Open Source - the new evil?
A recent post over at CBR News (that's Comic Book Resources in case you're not into that sort of thing) has more than a couple bloggers amused if not slightly perturbed by the description of the new villain up against Iron Man, Tony Stark.
[Tony Stark] wants to give the world all this amazing technology but he’s nervous when anybody wants to use it... Zeke is a post-national business man and kind of an open source ideological terrorist
hmm... open source and terrorist in the same sentence? Now I'm paying attention! :)
Writer Matt Fraction goes on:
He has absolutely no loyalty to any sort of law, creed, or credo. He doesn’t want to beat Tony Stark, he wants to make him obsolete. Windows wants to be on every computer desktop in the world, but Linux and Stane want to destroy the desktop.
Is this some sort of amazingly genius product placement? Maybe the perceived struggle between the "evil corporation" and the somewhat anarchistic open source community has become part of the social fabric.
I am particularly intrigued by the connection Fraction makes between youth and open source technology.
Everybody was older or the same age as Tony and a technologist isn’t going to be fighting the old guys. It’s going to be the new kid with the new idea. Microsoft doesn’t buy up older companies. They’re always buying up the new kids. So I wanted to introduce a kind of new kid aspect.”
You can follow up on this battle between good(?) and evil(?) with the full story.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Humble Hacker?
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide