LeBron James’ The Shop Will Not Air Episode Featuring Kanye West After Controversial Remarks By The Rapper – Yardbarker

LeBron James' business partner Maverick Carter has announced that they will not be airing an episode of 'The Shop' recorded with Kanye West.

Controversial hip-hop star, fashion designer, and founder of DONDA Sports who signed Jaylen Brown, Ye, formerly known as Kanye West, has been removed from an episode of 'The Shop' along with LeBron James. 'The Shop' is the closest thing LeBron has to a podcast and usually features a variety of very influential guests from all walks of life.

Andscape broke the news that an episode with Kanye West was recorded for The Shop but one that will never make it to air because of controversial comments made by Ye during the recording.

Yesterday we taped an episode of The Shop with Kanye West. Kanye was booked weeks ago and, after talking to Kanye directly the day before we taped, I believed he was capable of a respectful discussion and he was ready to address all his recent comments. Unfortunately, he used The Shop to reiterate more hate speech and extremely dangerous stereotypes.

We have made the decision not to air this episode or any of Kanyes remarks. While The Shop embraces thoughtful discourse and differing opinions, we have zero tolerance for hate speech of any kind and will never allow our channels to be used to promote hate.

I take full responsibility for believing Kanye wanted a different conversation and apologize to our guests and crew. Hate speech should never have an audience. (h/t Andscape)

Ye is in extremely hot water right now by making insensitive comments against Black and Jewish communities. With the goal of not giving a larger platform to his problematic opinions, Maverick Carter and LeBron have made the decision to not air it at all.

Deplatforming someone like Kanye West is nearly impossible, so it was smart of LeBron to not get himself in trouble by association for whatever remarks Ye makes on his show. James would be held responsible for aiding the spread of these opinions, which would be a massive hit to him personally.

Censorship is not right but Ye has his own platforms with millions tuning in where he can spread his message. Maverick Carter and LeBron would ruin what they've built as many people would then associate them with the opinions spewed on their show. If they cannot endorse it, they shouldn't release it.

Go here to read the rest:

LeBron James' The Shop Will Not Air Episode Featuring Kanye West After Controversial Remarks By The Rapper - Yardbarker

TMCs Derek OBrien steps in to give legitimacy to The Wires Meta joke that turned out to be a hoax – OpIndia

After it was concluded beyond doubt that propaganda website The Wire quite likely fell for a haox, if they have not perpetrated it themselves, involving Facebooks parent company Meta and BJPs IT Cell head Amit Malviya, Trinamool Congress MP Derek OBrien has now stepped in to give legitimacy to this. Taking to Twitter, OBrien said that he would raise this issue in the Parliament.

The good fight OBrien wants to take up has been categorically denied by Meta executives as fake and fabricated documents. In anarticlepublished on October 10, 2022, titled If BJPs Amit Malviya Reports Your Post, Instagram Will Take It Down No Questions Asked, leftist propaganda website The Wire alleged that BJPs Amit Malviya is an all-powerful individual who can get any social media post on platforms such as Facebook and Instagram removed.The article was based on some random troll account calling itself political satire account with less than 5,000 followers claiming Malviya personally targeted his posts and curbed his reach.

On one hand, The Wire wanted everyone to believe Malviya is some super-villain-ish individual with all the power on the internet and on other hand, it wanted us to believe he would personally go after obscure accounts on Instagram with hardly any clout when there are way more political influencer accounts who have way more nuisance value.

After the report was published Meta has categorically come out and denied the writeup published by The Wire and said that the documents they used for building up the narrative were fabricated. Metas Chief Information Security Officer (CISO), Guy Rosen, issued a statement calling out the hoax and concluded it by saying that he hopes The Wire was a victim in the hoax and not a perpetrator.

Even before Facebooks denial came out towards the evening India time on Tuesday, many Twitter users, a lot of whom know a thing or two about technology had cast aspersions on The Wires report which appeared ridiculous from the word go. In fact, a lot of Modi critics and haters too did not buy The Wires writeup as it was clearly way too exaggerated and appeared ridiculously hilarious. Amusingly, it is the Left-Liberal cabal that has a history of deplatforming critics while championing the cause of free speech. Remember how former US President Donald Trump was deplatformed from all social media platforms? Social media platforms such as Twitter has quite clearly mentioned that their employees are left-leaning and it does show in the way it operates too.

But Derek OBrien here would like to take this hoax as some sort of gospel and raise the issue in the Parliament in winter session. The Wire hoax was so unbelievable that even Rahul Gandhi didnt share its screenshot to attack Modi government, like he usually does. To put things in perspective, Islamists are running riots in OBriens backyard, attacking Durga Puja pandals and opposing the celebration of Hindu festivals. But no, OBrien would rather exaggerate a hoax in Parliament than get the law and order in his own home state in order.

OBrien was also mocked at by netizens for the same.

While some even gave him advice to choose his battles wisely.

This, obviously, is not the first time OBrien has chosen to raise inconsequential issues in Parliament in what appears to be his way of making up for lack of credibility otherwise. Back in 2018, OBrien had threatened to name Twitter users in Parliament whom he found offensive and those who irritate him.

As seen above, Derek decided to accuse a twitter user of lying about Omar Abdullahs statement and as a result threatened that he would be mentioned in the Parliament. It was indeed shocking to note that a senior MP wanted to use Parliaments precious time todiscuss social media disagreements and call out private citizens, who would be in no position to defend themselves from his attacks.

Even before this, in 2017, based on a writeup by Swati Chaturvedi, abusive troll masquerading as a journalist with The Wire like sources, OBrien made childish accusations against some Twitter users, including against OpIndia co-founder Rahul Raj, accusing them of issuing criminal threats to other people while being followed by the Prime Minister of India Narendra Modi. This is akin to an MP quoting a pamphlet printed by ISIS to claim that Barack Obama was a terrorist. What next? An MP quoting a WhatsApp forward to make a point? It was a clear case of intimidation.

But it seems OBrien would still continue to put his bets on trash published by dubious platforms with questionable credibility and create noise in the Parliament so that the cries of people back home in West Bengal are stifled.

Imagine being so petty.

