Software licensed to ensure source code usage rights
POPULARITY
Categories
Guest Trent Van Epps Panelists Eriol Fox | Victory Brown Show Notes In this episode of Sustain, host Eriol Fox and co-host Victory Brown are at the Devconnect Conference in Buenos Aires with Trent Van Epps, an organizer of Protocol Guild and member of the Ethereum Foundation. They discuss the vital role of Protocol Guild in funding core protocol developers, addressing systemic issues of under-compensation in open-source projects. Trent also explores the similarities and differences between funding in the open-source community and the Ethereum ecosystem, emphasizing the importance of collective representation and the unique financial structures of blockchain technology. The conversation highlights the necessity of diversity and inclusion within the Ethereum community and shares insights on the impact of adverse regulatory pressures and funding challenges. Press download now! [00:00:29] Trent explains Protocol Guild and he connects Guild work to his EF role coordinating network upgrades and ensuring stable funding and continuity. [00:02:35] Trent tells us why core contributors are under compensated and notes there's a “hot ball of money” problem. [00:05:21] Eriol and Trent discuss discomfort around money in open source. the myth of pure altruism, and the reality that “you can't eat your code.” [00:06:28] What can open source learn from Ethereum? Trent points to classic charitable giving practices and highlights Ethereum's difference and stresses that funding can be used as a political lever. [00:11:07] Trent contrasts different contributor needs and points out diversity/heterogeneity as essential to Ethereum's robustness and security. [00:15:40] Trent describes tight social bonds in Ethereum formed by “youth of the ecosystem” and shared regulatory pressures, which push the community to cooperate defensively, and he talks about how Protocol Guild operates like a loose union/syndicate. [00:20:03] He outlines their funding vehicle called the 1% Pledge. [00:22:07] Trent acknowledges high-profile scams and speculative excess get media attention, overshadowing serious work, like the technological waves with railroads. He points to Argentina, Kenya, and other places with weak institutions. [00:24:59] Eriol closes the discussion with a call to widen your bubble. [00:26:08] Trent's project spotlight is ZKP2P and a great book by Benjamin Birkinbine. Also, he shares where you can find him on the internet. Links podcast@sustainoss.org richard@sustainoss.org SustainOSS Discourse SustainOSS Mastodon SustainOSS Bluesky SustainOSS LinkedIn Open Collective-SustainOSS (Contribute) Richard Littauer Socials Eriol Fox X Victory Brown X Trent Van Epps X Devconnect- 2025, Buenos Aires, Argentina, 17-22 November Ethereum Ethereum Foundation Protocol Guild ZKP2P Incorporating the Digital Commons: Corporate Involvement in Free and Open Source Software by Benjamin J. Birkinbine Credits Produced by Richard Littauer Edited by Paul M. Bahr at Peachtree Sound Show notes by DeAnn Bahr Peachtree Sound Logistical support by Tina Arboleda from Digital Savvies Special Guest: Trent Van Epps.
In this episode of the Crazy Wisdom Podcast, host Stewart Alsop sits down with Jake Hamilton, founder of Groundwire and Nockbox, to explore zero-knowledge proofs, Bitcoin identity systems, and the intersection of privacy-preserving cryptography with AI and blockchain technology. They discuss how ZK proofs could offer an alternative to invasive identity verification systems being rolled out by governments worldwide, the potential for continual learning AI models to shift the balance between centralized and open-source development, and why building secure, auditable computing infrastructure on platforms like Urbit matters more than ever as we face an explosion of AI agents and automated systems. Jake also explains Nockchain's approach to creating a global repository of cryptographically verified facts that can power trustless programmable systems, and how these technologies might converge to solve problems around supply chain security, personal data sovereignty, and resistance to censorship.Timestamps00:00 Introduction to Groundwire and Knockbox02:48 Understanding Zero-Knowledge Proofs06:04 Government Adoption of ZK Proofs08:55 The Future of Identity Verification11:52 AI and ZK Proofs: A New Era14:54 The Role of Urbit in Technology18:03 The Impact of COVID on Trust20:51 The Evolution of AI and Data Privacy23:47 The Future of AI Models26:54 The Need for Local AI Solutions29:51 Interoperability of Knockchain and BitcoinKey