Home > Topics > Open Source

Open Source

Open Source Resource Center

Articles

Zed A. ShawLearn Ruby the Hard Way: A Good First Program
In this excerpt from Learn Ruby the Hard Way: A Simple and Idiomatic Introduction to the Imaginative World Of Computational Thinking with Code, 3rd Edition, Zed Shaw walks you through writing your first Ruby program, and gives you some study drills to help you practice your skills.
Continue reading...
By Zed A. ShawDec 23, 2014
Zed A. ShawLearn Ruby the Hard Way: Comments and Pound Characters
Comments are very important in your programs. They are used to tell you what something does in English, and they are used to disable parts of your program if you need to remove them temporarily. Zed Shaw shows you how you use comments in Ruby, in this chapter from Learn Ruby the Hard Way: A Simple and Idiomatic Introduction to the Imaginative World Of Computational Thinking with Code, 3rd Edition.
Continue reading...
By Zed A. ShawDec 23, 2014
Video: Fundamentals of Data Analytics with Python: Understanding Python's Graphics Data Exploration Tools
In this excerpt from Fundamentals of Data Analytics in Python LiveLessons (Video Training), learn about Python's graphics data exploration tools.
Continue reading...
By Peter Wang, Aron AhmadiaDec 19, 2014
Video: Linux Web Operations Tutorial: Designing Web Application Infrastructure
In this excerpt from Linux Web Operations LiveLessons (Video Training), Ben Whaley talks about designing a web application environment to take into account scalability and security.
Continue reading...
By Ben WhaleyDec 10, 2014

See More Open Source Articles

Blogs

Brad YaleHow to Browse the Web Privately Using a Secure SSH SOCKS Tunnel

There are times when you want to browse the web but you want to do it privately, without being traced. Sure, you could go ahead and utilize the incognito feature built into most major web browsers however to truly browse in anonymity, there is nothing better than utilizing a secure SSH SOCKS Tunnel. In this quick "how-to", we are going to show you how to set up a secure SSH Socks Tunnel enabling you to route all your web traffic through your host.  

Continue reading...
By Brad YaleCommentsJanuary 16, 2015
Topics: Home & Office Computing,General Security and Privacy,Information Technology,Home Networking,Open Source,Microsoft Windows Desktop,Home Networking,Networking,Network Security,Routing & Switching,Network Administration & Management,Security,Linux/UNIX/Open Source,Operating Systems, Server,Network Design & Architecture
John  TraenkenschuhFree Visual Studio?

Just got notice that Microsoft is making a full-featured version of Visual Studio available--for free.  Traenk is happy.

Continue reading...
By John TraenkenschuhCommentsNovember 20, 2014
Topics: Home & Office Computing,Dreamweaver & Flash,ASP .NET,Android,Python,Programming,ASP.NET,Open Source,Ajax,C#,Perl,C/C++,Web Development,Ajax & JavaScript,Ajax and JavaScript,Algorithms,HTML/CSS
Brad YaleWhy Open Source Matters: Musings from All Things Open 2014

A few months back I wrote a post titled "Why Open Source Matters: Musings from OSCON 2014". The post covered five reasons why Open Source matters. Those reasons were/are:


  1. Code, Glitches and Open Source Security
  2. Open Source Software
  3. GitHub
  4. The Stringent Control of Proprietary Software
  5. The Endless Ability to Test, Play and Alter

While those reasons still ring true, I want to use this space to center in on another topic speaking to why Open Source and OSS matters more than ever: project management and time constraints.

Continue reading...
By Brad YaleCommentsOctober 23, 2014
Topics: Information Technology,Software Development & Management,Python,Programming,Open Source,Ruby/Ruby on Rails,Web Services,Perl,Web Development,Mobile Application Development & Programming,Android,Ajax & JavaScript,PHP,Linux/UNIX/Open Source Operating Systems,HTML5 & Web Standards,Process Improvement,Business & Management
Brad YaleMobile Malware and Fake Apps: Hong Kong, China and The New York Times

For the past week or so, Hong Kong has erupted with peaceful demonstrations advocating for the ousting of the Chinese premiere and the right to peacefully and openly elect his replacement. While the Chinese premiere, Xi Jinping, looks to be going nowhere one thing has become clear - the mobile devices and Internet connections which helped to grow the nightly demonstrations are quietly suffering an inward meta problem - malware, viruses and fake applications.

As mobile platforms become more prominent and are used more robustly to organize, carry out financial transactions and conduct daily personal business, the time has come to address mobile malware and fake applications.

Continue reading...
By Brad YaleCommentsOctober 2, 2014
Topics: Windows Phone,Software Security,General Security and Privacy,Information Technology,Open Source,iOS,Mobile Application Development & Programming,Android,Security,HTML5 & Web Standards

See More Open Source Blogs