See original here:

TMCs Derek OBrien steps in to give legitimacy to The Wires Meta joke that turned out to be a hoax - OpIndia

As Washington Post targets Catholic hospitals, every religious institution needs to build defenses – Washington Examiner

The Washington Post has joined in a broad culture-war offensive to crush religious institutions that dont subscribe to elite morality.

The headline of the latest Post article reads, Spread of Catholic hospitals limits reproductive care across the U.S. The sloppy subheadline reads, Religious doctrine restricts access to abortion and birth control.

And the editor who let this through tweets out a dark warning.

One point never made in this story is how the consolidation of hospitals is a direct, and arguably intentional, result of government growth in the healthcare system.

THE FUTURE OF WORK REALLY IS FEMALE

More importantly, theres the misguided notion that religious institutions are somehow imposing their morality on others by operating their own institutions according to their moral teachings. This is rooted in an impossibly narrow and uninformed understanding of what religion is. You cannot have a religion whose adherents do not let their religion affect how they act in real life, including toward others who may not share their religion.

This mindset holds that the Little Sisters of the Poor should be forced to provide contraception coverage for employees, religious schools must be forced to treat boys who identify as girls as if they were actually girls, and Catholic hospitals should have to perform elective abortions.

The increasing animosity toward religion in the public square deserves deeper treatment. But for now, let's zoom out. We need to look at the context of this Washington Post piece attacking Catholic hospitals.

Two issues here are hospital consolidation and federal funding of religious institutions. Neither of these is an easy discussion. But as a religious conservative with a broad media diet, I see a larger pattern here. The largest media institutions are at the forefront of a broad campaign against conservative religious institutions that dont subscribe to elite morality on sex, gender, family, marriage, and which human lives deserve to be protected in law. The goals of this campaign are primarily to bully religious institutions into dropping their religious character or, alternatively, to drive them out of business altogether, using Big Government and Big Business as enforcers.

The tools of Big Government and Big Business include deplatforming, defunding, taxation, regulation, and, ultimately, police powers.

Look at the stories published by major news outlets in the past two months.

For example, heres NBC News bullying a small Christian school for running itself according to Christian teaching on sexuality and gender.

Second example: Heres a massive, yearlong New York Times story targeting Orthodox Jewish Yeshivas.

Third example: Here's a Time magazine piece warning of unregulated, faith-based crisis pregnancy centers that have exploded across the U.S. in the past two decades, fueled by an increasingly powerful anti-abortion movement.

In each of these stories, you can find some fault with a religious institution or say that there are real issues to debate. But thats why its important to look at the whole picture.

There are patterns in these articles. One trope is to talk misleadingly as if religious organizations or their teachings are some innovation or something new. These journalists write as if the baseline is total acceptance of abortion, gay marriage, and transgender ideology and that the scary new thing is the religious hospitals or teachings that have been around for centuries or millennia.

Spread of Catholic hospitals is a funny headline because Catholics were the ones who invented hospitals. If you wanted to write a trend piece, you should really write about the spread of laws and lawsuits threatening Catholic hospitals, which are actually new.

But of course, the major media have chosen to make themselves part of that culture-war offensive. They have no interest in reporting on their own campaign objectively.

Most of these articles also dangle taxpayer funding as a red herring. The taxpayer benefits to Brooklyns Yeshivas are tiny a subsidy for bus routes. The taxpayer money to Catholic hospitals is a result of a constant increase in the federal and state role in healthcare. If you make the federal government the largest payer in the healthcare sector, you dont get to turn around and complain that some federal dollars are going to religious hospitals, which long predated both Medicaid and Medicare.

Religious conservatives rightly read these articles as part of a broad campaign to smash our institutions our schools, our charities, and our hospitals.

We know what comes next is the government targeting us personally.

President Barack Obama went to court against the Little Sisters of the Poor for their insistence on following Catholic teaching. Attorney General Merrick Garland is going after pro-life leaders while ignoring a pro-abortion terrorist campaign against pro-life crisis pregnancy centers that Kamala Harris and Elizabeth Warren have verbally attacked. Every religious and conservative institution should expect and prepare for a culture war attack.

Lawyer up. Button down. Run a clean ship. Give them nothing to grasp at because biased reporters and Democratic attorneys general will come after you, no matter how clean you are. Prepare for your deplatforming and have a plan to stay in touch with your clients and friends.

How do you process payments? Can they take that away? Do you have a backup? Who hosts your website or your internal network? Can they drop you? How do you get health insurance?

CLICK HERE TO READ MORE FROM THE WASHINGTON EXAMINER

Any one of these corporations could drop you tomorrow for not following their dogma, so you'd better be prepared.

It's a culture war, and the Washington Post is on the offensive with the rest of the cultural Left. Make sure your defenses are in place.

Here is the original post:

As Washington Post targets Catholic hospitals, every religious institution needs to build defenses - Washington Examiner

Source Code for Open Source Software Components – Oracle

Written Offer for Source Code

For third party technology that you receive from Oracle in binary form which is licensed under an open source license that gives you the right to receive the source code for that binary, you can obtain a copy of the applicable source code from this page. If the source code for the technology was not provided to you with the binary, you can also receive a copy of the source code on physical media by submitting a written request to:

Or, you may send an email to Oracle using this form. Your request should include:

We may charge you a fee to cover the cost of physical media and processing. Your request must be sent (i) within three (3) years of the date you received the Oracle product that included the component or binary file(s) that are the subject of your request, or (ii) in the case of code licensed under the GPL v3, for as long as Oracle offers spare parts or customer support for that product model.

See original here:
Source Code for Open Source Software Components - Oracle

Learn Linux online for free with Linux Foundation Courses from edX – TechRepublic

The Linux Foundation and edX are making a self-paced, open-source course on container technology available to students anywhere in the world.

edX is a provider of massively open online courses (MOOCs), most of which are free, with the option to pay to receive a certification. edX was originally started by Harvard and MIT and has now partnered with dozens of education and non-profit organizations to bring university-level online courses to people all over the world.

One of those organizations is the Linux Foundation, which offers more than 50 courses about Linux and other open-source softwares topics on the edX website.

The Linux Foundation is a non-profit technology consortium that promotes the use of the open-source operating system Linux. It originally began in 2000 as the Open Source Development Labs (OSDL) and later became the Linux Foundation when OSDL merged with the Free Standards Group (FSG).