Insights1. Zero-Knowledge Proofs Enable Privacy-Preserving Verification: Jake explains that ZK proofs allow you to prove computational outcomes without revealing the underlying data. For example, you could prove you're over 18 without exposing your full identity or driver's license information. The proof demonstrates that a specific program ran through certain steps and reached a particular conclusion, and validating this proof is fast and compact. This technology has profound implications for age verification, identity systems, and protecting privacy while maintaining necessary compliance, potentially offering a middle path between surveillance states and complete anonymity.2. Government Adoption of Privacy Technology Remains Uncertain: There are three competing motivations driving government identity verification systems: genuine surveillance desires, bureaucratic efficiency seeking, and legitimate child protection concerns. Jake believes these groups can be separated, with some officials potentially supporting ZK-based solutions if positioned correctly. He notes the EU is exploring ZK identity verification, and UK officials have shown interest. The key is framing privacy-preserving technology as protection against "the swamp" rather than just abstract privacy benefits, which could resonate with certain political constituencies.3. The COVID Era Destroyed Institutional Trust at Unprecedented Scale: The conversation identifies COVID as potentially the largest institutional trust-burning event in human history, with numerous institutions simultaneously losing credibility with large portions of the population. This represents a dramatic shift from the boomer generation's default trust in authority figures and mainstream media. This collapse is compounded by the incoming AI revolution, creating a perfect storm where established bureaucracies cannot adapt quickly enough to manage rapidly evolving technology, leaving society in fundamentally unmanageable territory.4. Centralized AI Models Create Dangerous Dependencies: Both speakers acknowledge growing dependence on centralized AI services like Claude, with some users spending thousands monthly on tokens. This dependency creates vulnerability to price increases and service disruptions. Jake advocates for local AI deployment using models like DeepSeek R1, running on personal hardware to maintain control and privacy. The shift toward continuous learning models will fundamentally change the AI landscape, making personal data harvesting even more valuable and raising urgent questions about compensation and consent for training data contribution.5. High-Quality Training Data Is Becoming the Primary AI Bottleneck: Stewart argues that AI development is now limited more by high-quality training data than by compute power. The industry has exhausted easily accessible internet data and body-shop-style data labeling. Companies are now using specialized boutique services with techniques like head-mounted cameras for live-streaming world model training. This scarcity is subtly driving price increases across AI services and will fundamentally reshape the economics of AI development, with implications for who controls these increasingly powerful systems.6. Urbit Offers a Foundation for Trustworthy Computing: Jake positions Urbit as essential infrastructure for the AI age because its 30,000-line codebase (versus Unix's three million lines) can be understood by individual humans. Its deterministic, purely functional, and strictly typed design aims for eventual ossification—software that doesn't require constant security patches. This "tiny and diamond perfect" approach addresses the fundamental insecurity of systems requiring monthly vulnerability patches. In an era of AI agents and potential prompt injection attacks, having verifiable, comprehensible computing infrastructure becomes existentially important rather than merely desirable.7. Nockchain Creates a Global Repository of Provable Truth: Jake's vision for Nockchain combines ZK proofs with blockchain technology to create a globally available "truth repository" where verified facts can be programmatically accessed together. This enables smart contracts or programs gated on combinations of proven facts—such as temperature readings from secure devices, supply chain events, and payment confirmations. By using Nock's abstract, simple design optimized for ZK proof generation, the system can validate complex real-world conditions without exposing underlying data, creating infrastructure for coordinating action based on verifiable private information at global scale.
Der Titel der heutigen Episode ist: Digitale Kolonie oder Souveränität? Europa steckt in einer Reihe von Herausforderungen, eine davon ist, wie wir die immer durchdringendere Digitalisierung zu unserem Vorteil nutzen und die damit verbundenen Risiken minimieren können. Ich freue mich besonders, für dieses sehr wichtige Thema zwei Gesprächspartner zu haben: Wilfried Jäger und Kevin Mallinger. Wilfried hat in Wien technische Physik studiert und anschließend eine Postdoc-Stelle im Bereich „Industrial Policy” am MIT in den USA angenommen. Danach war er als Berater mit Schwerpunkt IT-Einsatz tätig. Seine Konzernlaufbahn konzentrierte sich auf physische Infrastrukturen, zunächst im Bereich Eisenbahn und später im Rechenzentrumsbetrieb. Diese Tätigkeit hatte er auch in der Verwaltung inne, bis er vor ca. 8 Jahren den Schwerpunkt auf KI in der Verwaltung legte. Seine Interessensschwerpunkte sind digitale Infrastrukturen und Open-Source-Software. Neben der beruflichen Tätigkeit, und dies ist für diese Episode ebenfalls sehr wichtig, hat er vor mehr als 15 Jahren den Verein OSSBIG mitgegründet, der das Thema Unabhängigkeit und Souveränität auf unterschiedlichen Ebenen propagiert. Kevin ist Leiter der Forschungsgruppe Complexity and Resilience und verantwortlich für die anwendungsorientiere Forschung im Forschungszentrum SBA Research in Wien.Er ist im Bereich der Informatik und Komplexitätsforschung mit einem besonderen Schwerpunkt auf nachhaltige Technologien. Außerdem leitet er bei der Österreichischen Computer Gesellschaft die Arbeitsgruppe Informatik und Nachhaltigkeit. Digitale Souveränität ist aktuell in aller Munde, besonders in Europa, aber ist es schlicht ein Buzzword, alter Wein in neuen Schläuchen oder relevant und wichtig? Ich nehme in diesem Podcast von Buzzword-Themen Abstand. Daher ist es aus meiner Beobachtung eine wesentliche Diskussion, die wohl seit mindestens 25 Jahren schwelt, und gerade wieder gehyped wird, dennoch aber von fundamentaler Bedeutung ist. Aber zunächst gehen wir einen Schritt zurück: Viele Zuhörer sind keine Techniker — warum ist Software und digitale Souveränität überhaupt ein Thema? Vor einigen Jahrzehnten war es noch schwer, die gesellschaftliche Bedeutung in der Breite der Gesellschaft klar genug zu machen, auch wenn die technisch/ökonomische schon einigen klar war. So erklärt sich unter anderem auch die Gründung der OSSBIG, von der Wilfried erzählt. Digitalisierung hat nun die gesamte Gesellschaft sehr offensichtlich in jeder alltäglichen Dimension durchdrungen — damit werden auch Abhängigkeiten und Gefahren in der Breite deutlicher. Was ist somit unter der Plattformisierung digitaler Infrastrukturen zu verstehen? Was sind die Folgen? Die gesamte Prozesskette ist ungleich komplexer geworden und damit natürlich auch die Fortpflanzung von Fehlern und Abhängigkeiten ausgeprägter. Hinzu kommt der evolutionäre Aspekt von Technik, das heißt, Neues wird immer auch auf Altem aufgebaut, was neue Herausforderungen mit sich bringt. Diese Situation ist eben keine rein technische mehr, sondern ist zu einer komplexen Gemengelage aus technischen, geopolitischen, militärischen und wirtschaftlichen Themen geworden. Das macht die Sache natürlich nicht einfacher. Wie sehen wir digitale Souveränität und Autonomie? Wer ist souverän, in welcher Hinsicht? Welche Rolle spielen andere Schlagworte in diesem Umfeld, etwa Komplexität, Open Source und Open Protocol, Netzwerkeffekte? Ein Indikator für die Explosion an IT-Services und Diensten und daraus folgender Komplexität: »Wir haben IPV6 eingeführt, weil wir mussten — das hat mehr IP-Adressen als es Atome im Weltall gibt.« Welche Rolle spielen Marktmechanismen in diesem Kontext? Wie werden neue Technologien eingeführt? Was können wir aus der Vergangenheit lernen? »Aus Spaß wird Ernst und aus Ernst wird Infrastruktur.« Technik ist meist ein zweischneidiges Schwert: »Auf der einen Seite gewinnen wir Freiheiten, auf der anderen Seite schaffen wir Abhängigkeiten auf einer anderen, meist systemischen Ebene.