The UCE Bridge to the ROM - Video
Cryptography with Streaming Algorithms
Cryptography with Streaming Algorithms by Periklis A. Papakonstantinou, Guang Yang. Talk at Crypto 2014.
By: TheIACR
See the original post:
Cryptography with Streaming Algorithms - Video
Julian Assange following a court hearing in 2010. Photo: TT
Wikileaks founder Julian Assange is fighting extradition to Sweden where he is facing sex assault allegations. The Local looks at the key points in his case.
August 2010 - Julian Assange is in Sweden and reportedly has sex with two different women. - The Swedish Prosecutor's Office issues an arrest warrant for him following two separate allegations (one of rape and the other of molestation). - Assange denies the allegations against him.
November 2010 - Stockholm District Court approves a request to detain Assange for questioning on suspicion of rape, sexual molestation, and unlawful coercion. - Assange is not present at the questioning and Swedish police issue an international arrest warrant via Interpol.
Many of Assange's supporters have protested against his arrest. Photo: TT
December 2010 - Assange gives himself up to London police and is taken to an extradition hearing. - He is put in custody pending another hearing and latergranted bail but prosecutors appeal and he is sent back to jail until a higher court can consider the issue. - He is later granted bail and his supporters pay to have him freed for 240,000 (2,853,092 million kronor).
February 2011 - A court in south London rules that Assange should be deported to Sweden, something his lawyers appeal against the following month.
June 2012 - After the Supreme Court in London rules that Assange should be deported to Sweden to face questioning, Assange is granted political asylum at the Ecuadorian embassy in London.
Julian Assange has been living at the Ecuadorian embassy in London for two years. Photo: TT
July 2014 - Assange asks Stockholm District Court to reconsider his arrest warrant. The court says the warrant should stay in place, but Assange appeals the decision.
More here:
Timeline: Julian Assange sex allegations
Cryptocurrency is the name given to a system that uses cryptography to allow the secure transfer and exchange of digital tokens in a distributed and decentralised manner. These tokens can be traded at market rates for fiat currencies. The first cryptocurrency was Bitcoin, which began trading in January 2009. Since then, many other cryptocurrencies have been created employing the same innovations that Bitcoin introduced, but changing some of the specific parameters of their governing algorithms. The two major innovations that Bitcoin introduced, and which made cryptocurrencies possible, were solutions to two long-standing problems in computer science: the double-spending problem and the Byzantine Generals Problem.
Until the invention of Bitcoin, it was impossible for two parties to transact electronically without employing a trusted third party intermediary. The reason was a conundrum known to computer scientists as the double spending problem, which has plagued attempts to create electronic cash since the dawn of the Internet.
To understand the problem, first consider how physical cash transactions work. The bearer of a physical currency note can hand it over to another person, who can then verify that he is the sole possessor of that note by simply looking at his hands. For example, if Alice hands Bob a $100 bill, Bob now has it and Alice does not. Bob can easily verify his possession of the $100 bill and, implicitly, that Alice no longer has it. Physical cash transfers are also final, in the sense that to reverse a transaction the new bearer must give back the currency note. In our example, Bob would have to hand the $100 bill back to Alice. Given all of these properties, cash makes it possible for different parties, including strangers, to transact without trusting each other.
Now, consider how electronic cash might work. Obviously, paper notes would be out of the picture. There would have to be some kind of digital representation of currency. Essentially, instead of a $100 bill, we might imagine a $100 computer file. When Alice wants to send $100 to Bob, she attaches a $100 file to a message and sends it to him. The problem, as anyone who has sent an email attachment knows, is that sending a file does not delete it from ones computer. Alice will retain a perfect digital copy of the $100 she sends Bob, and this would allow her to spend the same $100 a second time, or indeed a third and fourth. Alice could promise to Bob that she will delete the file once he has a copy, but Bob has no way to verify this without trusting Alice.