The Linux Foundation works to promote the growth and commercial adoption of the Linux operating system. It also facilitates collaboration on open-source software projects and promotes diversity and inclusion in the Linux community. As part of its mission, the Linux Foundation offers various training courses and resources to help amateurs and experts alike learn more about Linux.

SEE: 40+ open source and Linux terms you need to know (TechRepublic Premium)

The Linux Foundation has partnered with edX to host its Linux courses on the edX website. Because edX is largely free, it fits well with the Linux Foundations mission to promote open-source software and make it as accessible to as many people as possible.

All told, the Linux Foundation offers more than 50 courses on the edX website, ranging from beginner to advanced. The topics arent just confined to Linux and cover multiple other subjects, including DevOps and FinOps and open-source software platforms such Kubernetes, Jenkins, GraphQl and more. The foundation also offers seven professional Linux certifications that bundle related Linux Foundation courses into a targeted education experience.

Its impossible to cover all of the 50+ Linux Foundation courses hosted on edX, but we wanted to highlight a few of them here to give you a sense of the depth and diversity of the course offerings currently available. For this list, we will specifically be focusing on the Linux classes, but there are many other excellent courses offered by the Linux Foundation that are also worth exploring.

If you are brand new to the world of Linux, then you cant go wrong with this Introduction to Linux course, which boasts more than 1 million in enrollment; there is also a Spanish language version available as well. The self-paced class is designed to be spaced across 14 weeks, with approximately five to seven hours of lessons and homework each week.

Topics covered include how to navigate through major Linux distributions, system configurations and graphical interface of Linux, basic command-line operations, and common applications of Linux. By the end, participants should have a good working knowledge of Linux and be ready to move onto more advanced lessons.

This self-paced course on Linux Tools for Software Development is designed to take place over 14 weeks for one to two hours a week. While this course is still classified as an introductory level, the instructions say that in order to make the most of it, you should ideally have experience as a developer on any operating system, though not necessarily Linux. Experience in working at the command line is not necessary but would be helpful.

In this course, participants will learn how to use essential command-line tools for everyday tasks as well as construct scripts and perform complicated tasks in an automated way. They will also discuss how Linux works with various types of file systems, compile programs in Linux, and use different types of shared and static libraries. Finally, they will build packages out of software in Linux in both RPM and Debian systems, so it can be distributed to other developers of Linux distributions.

This self-paced course on Open Source Software Development: Linux for Developers is designed to take place over 14 weeks for one to two hours a week. While this course is still classified as an introductory level, the instructions say that in order to make the most of it, you should ideally have experience as a developer on any operating system, not necessarily Linux. Experience in working at the command line is not necessary but would also be helpful. You will also need a computer installed with a current Linux distribution, either a physical computer or a Linux virtual machine.

Participants will leave the course with a good understanding of Linux systems and utilities. They should be able to work comfortably at the command line and discuss the key concepts involved in developing open-source software. The course will also review open-source software licensing issues and cover the known best practices for long term sustainability of projects.

Dont have an edX account and want another way to learn about Linux? Check out our Linux course roundups featuring classes on Udemy, LinkedIn Learning and Skillshare and start your Linux education todayfrom the comfort of your home.

Visit link:
Learn Linux online for free with Linux Foundation Courses from edX - TechRepublic

We dont teach developers how to write secure software Linux Foundations David A Wheeler on reversing the CVE surge – The Daily Swig

Teach devs security fundamentals to bolster supply chain resilience, argues Wheeler

Addressing a decades-old deficiency in coding curriculums could have a profound effect on the security of the software supply chain, a leading expert on the subject tells The Daily Swig.

In particular, David A Wheeler, director of open source supply chain security at the Linux Foundation, draws a link between a failure to incorporate security into entry-level developer courses and the vast majority of vulnerabilities belonging to a small number of common bug classes.

The IT PhD and Certified Information Systems Security Professional (CISSP) also moonlights as adjunct professor of computer science at Virginias George Mason University, and in 2020 concluded a 33-year spell at the US Institute for Defense Analyses.

Daily Swig: David, can you summarize your background and what your current roles involve?

David A Wheeler: Ive loved computers since junior high school and paid my way through school doing computer consulting. I also briefly maintained the worlds first commercial, entirely text-based multiplayer roleplaying game, Scepter of Goth.

Now I teach at George Mason University on how to develop secure software which Ive studied over many decades.

Most of my work is with the Open Source Security Foundation, OpenSSF [whose members include AWS, Google, and Microsoft]. I view my role as being a kind of catalyst or accelerant. I can run around as a subject matter expert to help organizations improve the security of their software.

David A Wheeler has studied the secure development of software for decades

DS: And what are the biggest barriers to improving application security?

DAW: The fundamental problem is that we do not teach software developers how to write secure software.

I don't care if its a separate course or embedded [in other coding courses] that's not the question. The question is: when software developers are learning the basics of their craft, do they learn the basics of developing secure software? And the answer is mostly no.

A 2019 Forrester study found that none of the top US coding schools and none of the top five non-US computer science schools were teaching this. Another study found that only one school did at UC, San Diego. So good for them, shame on the rest.

DS: Lets imagine all coding schools immediately revamped their courses to incorporate security fundamentals. Would we see a steady fall in vulnerabilities as a new wave of security-savvy developers emerge?

DAW: Its generally estimated that somewhere between 90% to 95% of all vulnerabilities are in a relatively small set of common ones [classes].

So, if you educate developers to prevent them systemically, and then use tools to find the stragglers, we can dramatically reduce by at least one order of magnitude and maybe two the number of vulnerabilities that actually slip out.

They can also find and fix the problems created in the past.

Right now, detection, response, and recovery is overwhelmed by the sheer number of vulnerabilities going into deployed systems, so it will be much easier to counter the attackers when vulnerabilities are much rarer. And that's really the argument of shift left in general: the sooner you can get rid of the problems, the better.

DS: Why is security neglected in the coding curriculum given the potentially severe consequences of software vulnerabilities?

DAW: Our educational system does not always respond to societal needs. There was an open letter written by Oracle and some other folks 10, 15 years ago or so, where they basically begged universities [to educate them properly].