« Diese Abhängkeiten, diese Infrastruktur muss heute sogar global betrachtet werden. Single Points of Failure sind nicht mehr theoretisch, sondern immer wieder zu beobachten. »Durch die Komplexität verlieren wir den Überblick.« Abhängigkeiten gehen weit über die IT hinaus und sind teiweise zirkulär. Was bedeutet dies konkret? Software ist zwar ein virtuelles Gut, aber wird dadurch noch schneller weltumspannend wirksam. Wie wirkt Evolution in der Software? innerhalb einer Organisation marktwirtschaftlicher Wettbewerb zwischen Unternehmen Open Source — wir funktioniert Evolution hier? Welche Auswirkungen hat das auf Eigentumsrechte, Verantwortlichkeit, Motivation, Zentralität vs. Dezentralität? Wer hat noch Kontrolle über die Systeme, die entwickelt werden und die sich evolutionär weiterentwickeln? Es kommen wieder die häufig genannten Fragen auf: Wo findet Steuerung und Kontrolle statt und wo soll sie vernünftigerweise stattfinden? Kann man Komplexität überhaupt sinnvoll zentralisieren? »Der Steuerungsmechanismus kann nicht weniger komplex sein als das System selber.« Kehren wir also wieder zu den frühen kybernetischen Erkenntnissen und Problemen zurück? Das wurde von W. Ross Ashby (und Stafford Beer) als Law of Requisite Variety bezeichnet. Was ist Edge Computing? Wie können verteilte Ansätze hier weiterhelfen? Aber wie schafft man die Abwägung zwischen größeren strategischen Überlegungen und operativen taktischen Entscheidungen? Wie lösen wir das Koordinationsproblem? Warum ist es weiter problematisch, Open Source und kommerzielle Software klar trennen zu wollen? Was ist nun die Überlappung zwischen Open Source/Protocol und Souveränität? »Souveränität bedeutet, dass ich genügend Handlungsoptionen in einem komplexen Umfeld habe. Jeder Mechanismus, der mir das ermöglicht, erhöht meine Souveränität.« Was sind Software-agnostische Daten? Was sind Protokolle und warum sind solche, die sich als Standard etabliert haben, kaum mehr wegzubekommen? Was bedeutet dies im Kontext der digitalen Souveränität? Software — alles schnell, Programme von gestern spielen keine Rolle mehr, jeden Tag eine neue App? Oder läuft wesentliche Software über Jahrzehnte, oder noch länger? Und die Daten, mit denen operiert wird, haben noch wesentlich längere Lebenszyklen. Wie gehen wir im Zeitalter der Digitalisierung damit um? Es gibt auch in der Privatindustrie Beispiele, wo Geschäftsfälle Daten und Code über ein Jahrhundert gewartet und betrieben werden müssen. Was bedeutet dies vor allem auch für die gesellschaftliche Kontrolle dieser Infrastrukturen. Ich provoziere: Wenn wir aber der Realität der letzten Jahrzehnte ins Auge blicken so sind wir (in Europa) nicht längst eine digitale Kolonie und versuchen jetzt den Zwergenaufstand? Kein einziges der weltweit größten 25 Unternehmen (die ersten zehn fast ausschließlich IT-Unternehmen) ist europäisch und auch in einer Bewertung kritischer Technologien und deren Führerschaft spielt Europa keine Rolle. Haben wir also in Europa in allen wesentlichen Aspekten den Anschluss verloren? Was gibt es überhaupt noch zu tun? Wilfried bringt die »Gegenprovokation«: »Jedes System erlebt, bevor es zusammenkracht, seine große Blüte.« Wer wird gewinnen? Der Tyrannosaurus Rex oder die Säugetiere? Ist diese Metapher zutreffend? Welche unserer Provokationen gewinnt?
Künstliche Intelligenz produziert neue Milliardäre. Der Machtzuwachs großer Tech-Konzerne bringe Demokratien in Gefahr, warnt die Programmierin Aya Jaff. Sie plädiert für mehr Open-Source-Software, um Deutschlands digitale Souveränität zu stärken. Zerback, Sarah www.deutschlandfunk.de, Interviews
Arbeiten ohne von den USA digital abhängig zu sein - geht das überhaupt? Schleswig-Holstein macht ernst und hat in der Verwaltung alle Microsoft-Produkte durch Open-Source-Software ersetzt. Der Umstieg war und ist allerdings alles andere als einfach. Burmeister, Michael www.deutschlandfunkkultur.de, Studio 9
nerdcafe. Der Podcast rund um WordPress, Hosting, CMS und Web.