Until recently, the only way to overcome the double spending problem was to employ a trusted third party intermediary. In our example, both Alice and Bob would have an account with a third party that they each trust, such as PayPal. Trusted intermediaries like PayPal keep a ledger of all account balances and transactions. When Alice wants to send $100 to Bob, she tells PayPal, which in turn deducts the amount from her account and adds it to Bobs. The transaction reconciles to zero. Alice cannot spend the same $100, and Bob relies on PayPal, which he trusts, to verify this. At the end of the day, all transfers among all accounts reconcile to zero. Note, however, that unlike cash, transactions that involve a third party intermediary are not final, as we have defined it, because transactions can be reversed by the third party.
Like PayPal, the Bitcoin system employs a ledger, which is called the block chain. All transactions in the Bitcoin economy are recorded and reconciled in the block chain. However, unlike PayPals ledger, the block chain is not maintained by a central authority. Instead, the block chain is a public document that is distributed in a peer-to-peer fashion across thousands of nodes in the Bitcoin network. New transactions are checked against the block chain to ensure that the same bitcoins have not been previously spent, but the work of verifying new transactions is not done by any one trusted third party. Instead, the work is distributed among thousands of users who contribute their computing capacity to reconcile and maintain the block chain ledger. In essence, the whole peer-to-peer network takes the place of the one trusted third party.
Bitcoins solution to the double spending problem distributing the ledger among the thousands of nodes in a peer-to-peer network presents another problem. If every node on the network has a complete copy of the ledger that they share with the peers to which they connect, how does a new node connecting to the network know that she is not being given a falsified copy of the ledger? How does an existing node know that she is not getting falsified updates to the ledger? The difficult task of reaching consensus among distributed parties who do not trust each other is another longstanding problem in the computer science literature known as the Byzantine Generals Problem, which Bitcoin also elegantly solved.
The Byzantine Generals Problem posits that a number of generals each have their armies camped outside a city that they have surrounded. The generals know that their numbers are large enough that if half their combined force attacks at the same time they will take the city, but if they do not attack at the same time they will be spread too thinly and will be defeated. They can only communicate via messenger, and they have no way of verifying the authenticity of the messages being relayed. They also suspect that some of the generals in their ranks are traitors who will send fake messages along to their peers. How can this large group come to a consensus on the time of attack without employing trust and without a central authority, especially when there will likely be attempts to confuse them with fake messages?
In essence, this is the same problem faced by Bitcoins miners, the specialised nodes that verify new transactions and add them to the distributed ledger. Bitcoins solution is to require additions to the ledger to be accompanied by the solution to a mathematical problem that is very difficult to solve but simple to verify. (This is much like calculating prime factors; costly to do, but easy to check.) New transactions are broadcast in a peer-to-peer fashion across the network by parties to those transactions. Miners look at those transactions and confirm by checking their copy of the ledger (the block chain) that they are not double-spends. If they are legitimate transactions, miners add them to a queue of new transactions that they would like to add as a new page in the ledger (a new block in the block chain). While they are doing this, they are simultaneously trying to solve a mathematical problem in which all previous blocks in the block chain are an input. The miner that successfully solves the problem broadcasts his solution to the problem along with the new block to be added to the block chain. The other miners can easily verify whether the solution to the problem is correct, and if it is they add that new block to their copy of the block chain. The process begins anew with the new block chain as an input of the problem to be solved for the next block.
The mathematical problem in question takes an average of 10 minutes to solve. This is key because the important thing is not the solution itself, but that the solution proves that the miner has expended 10 minutes of work. On average, a new block is added to the block chain every 10 minutes because the problem that miners must solve takes on average 10 minutes to solve. However, if more miners join the network, or if computing power improves, the average time between blocks will decrease. To maintain the rate at which blocks are added to six per hour, the difficulty of the problem is adjusted every 2016 blocks (every two weeks). Again, the key here is to ensure that each block takes about 10 minutes to discover.
View post:
cryptocurrency : The New Palgrave Dictionary of Economics