But sometimes they [universities] want to teach what they want to teach, and it doesnt matter what societys needs are.

DS: Could this partially reflect the fact that many educators learned their craft when cyber threats were less numerous and severe?

DAW: On the [early] internet people were mostly connected to folks they felt they could trust. But once you saw this growth of the internet and the worldwide web running on top of it in the 90s, then very quickly [they realized] no, you cant just trust arbitrary computers you connect to.

But educational conservatism isnt all bad. Its actually sensible to teach things that have stood the test of time, which security has. The fundamental [computing] design principles have been known [about] since the 1970s.

RECOMMENDED Security teams often fight against developers taking control of AppSec: Tanya Janca on the drive to DevSecOps adoption

DS: Might there be a commercial incentive at work that favours coding quickly over coding securely?

DAW: Maybe to some extent for the for-profits, but I think the bigger for-profit issue is that if you know how to do [secure development], you can probably earn double or triple in industry [compared to teaching]. Youre not gonna teach.

I teach, but thats my side hustle. I enjoy teaching. George Mason University is 20 minutes from me and more connected to industry than some other universities.

DS: How do we persuade or incentivize education providers to embed security into coding courses?

DAW: I think this is a solvable problem basically, society needs to scream more loudly.

The US spends a tremendous amount of money financing degrees, including computer science. If were gonna pay, maybe we could have some criteria?

DS: Could the impetus behind shifting left or DevSecOps help persuade education providers to change emphasis?

DAW: I would like to think so, but I think its much more societal and industry pressure continuing over a period of time [that will make the difference].

Right now DevSecOps [is practised properly by] a minority, and we need to make sure that [secure development is practised] not just the majority, but is [a baseline] expectation [of all developers].

Developers are not being taught general security principles let alone how to apply them, says Wheeler

Years ago, I pushed really hard to get security added to a course on software engineering and after a lot of pressure and debate [the provider] finally added the word security no content, just that security might be important!

The ACM software engineering curriculum guidance at least does talk about knowing how to develop secure software, but lacks key specifics.

But I'm willing to believe that with continued emphasis we can get academia and many other organizations on board with making sure that software developers know the fundamentals.

DS: What fundamentals should newbie developers be taught?

DAW: What are the common problems? How do we prevent them in general? How do you design software so its less likely to be attacked? And what kind of tools can help developers to deal with that?

These general principles and the ability to apply them are important [skills] but lacking today.

Read more secure software development news

The first thing I did when I joined the Linux Foundation in 2020 as an employee was develop a course on developing secure software fundamentals. Thousands of people have now signed up.

George Mason University initially agreed to do my course every other semester, and very quickly, it's in every semester its in demand.

But its an optional graduate course. We do need, in society, people who drill in deeper and [become experts], but we also need every developer to know the basics.

DS: How important is it that developers understand how to use security tools?

DAW: If youre doing DevOps, you pretty much need a CI pipeline, and this is an obvious place to insert security tools. But if the developer doesn't know what theyre doing, they wont know what the tool is telling them and what to do about it.

A fool with a tool is still a fool. Theyre not stupid it's just that no one has told them. Education and tooling go hand in hand.

The tools are going to miss things or report things that are not actually problems in context. Computer programs dont cant know the full context.

But as long as developers know which tools to use and how, then they can do [some] amazing things.

DS: Finally, anything to say on OpenSSFs various initiatives aimed at bolstering software supply chain security?

DAW:Whether its industry, academia or governments, were all using open source software, so my first pitch would be: get involved with the OpenSSF. We would love to see more people involved.

I was deeply involved in the concise guides for developing secure software and evaluating open source software. And earlier, the OpenSSF published guides for open source projects and security researchers on [handling] coordinated [vulnerability] disclosure.

The Alpha-Omega Project has funded the Python Software Foundation and is funding Eclipse, Node... Theyre announced a new partnership with Rust. They've released some tools for finding vulnerabilities again, trying to shift left.

Theres also some funding for SBOM work, a tool for a Python library for SPDX [Software Package Data Exchange], and an [enterprise] end users working group kicking off.

RELATED Developers still struggling with security issues during code reviews, study finds

Read the original here:
We dont teach developers how to write secure software Linux Foundations David A Wheeler on reversing the CVE surge - The Daily Swig

GCHQ chief warns of Chinese . US open source software bill advances. Financial Stability Board on crypto regulation. – The CyberWire

At a glance.

Jeremy Fleming, director of the UK Government Communications Headquarters, gave a rare speech in London on Tuesday warning the public that Beijing has deliberately and patiently set out to gain strategic advantage by shaping the worlds technology ecosystems. The spy chief said that Chinese Communist Party leadership has plans to use digital currency and satellites, among other existing and emerging technologies, to further its control over global markets and extend its surveillance capabilities around the world.

Fleming also claimed that Chinese efforts to build a central-bank digital currency could allow officials to monitor transactions and potentially evade future international sanctions. Describing the rising threat as the national security issue that will define our future, he also indicated that the Chinese government plans to leverage its tech exports to create client economies and governments and aims to spread its authoritarian practices to other nations. Fleming warned that unless lawmakers invest in emerging security technologies like quantum computing, the divergent values of the Chinese state will be exported through technology.

Mao Ning, a spokeswoman for Chinas Foreign Ministry, denied Flemings claims at a Tuesday daily briefing, stating, The remarks of the British official have no factual basis at all. Chinas technological development is aimed at making lives better for the Chinese people. It does not target anyone, still less pose any threat. Western officials have been sending warning signals about the potential use of equipment exported from Chinese tech leader Huawei Technologies Co. for digital espionage, but both Huawei and Beijing have denied these accusations.

In a bipartisan decision, the US Senate Homeland Security Committee has approved the Securing Open Source Software Act 2022, legislation that calls on the Cybersecurity and Infrastructure Security Agency (CISA) to create a risk framework regarding the use of open source code within the government and critical infrastructure agency. Prompted by the infamous Log4j vulnerability, the draft act requires CISA to hire experts who are able to identify and remediate vulnerabilities in open source code, and any open source software being used will be continuously monitored and checked by CISA. The act also directs some agencies to create in-house open source programs.

"This software needs curation to be secure and the responsibility for that curation lies firmly with the user, in this case our public sectors across the globe," Amanda Brock, CEO of not-for-profit group OpenUK, told Computing. However, as Brock noted, the bill is unclear about how CISA will coordinate this framework, especially when third-party services are involved. "Where there is payment associated with open source software, that is not for the software itself, and understanding that is key. Liability for these - as with any paid for services - rests with the provider, but these are part of the act of curation that all end users need to ensure," Brock added. The draft act will need to be passed by the full Senate before becoming law, but some experts say regardless, clouding companies might take it upon themselves to implement heightened security measures. "I strongly suspect the cloud provider industry will actually solve this meaningfully sooner than the government will, said Michel Isbitski, director of cybersecurity strategy at cloud security firm Sysdig. They have to because of the amount of open source software they use in their offerings. They also have the benefit of scale on their side."

US policymakers gathered yesterday in Washington, DC for Fintech Week, where the Financial Stability Board, which coordinates international financial regulation, is expected to share its plan for regulating the cryptocurrency market. The Washington Post explains that although the board has no power to set legislation, its recommendations have motivated lawmakers in the past. Its fair to say the US wants to lead on this globally and largely has been leading on it, said Patrick Dougherty, a former Securities and Exchange Commission lawyer who is now on the board of the Global Digital Asset and Cryptocurrency Association. The White House is also calling for a crackdown on the illicit use of digital assets, and last week, the Financial Stability Oversight Council issued a warning urging lawmakers to restrict cryptocurrency use before it threatens global finance systems. The board will also examine issuing rules for the use of stablecoins after the fall of the Terra stablecoin in May led to a massive downturn in the crypto market. The cryptocurrency industry continues to push back at the possibility of regulation, with industry group the Crypto Council for Innovation warning that a heavy-handed approach could cut this technology off at its knees.

Read more here:
GCHQ chief warns of Chinese . US open source software bill advances. Financial Stability Board on crypto regulation. - The CyberWire

The Blockchain Sector is growing with the help of Open-Source Technology – Wales 247

Blockchain is one of those technologies that has garnered support from many institutions, and it is being touted as a potential solution to some of these problems. The blockchain sector has been growing with the help of open-source technology, as people have become more aware of problems within our current systems and how much better they could be if we made some changes. If you are interested in trading Bitcoin, use a reputable trading platform like the Bitcoin 360 Ai platform.

There is still work to be done before we can say blockchain is revolutionary, but it seems like a helpful technology worth exploring. Innovation may be the biggest issue with supply chains, and blockchain could solve this problem.

There is not a lot of innovation in supply chains because they are international and global in scope. Because so many parties are involved, it is difficult to innovate in addition to geographical constraints. Blockchain technology would address this issue by allowing all participants to communicate seamlessly without going through third parties or intermediaries.

The technology operates on a peer-to-peer basis where transactions do not require intermediaries with a plan. Transparency also contributes to the innovation problem as everyone can access all the information about what is happening in their ecosystem anytime. Lets explore how blockchain has expanded its root in different industries.

What are the advantages of open-source technology?

A significant advantage of open-source technology is that it is collaborative. Many people working together on a common goal would result in a competitive ecosystem and superior results. The quality of an open-source technology would be better than the best effort of any single source. Open-source technology is also readily available to everyone; anyone can use it without paying for licenses, royalties or other expenses.

Open-source technology was initially developed in the 1970s as an alternative to company restrictions regarding how many were using their products and for how long. Open source software was first released in 1983 by a programmer called Richard Stallman, whose idea was to make software free of licensing fees and restrictions.

Security in blockchain due to open source technology:

Another advantage of open-source technology is that the source code is always visible to developers and programmers that use the technology. Any bugs or loopholes in the source code can be easily identified or discovered through users peer reviews of blockchain networks. Security comes with familiarity, and open-source in blockchain makes it easy for enterprise customers to understand how their data is protected, how compliant they are with regulations, and who has access to their data at any time.

Open-source blockchain databases are very secure, and users can access the same source code used by hyper ledger, Ethereum and distributed ledger technology companies. As a result, blockchain is safe, secure, scalable and reliable. Furthermore, using open-source technology, enterprises can collaborate in developing their blockchain solutions without paying licensing fees or being concerned about intellectual property theft.

Blockchain has come a long way:

Blockchain has become an industry standard, with many organizations adopting it worldwide for their business needs. Blockchain networks have matured and scaled up due to the efforts of numerous developers and enthusiasts. The technology has become more reliable as innovative solutions are developed for issues often associated with inefficiencies, such as decentralization, security and transparency.

Blockchain technology has provided enterprises with a platform to understand how organizations can use open-source software to solve business issues presented by the vast amounts of data generated within their enterprise. In addition, because blockchain is a distributed ledger system, it is highly safe and secure. As a result, there is little need for double spending or fraud by eliminating third-party intermediaries such as banks or credit card processors when processing transactions.

Industries that are readily adopting blockchain:

Many industries are already adopting blockchain technology to handle tasks that require a distributed ledger database with multi-signature transactions. For example, ICOs and cryptocurrency transactions have been recorded for years and are now used for fundraising.

Real estate has also started using blockchain technology to track land registries and reduce costs incurred from paper records that result in mismanagement or fraud. As the world becomes more digitized, a secure database is becoming more apparent, especially in banking and finance. Both parties require a transparent database of transactions when dealing with each other.

Healthcare is another industry looking to blockchain technology to build secure, efficient and transformational solutions. Medical records are one area of the healthcare industry where blockchain can potentially transform the system. Hospitals and clinics are using blockchain technology to digitize medical records and make them more secure than paper ledger books used in the past.

Open-source technology has also been introduced for disaster management. A single store of information is kept for each community instead of a central repository vulnerable to malicious attacks or data loss.

Read the original here:
The Blockchain Sector is growing with the help of Open-Source Technology - Wales 247

Open source to open door: Software emerges as risk to the grid – E&E News

The worst computer vulnerability in recent years was in a ubiquitous piece of open-source software a bug that was as simple to exploit as it was difficult to patch.

The Apache Log4j security flaw opened the door to millions of computers, but the extent of the damage still isnt fully understood. Nearly a year later, federal officials and Congress are still discussing how to avoid another potential disaster.