Willkommen im nerdcafe – dem Podcast für alle, die mehr aus ihrer WordPress-Website machen wollen und sich für Vielfalt im Netz interessieren. Musik verbindet - Hier gehts zur nerdcafe Playlist: https://play.nerdcafe.online Heute zu Gast ist Michael Kornmann. Michael und ich kennen uns von einem Netzwerk, dass es schon gar nicht mehr gibt. Anfangs war alles virtuell, dann sind wir aber auch außerhalb des Netzes in Kontakt gekommen und nach Ende des Netzwerks geblieben. Mittlerweile kennen wir uns persönlich und haben auch schon einige Projekte gemeinsam umgesetzt. Michael ist Datenschutz-Experte und der DSB für mich selbst und einige meiner Kund*innen. Außerdem ist er Inhaber der QS Kornmann und hier auch Ansprechpartner für Datenschutz, Qualitätsmanagement für mich und meine Kund*innen. Wir haben deswegen heute gesprochen über: Digitale Tools, unser Lieblingsthema Datenschutz, Toolstack, Linux, die nextcloud, allgemein Open Source Software, Abo-Modelle, Premium Modelle und KI. Offenlegung: Wir haben die Episode kurz vor Jahreswechsel aufgenommen, sie kann also (viele) Spuren von Ironie, Albernheit und Quatsch beinhalten. Was ist das nerdcafe? Im nerdcafe Podcast dreht sich alles um WordPress, Webdesign, Hosting, Content-Management-Systeme, digitale Barrierefreiheit und Vielfalt im Netz, also alle großen Fragen rund ums Web. Du bekommst praxisnahe Tipps zu Sicherheit, Backups, SEO und Social Media – perfekt für Dich, wenn du mit Deinem eigenen Website-Projekt starten möchtest.
Fraktionen im Landtag wollen mehr Open Source Software für das Saarland - Druck auf britischen Premierminister Starmer steigt - Französischer Notenbankchef kündigt vorzeitigen Rückzug an
In this episode, we trace how open-source software shaped crypto, why value capture remains hard beyond Layer 1s, how rollups and infrastructure borrowed the wrong mental models, and where AI is forcing a rethink of software business models, incentives, and trust. Enjoy!Thanks for tuning in! – Follow Myles: https://x.com/MylesOneil Follow Xavier: https://x.com/0xave Follow Mike: https://x.com/MikeIppolito_ – Subscribe on YouTube: https://bit.ly/3R1D1D9 Subscribe on Apple: https://apple.co/3pQTfmD Subscribe on Spotify: https://spoti.fi/3cpKZXH Get top market insights and the latest in crypto news. Subscribe to Blockworks Daily Newsletter: https://blockworks.co/newsletter/ —-- Timestamps (00:00) Introduction (01:49) The Evolution of Software and Open Source (08:13) Red Hat and Commercial Open Source Software (14:41) The Rise of Open Core Companies (19:21) Cloud Computing and Open Source Software (21:40) The Intersection of Open Source and Crypto (23:17) The Role of Layer 1s in Monetization (29:22) Layer 2s: Business Models and Challenges (55:30) AI's Disruption of B2B SaaS and Open Source (01:04:41) Final Thoughts —-- Disclaimer: Nothing said on Bell Curve is a recommendation to buy or sell securities or tokens. This podcast is for informational purposes only, and any views expressed by anyone on the show are solely our opinions, not financial advice. Mike, Jason, Michael, Vance and our guests may hold positions in the companies, funds, or projects discussed, and our guests may hold positions in the companies, funds, or projects discussed.
Spätestens seitdem Donald Trump wieder im Weißen Haus sitzt, geistert die „Digitale Souveränität“ verstärkt durch die politischen Diskussionen. Die Bundesrepublik hat mittlerweile ein eigenes Zentrum dafür (ZenDiS) und einen Fonds, der sich zur Agentur gemausert hat (Sovereign Tech Fund/Agency). Aber ist jetzt das Schlagwort „Digitale Souveränität“ der Türöffner für mehr Open-Source-Software in Behörden, Verwaltungen, Schulen und anderen öffentlichen Einrichtungen, oder erweist sich das als Bumerang? Sind Big Tech, die doch viel in Linux und Open Source investieren, wirklich das Problem? In dieser Sonderfolge des c't uplink, die live auf dem 39. Chaos Communication Congress (39C3) aufgezeichnet wurde, blicken wir kritisch auf den Begriff „Digitale Souveränität“. Welche Konzepte sich dahinter verbergen, diskutiert c't-Redakteur Keywan Tonekaboni mit seinen Gästen Anne Roth, Bonnie Mehring und Sven Neuhaus. Gemeinsam sprechen sie darüber, welche Probleme sich aus dem Schlagwort ergeben und warum es nur so langsam vorwärtsgeht mit freier Software in der öffentlichen Hand. Mit dabei: - Anne Roth, Referentin für Digitalpolitik bei der Fraktion Die Linke im Deutschen Bundestag - Bonnie Mehring, Senior-Projekt-Managerin Free Software Foundation Europe (FSFE) - Sven Neuhaus, Tech Lead Open-Source-Produkte, Zentrum Digitale Souveränität (ZenDiS) Moderation: Keywan Tonekaboni Produktion: Özgür Uludaǧ mit freundlicher Unterstützung des c3voc (https://c3voc.de/)
Spätestens seitdem Donald Trump wieder im Weißen Haus sitzt, geistert die „Digitale Souveränität“ verstärkt durch die politischen Diskussionen. Die Bundesrepublik hat mittlerweile ein eigenes Zentrum dafür (ZenDiS) und einen Fonds, der sich zur Agentur gemausert hat (Sovereign Tech Fund/Agency). Aber ist jetzt das Schlagwort „Digitale Souveränität“ der Türöffner für mehr Open-Source-Software in Behörden, Verwaltungen, Schulen und anderen öffentlichen Einrichtungen, oder erweist sich das als Bumerang? Sind Big Tech, die doch viel in Linux und Open Source investieren, wirklich das Problem? In dieser Sonderfolge des c't uplink, die live auf dem 39. Chaos Communication Congress (39C3) aufgezeichnet wurde, blicken wir kritisch auf den Begriff „Digitale Souveränität“. Welche Konzepte sich dahinter verbergen, diskutiert c't-Redakteur Keywan Tonekaboni mit seinen Gästen Anne Roth, Bonnie Mehring und Sven Neuhaus. Gemeinsam sprechen sie darüber, welche Probleme sich aus dem Schlagwort ergeben und warum es nur so langsam vorwärtsgeht mit freier Software in der öffentlichen Hand.
Spätestens seitdem Donald Trump wieder im Weißen Haus sitzt, geistert die „Digitale Souveränität“ verstärkt durch die politischen Diskussionen. Die Bundesrepublik hat mittlerweile ein eigenes Zentrum dafür (ZenDiS) und einen Fonds, der sich zur Agentur gemausert hat (Sovereign Tech Fund/Agency). Aber ist jetzt das Schlagwort „Digitale Souveränität“ der Türöffner für mehr Open-Source-Software in Behörden, Verwaltungen, Schulen und anderen öffentlichen Einrichtungen, oder erweist sich das als Bumerang? Sind Big Tech, die doch viel in Linux und Open Source investieren, wirklich das Problem? In dieser Sonderfolge des c't uplink, die live auf dem 39. Chaos Communication Congress (39C3) aufgezeichnet wurde, blicken wir kritisch auf den Begriff „Digitale Souveränität“. Welche Konzepte sich dahinter verbergen, diskutiert c't-Redakteur Keywan Tonekaboni mit seinen Gästen Anne Roth, Bonnie Mehring und Sven Neuhaus. Gemeinsam sprechen sie darüber, welche Probleme sich aus dem Schlagwort ergeben und warum es nur so langsam vorwärtsgeht mit freier Software in der öffentlichen Hand. Mit dabei: - Anne Roth, Referentin für Digitalpolitik bei der Fraktion Die Linke im Deutschen Bundestag - Bonnie Mehring, Senior-Projekt-Managerin Free Software Foundation Europe (FSFE) - Sven Neuhaus, Tech Lead Open-Source-Produkte, Zentrum Digitale Souveränität (ZenDiS) Moderation: Keywan Tonekaboni Produktion: Özgür Uludaǧ mit freundlicher Unterstützung des c3voc (https://c3voc.de/)
Links James on LinkedIn (https://www.linkedin.com/in/jahuang/) Mike on LinkedIn (https://www.linkedin.com/in/dominucco/) Mike's Blog (https://dominickm.com) Show on Discord (https://discord.com/invite/k8e7gKUpEp) Alice Promo (https://go.alice.dev/data-migration-offer-hands-on) AI on Red Hat Enterprise Linux (RHEL) Trust and Stability: RHEL provides the mission-critical foundation needed for workloads where security and reliability cannot be compromised. Predictive vs. Generative: Acknowledging the hype of GenAI while maintaining support for traditional machine learning algorithms. Determinism: The challenge of bringing consistency and security to emerging AI technologies in production environments. Rama-Llama & Containerization Developer Simplicity: Rama-Llama helps developers run local LLMs easily without being "locked in" to specific engines; it supports Podman, Docker, and various inference engines like Llama.cpp and Whisper.cpp. Production Path: The tool is designed to "fade away" after helping package the model and stack into a container that can be deployed directly to Kubernetes. Behind the Firewall: Addressing the needs of industries (like aircraft maintenance) that require AI to stay strictly on-premises. Enterprise AI Infrastructure Red Hat AI: A commercial product offering tools for model customization, including pre-training, fine-tuning, and RAG (Retrieval-Augmented Generation). Inference Engines: James highlights the difference between Llama.cpp (for smaller/edge hardware) and vLLM, which has become the enterprise standard for multi-GPU data center inferencing.