Open source, which is code that is open to everyone to use or edit, can be found in nearly every type of modern technology. It has served as the backbone of the internet, and is pervasive throughout the economy including in the energy sector.

That makes it a looming issue for energy cybersecurity.

Of course, [the Energy Department] is concerned about open-source software, said Cheri Caddy, a former senior adviser at DOE who is currently director of cyber policy and plans at the Office of the National Cyber Director. Open-source software is a part of all software development, whether its [operational technology] or IT. Its just ubiquitous in everything now.

The Log4j security lapse highlighted some of the key concerns: The development team was small, the software was found in nearly every industry, and many companies were unsure if they even had the code in their products.

The problem, experts say, is not that open source is inherently less secure than proprietary software. Its not. But a few lines of code can be adopted throughout an entire industry.

When those few lines contain a serious vulnerability, that can be a problem for critical infrastructure, including the grid. It can become an open door that allows malicious hackers to walk into critical systems especially when utilities arent aware that the door even exists.

In the energy sector, open-source software is everywhere, said Virginia Wright, an energy cybersecurity portfolio program manager at Idaho National Laboratory (INL).

Wright manages a DOE grid vulnerability testing bed called Cyber Testing for Resilient Industrial Control Systems (CyTRICS). The program, run by six DOE labs and led by INL, ferrets out vulnerabilities in the software that runs the power grid.

One hundred percent of the systems that we have looked at have contained open-source software, Wright said.

CyTRICS works on a voluntary basis with some of the biggest grid equipment manufacturers, like Hitachi Energy and Schweitzer Engineering Laboratories. Once a vulnerability is found, the lab reaches out to the manufacturers with potential mitigation measures to help patch the bug.

Sometimes that includes publicly known vulnerabilities. Because open-source software is freely available and widely used, vendors may not be aware that a vulnerability and patch even exist, Wright said.

Wright said that the labs have seen grid equipment vendors selling older versions of their products with known vulnerabilities and fixes. Some of that software is even updated in those vendors own systems, and their customers are buying it with all of the vulnerabilities attached, Wright said.

To avoid software with vulnerabilities, utilities need to employ a pretty rigorous evaluation and testing process on their own, she said.

The bipartisan infrastructure bill codifies and places the CyTRICS program under the Cyber Sense program. By September of next year, DOE aims to analyze around 10 percent of critical components in energy systems and expand the programs voluntary partnerships to cover around 15 percent of market share, according to DOEs two-year performance goal.

DOE also launched a pilot program for an energy-focused software bill of materials, which is similar to the food industrys ingredient label. Such a label, experts say, can increase visibility into the software that runs critical infrastructure.

Congress also has begun to take further action. Sens. Gary Peters (D-Mich.) and Rob Portman (R-Ohio) the chair and ranking member, respectively, of the Senate Homeland Security and Governmental Affairs Committee have moved forward legislation that would direct the Cybersecurity and Infrastructure Security Agency to study ways to mitigate risks in critical infrastructure that uses open-source software.

The transparency of open-source software means that malicious hackers can look at the source code to find new vulnerabilities, said Keith Lunden, manager of cyber physical threat analysis at cybersecurity firm Mandiant.

However, its a two-way street. Cybersecurity researchers have the same access, so they can identify and fix those vulnerabilities before malicious hackers have a chance to exploit them, Lunden said.

And unlike proprietary software, open-source software doesnt have a shelf life. Vendors will eventually stop supporting a software product; the same isnt true for open-source. For industrial systems that are designed to operate for decades, that longevity is key.

With open-source software, the community has access to the source, and they can independently develop patches indefinitely, which can be an important factor for OT security, Lunden said.

At least thats the idea.

The flexibility of open source can mean that its constantly branching into new code: Individuals and companies may adapt it for their use, potentially creating new vulnerabilities.

Thomas Pace, co-founder of cybersecurity firm NetRise and a former DOE contractor in industrial control security, said he knows of a major telecommunications vendor that will take open-source software and rewrite portions of the code.

That just then introduces a different set of problems, right? Because now you have to maintain your own code versus the whole community maintaining the code, he said. Is that better, is that worse? Thats a debate.

An open-source bug can also mean widespread risk. In 2014, hackers took advantage of a massive vulnerability in an open-source encryption program called OpenSSL.

But the incident, called Heartbleed, was a single vulnerability. Once the bug is fixed, the onus is on vendors and owners to patch their system. If, instead, each software vendor created their own version of OpenSSL, there would be multiple vulnerabilities in each version.

So its about a trade-off, said Wright.

The discovery of the Log4j vulnerability prompted the White House to hold an open-source software security summit last January. The meeting which included top U.S. cyber experts, agency officials and open-source leaders like the Linux Foundation aimed to improve federal and private collaboration so the software would be more secure.

In the months since, the Cybersecurity and Infrastructure Security Agency has promoted the use of a software bill of materials as a step to secure open-source software. CISA also plans to work with the open-source security community to identify commonly used code in critical infrastructure, in an effort to better understand where collaboration can take place.

But the agency highlighted that it can be a challenge to work with an open-source community when, by definition, its open to anyone. While there are some foundations that promote open-source development, software is often developed by small teams or single individuals.

In the meantime, CISA, the National Security Agency and Office of the Director of National Intelligence released best practices for open source developers to better secure their code.

As for the Log4j vulnerability, significant risk remains, according to a report this year from the Department of Homeland Securitys Cyber Safety Review Board.

The board, created by executive order in 2021, found that systems using the vulnerable Log4j version would be a major issue for perhaps a decade or longer.

The report concludes that the vulnerability did not lead to significant cyberattacks to critical infrastructure.

But NetRises Pace called that an impossible statement, and even the report notes that its not so cut-and-dried.

While cybersecurity vendors were able to provide some anecdotal evidence of exploitation, no authoritative source exists to understand exploitation trends across geographies, industries, or ecosystems. Many organizations do not even collect information on specific Log4j exploitation, and reporting is still largely voluntary, the board wrote in the report.

In short, organizations themselves sometimes arent aware that they have been targeted by malicious hackers. There is no list of where the Log4j software is installed.

The report also highlights the security risks unique to the thinly-resourced, volunteer-based open source community. It calls for centralized resources to help developers ensure their code is created to the latest security standards.

Just as the software industry has enabled the democratization of software programming the ability for anyone to generate software with little or no formal training we must also democratize security by banking security by default into the platforms used to generate, build, deploy, and manage software at scale, the report concludes.

Excerpt from:
Open source to open door: Software emerges as risk to the grid - E&E News

Why is Integrated Development Environment (IDE) Important? – Spiceworks News and Insights

An integrated development environment or IDE is defined as a software platform that facilitates the creation of other software applications by providing a space to write, compile, and debug code, sometimes with value-adding tools that reduce development efforts. This article explains IDEs different types and benefits and the top 12 options you can use.

An integrated development environment or IDE is a software platform that facilitates the creation of other software applications by providing a space to write, compile, and debug code, sometimes with value-adding tools that reduce development efforts.

Before the rise of integrated development environments in the early 90s, software developers had to write their code in a text editor like Notepad and then run it in a separate compiler. They would then have to observe all the errors, return to the text editor, and make changes to the code. This made software development an extremely cumbersome process as coding, compiling, and debugging happened in disjointed workflows.

The introduction of IDEs in the late 1980s changed all of this. Softlab Munich launched the worlds first integrated development environment, Maestro I, which came to be installed by thousands of programmers worldwide. Eventually, Microsoft came up with its own IDE, Visual Basic (VB), which became enormously popular. With Visual Basic, IDEs entered the mainstream technical lexicon and became an indispensable part of the development and DevOps lifecycle.

See More: What Is Version Control? Meaning, Tools, and Advantages

To fully answer the question, what is an integrated development environment? we need to look at the critical IDE components that make it work. These are:

Using the IDE is a relatively simple process. It does not require any special skills from a developer apart from coding skills, knowledge of development systems, and a basic familiarity with the IDE platforms features. Since every integrated development environment is slightly different (apart from offering the five essential components), one should know about the top applications in this segment.

See More: What Is Jenkins? Working, Uses, Pipelines, and Features

IDEs have existed for many years. Over time, IDEs have transformed from a simple platform for debugging and testing to an interconnected software package that functions as an extension of the developer. The integrated component distinguishes the finest IDE software from standard code-editing tools. Below are some of the best solutions available now for a coding experience that is simple and rich in features:

Microsoft Visual Studio is an integrated development environment (IDE) for creating programs with graphical user interfaces and consoles. It also supports websites, web apps, online services, and Windows Forms and WPF applications. Visual Studio has a code editor that supports IntelliSense (the component for code completion) and code refactoring. Additional installed tools include an integrated debugger, a code profiler, a GUI designer, a web developer, a class designer, and a database schema designer.

Eclipse is among the most well-known integrated development environments (IDEs) for Java. It is a desktop program that runs on several platforms. Eclipses user interface is among its most compelling features. It also supports drag-and-drop capabilities. One may also perform a static analysis on your code. Additionally, it supports debugging and profiling.

Netbeans is an open-source and free IDE. Ideal for tweaking existing projects or developing from scratch, NetBeans has an intuitive drag-and-drop interface and a multitude of helpful project templates. It is generally used for Java application development, although you may acquire packages that enable other languages.

Amethyst 2 is an integrated development environment (IDE) created by Huw Collingbourne and Dermot Hogan in 2006. Amethyst 2 is available in two editions: Amethyst Ultimate, a paid version, and Amethyst Personal, a free edition. Amethyst Ultimate offers several tools, such as Amethyst Designer, a debugger, code refactoring, etc.

Android Studio, the official Android IDE, offers the most straightforward tools for developing apps for all Android devices. Combining a configurable build system and a rapid build/deploy system enables developers to concentrate on creating feature-rich, high-quality applications and deliver promptly. Additionally, it offers an entirely free IDE.

See More: What Is Serverless? Definition, Architecture, Examples, and Applications

BlueJ is intended for university course administration and operates on Mac OS X, Windows, Linux, and other Java-based systems. It allows newcomers to begin immediately without being overwhelmed by options. BlueJ is pre-installed on the Raspberry Pi image as part of the Raspbian distribution. It is most suitable for individual programmers or small-scale software development companies. Developers may evaluate their programs and interact with brand-new items.

Komodo is accessible to almost all programmers since it supports most prominent programming languages. The simplified UI facilitates complex editing. Komodo is a commonly used IDE for mobile and web development due to its Syntax Checker and one-step troubleshooting (or debugging) capabilities. It integrates with CVS, Bazaar, Mercurial, Git, Subversion, and Perforce version control systems.

C-Free is a free integrated development environment (IDE) for C and C++ development that may be used either as an editor or as a standalone programming environment. One may independently modify, develop, and debug applications using a single, consistent process with embedded tools and capabilities that increase your skills. C-Free is also compact, with a 14MB installation size and an unpacked size of 80MB.

IntelliJ IDEA is a Java-based IDE for writing applications in Java, Kotlin, Groovy, and other JVM-based programming languages. It was created by JetBrains and is offered in two variants the official commercial edition and the Apache 2 community edition. The Ultimate edition of the IDE offers connected versioning systems, database management systems, and build or packaging tools.

AWS Cloud9 is a cloud-based IDE hosted by Amazon Web Services (AWS) that enables users to create, execute, and debug code using only a web browser. It comes with a code editor, a debugger, and a terminal. Cloud9 has pre-installed tools for major programming languages, such as JavaScript, Python, PHP, and others. With Cloud9, you can instantly offer your programming environment to your colleagues, allowing you to pair applications and monitor each others actions in real time. It also provides a smooth development experience for serverless apps.

Selenium IDE refers to Selenium Integrated Development Environment. This Firefox extension allows users to record their activities and export them as scripts in various computer languages. The recording function of Selenium IDE offers an intuitive interface for creating automated tests. The recording and replay function makes learning very simple with minimum programming language experience.

Numerous Java developers are acquainted with the local IDE Eclipse, which has been prominent for some time. It is the cloud-based edition that provides developers with a variety of capabilities. It is open-source, open to hosting on a users infrastructure, and compatible with public and private clouds and on-premises servers. Eclipse Che is consistent with a broad range of programming frameworks and languages. It is a Kubernetes-native IDE that facilitates centrally hosted workspaces with a single click.