Guests Rynn Mancuso | Maryblessing Okolie | Mo McElaney Panelist Richard Littauer | Eriol Fox Show Notes In this episode of Sustain, Richard and Eriol talk with members of the Organization for Ethical Source (OES), Rynn Mancuso, Maryblessing Okolie, and Mo McElaney, about how ethics, licensing, and codes of conduct intersect in open source. They unpack the origins and challenges of the Hippocratic License, the community driven overhaul of Contributor Covenant 3.0, what it really takes to collaborate across borders and cultures, and how OES is now turning its attention to ethical AI, translations and practical resources for communities to make it a safer and more inclusive space. They also suggest ways for listeners to get involved in these important initiatives. Hit download now! [00:02:17] Rynn gives the elevator pitch on what the Organization for Ethical (OES) is. [00:04:57] Mo explains the Hippocratic License is modeled on “do no harm” and it's an open source license. [00:06:06] Richard wonders if the Hippocratic License is open source since we're not using OSI's definition. Mo explains that OES still uses “open source” in a broader, “big tent” sense focused on work done in the open, and Rynn adds why definitions need to evolve. [00:09:27] Rynn shares rewriting the Contributor Covenant 3.0, starting from their background, to being a limited scope, and getting feedback from translators that language was too American/Western and 3.0 needed a broader cultural fit. [00:15:12] Maryblessing was brought in to lead v3.0 from an African, non-US perspective and to make the process community driven. She tells us what's new in the Contributor Covenant 3.0. [00:19:43] The discussion covers how they all worked together. It was a highly collaborative, consensus driven process where anyone could propose edits. They talk about how long it took, not work entirely on GitHub, and why not everything was public. [00:24:59] We hear about some adoption challenges for codes of conduct for small projects and enterprises. [00:28:53] Rynn, Mo, and Maryblessing touch on how they are approaching ethical AI work, they share options to support OES, how to get involved, and translation needs. Quotes [00:12:32] “It was a very limited scope, and we always designed it to work on the internet and be for open source projects.” [00:13:23] “I would get these problems that really had to do with caste, but nobody would say anything about caste.” [00:16:37] “This new version also emphasizes restorative justice, and we're keen on using inclusive languages.” [00:17:06] “We're making progress on bringing in African translation.” [00:17:38] “One of the things we did with the new website was to include the CC3 builder which was going to help make it easy for people to adapt the code of conduct.” [00:21:37] “Every bit of feedback we got, we took it seriously, we talked about it.” [00:22:13] “It took is a year and six months to do the entire thing, to make sure people were available. It took that long because we wanted to make sure we were incorporating every feedback.” [00:23:14] “We do not do everything in the open on GitHub. One reason is structural. GitHub is not great at document management. Another reason we do that is we've received a lot of harassment form groups on the internet that were frankly invested in being able to cause trouble for a lot of people.” [00:29:14] “We're in the early stages of considering how we could approach ethical AI.” Spotlight [00:33:12] Mo's spotlight is for more folks to get involved with this project and other projects through the OES. [00:33:34] Rynn's spotlight is a shoutout to the folks at IBM and RedHat and Dev/Mission and JVS where they volunteer. [00:35:25] Maryblessing's spotlight is all the amazing people that helped put together the Contributor Covenant v.3.: Greg Cassel, Coraline Ada Ehmke, Gerardo Lisboa, Rynn Mancuso, Mo McElaney, Maryblessing Okolie, Ben Sternthal, and Casey Watts. [00:36:11] Eriol's