See More: DevOps Roadmap: 7-Step Complete Guide

The global market for IDEs is worth billions of dollars, and it includes a variety of IDEs. The most noteworthy are:

Cloud-based IDEs are beginning to gain popularity. The features of these web-first IDEs are fast expanding, and all large manufacturers will probably need to provide one to remain competitive. Cloud-based IDEs allow developers to access their work from any location. Nitrous and AWS Cloud9 are both cloud-based development environment platforms that support Ruby, Python, Node.js, and other languages.

There are specialized IDEs for developers who work in a single language. CodeLite and C-Free for C/C++, Jikes and Jcreator for Java, Idle for Python, and RubyMine for Ruby/Rails are other instances. However, there has recently been a shift toward multilingual IDEs for their versatility. Sometimes, through plugins, developers may also get support for additional languages. Flycheck, for instance, is a syntax-checking plugin for GNU Emacs 24 that supports 39 different languages.

The multilanguage IDEs support many programming languages. Eclipse supports languages such as Perl, C, C++, Ruby, Python, Java, and PHP, among others. It is an open-source and free editor for several frameworks for software development. It started as a Java programming environment but has since grown by adding plugins. This integrated development environment is governed and supervised under the aegis of the Eclipse.org Consortium.

HTML application development environments are among the most prevalent IDEs available. For instance, DreamWeaver, HomeSite, and FrontPage automate several website development-related processes. These are crucial for building web-based software as a service (SaaS).

There are specialized IDEs for mobile development, such as Titanium Mobile from Appcelerator and PhoneGap. Numerous IDEs, particularly multilingual ones, include mobile-development plugins. Eclipse, for instance, has similar features. Xcode also enables the Swift and Objective-C programming languages and the Cocoa Touch and Cocoa APIs. This integrated development environment (IDE) is dedicated to creating Mac and iOS apps and contains an iPad/iPhone simulation creator and GUI designer.

See More: Top 10 DevOps Automation Tools in 2021

Developers use various tools throughout the authoring, creation, and testing phases of software development. Text editors, code libraries, software for tracking bugs, compilers, and testing platforms are some of the most prevalent development tools. Without an IDE, a developer must independently select, install, connect, and manage these tools.

An integrated development environment incorporates multiple development-related technologies into a single framework. When all utilities are displayed on a single workbench, developers do not need to spend countless hours learning how to use each one independently. This is especially useful for novice developers who may utilize an IDE to discover a teams essential processes and tools.

Integrated development environments (IDEs) are extremely important for DevOps teams for the following reasons:

Without an IDE interface, programmers must configure numerous development tools individually. By combining an IDE, developers may access the identical list of capabilities in one location, eliminating the need to often transfer between tools. Integration of development responsibilities more tightly also increases developer efficiency. No longer must programmers move between applications to complete tasks. In addition, the IDEs tools and features assist programmers in organizing resources, preventing errors, and implementing shortcuts.

A group of software developers and DevOps engineers will stick to a standardized method of operations by working within the same development environment. If the integrated development environment (IDE) provides preset templates or if code libraries are shared across multiple individuals or teams working on the same project, one may enforce standards further. It also governs the development process, making it easier for programmers to collaborate and enabling recruits to get prepped quickly so they can start as soon as possible.

Instead of working like a code editor, the IDE will do additional checks to guarantee that the code is error-free and enable users to compile the code so that they may execute it instantly. Whether one is a language-specific developer or not, this may save time and reduce the number of intermediary stages in any process.

See More: What is Root-Cause Analysis? Working, Templates, and Examples

Cloud-based IDEs may interface with several open-source management solutions through plugins and application programming interfaces (APIs). Numerous open-source code management systems are often compatible with cloud-based IDEs. GitHub is a cloud-based code-sharing and version control application that enables users to build their workflows. Bitbucket is an additional code collaboration platform that many developers use in their tech stack; it connects with developers preferred cloud IDEs and provides users with limitless private repositories. It is versatile because it can import across CodePlex, Git, and Google Code.

Developers require a compiler to convert source code to an executable. The compiler turns source code into platform-specific machine code. Compilers and associated development tools, including debuggers and profilers, are generally included inside an integrated development environment (IDE). Most compilers are intended to operate with a particular IDE or editor.

When constructing via the command line, makefiles may supply the compiler with instructions on constructing the executable. Many programmers prefer utilizing an integrated development environment (IDE) rather than makefiles because it gives all the necessary tools in a single location and avoids incompatibility concerns between multiple compilers and target systems.

Integrated development environments (IDEs) boost developer productivity, decrease installation time and accelerate development activities by keeping developers informed of the most current threats, best practices, and standardizing the development cycle so everyone can participate. They enable programmers to consider their actions in terms of the complete software development life cycle (SDLC) instead of a number of different activities.

Despite these advantages that render integrated development environments highly essential to businesses, there are a few things to keep in mind. While application security is a top concern for developers, handling security testing in an IDE can be very difficult. In addition, it is difficult for young engineers to master an IDE in addition to coding. In addition, sometimes complex coding techniques and shortcuts obfuscate essential but everyday language nuances. When studying a new language, paying close attention to minor details is vital. Utilizing an IDE may make it more challenging to learn a new language.

Developers use integrated development environments to facilitate their job. They aid in streamlining and simplifying the coding process, particularly for complicated codes. The scale of the project and other criteria, like version control system, and programming languages, influence the selection of an IDE.

See More: DevOps vs. Agile Methodology: Key Differences and Similarities

Integrated development environments (IDEs) are among the essential components of a DevOps toolkit. It helps you write code without errors and speeds up build processes. In recent years, IDEs have evolved in leaps and bounds, allowing you to develop apps for multiple devices even for IoT, such as smart cars. IDE adoption has become easier, thanks to the cloud and IDE-as-a-Service. In short, there is no shortage of options to choose from when selecting the best IDE for your needs.

Did this article help you understand the meaning and importance of IDEs? Tell us on Facebook, Twitter, and LinkedIn. Wed love to hear from you!

Image Source: Shutterstock

Go here to see the original:
Why is Integrated Development Environment (IDE) Important? - Spiceworks News and Insights