spotlight is the OpenSSF Working Group on Securing Software Repositories. [00:36:44] Richard's spotlight is a fun paper called, Paradoxes of Openness: Trans Experiences in Open Source Software by Hana Frluckaj, Nikki Stevens, James Howison, and Laura Dabbish. Links SustainOSS (https://sustainoss.org/) podcast@sustainoss.org (mailto:podcast@sustainoss.org) richard@sustainoss.org (mailto:richard@sustainoss.org) SustainOSS Discourse (https://discourse.sustainoss.org/) SustainOSS Mastodon (https://mastodon.social/tags/sustainoss) SustainOSS Bluesky (https://bsky.app/profile/sustainoss.bsky.social) SustainOSS LinkedIn (https://www.linkedin.com/company/sustainoss/) Open Collective-SustainOSS (Contribute) (https://opencollective.com/sustainoss) Richard Littauer Socials (https://www.burntfen.com/2023-05-30/socials) Eriol Fox X (https://x.com/EriolDoesDesign) Rynn Mancuso LinkedIn (https://www.linkedin.com/in/rynnmancuso/) Maryblessing Okolie LinkedIn (https://www.linkedin.com/in/maryblessingokolie/?originalSubdomain=ng) Mo McElaney LinkedIn (https://www.linkedin.com/in/maureenmcelaney/) Organization For Ethical Source (OES) (https://ethicalsource.dev/) OES- What We Do (https://ethicalsource.dev/what-we-do/) OES-What We Believe (https://ethicalsource.dev/what-we-believe/) Donate-The Organization for Ethical Source (Open Collective) (https://opencollective.com/ethical-source) Contributor Covenant (https://www.contributor-covenant.org/) Contributor Covenant 3.0 Code of Conduct (https://www.contributor-covenant.org/version/3/0/code_of_conduct/) Code of conduct enforcement guidelines (MDN Web Docs) (https://developer.mozilla.org/en-US/docs/MDN/Community/Community_Participation_Guidelines) Coraline Ada Ehmke (https://en.wikipedia.org/wiki/Coraline_Ada_Ehmke) Ethical Source- Beacon (https://github.com/EthicalSource/beacon) Adopt Contributor Covenant (https://www.contributor-covenant.org/adopt/) Resources for Community Moderators (https://www.contributor-covenant.org/resources/) Dev/Mission (https://devmission.org/) JVS (Jewish Vocational Services) (https://jvs.org/) Techtonica (https://techtonica.org/) OpenSSF Working Group on Securing Software Repositories (https://github.com/ossf/wg-securing-software-repos) Paradoxes of Openness: Trans Experiences in Open Source Software (ACM Digital Library) (https://dl.acm.org/doi/abs/10.1145/3687047) Credits Produced by Richard Littauer (https://www.burntfen.com/) Edited by Paul M. Bahr at Peachtree Sound (https://www.peachtreesound.com/) Show notes by DeAnn Bahr Peachtree Sound (https://www.peachtreesound.com/) Special Guests: Maryblessing Okolie, Maureen Mcelaney, and Rynn Mancuso.
- Traffic Lights with AI and GPS - "The Big Short" Investor Targets Tesla - Tesla's China Sales Up - Chinese Take 38% Global Market Share - New Huawei UX Aimed at Global Markets - Ford Making Europe-Only Bronco - Momenta Files for IPO - NVIDIA's Open Source AV Software - Toyota Teases Sports Car Assault
- Traffic Lights with AI and GPS - "The Big Short" Investor Targets Tesla - Tesla's China Sales Up - Chinese Take 38% Global Market Share - New Huawei UX Aimed at Global Markets - Ford Making Europe-Only Bronco - Momenta Files for IPO - NVIDIA's Open Source AV Software - Toyota Teases Sports Car Assault
Support the show by becoming a patron at tuxdigital.com/membership or get some swag at tuxdigital.com/store Hosted by: Ryan (DasGeek) = dasgeek.net Jill Bryant = jilllinuxgirl.com And Special Guest = Sherard Griffin https://www.redhat.com/en/authors/sherard-griffin 00:00:00 Intro 00:02:59 Community Feedback 00:13:02 Sandfly Security Segment 00:15:53 Main Topic: Linux, AI, and the End of Distro Wars? 00:47:32 Ryan's Essential Linux Apps: Must Installs on Every Setup 01:02:59 OMG! A new Steam Machine 01:15:55 Outro
“I am one of those ‘woke communists' you worry about,” says Linux founder, Linus Torvalds. Plus: Why Free and Open Source Software is neither Socialist nor Communist.More from The Lunduke Journal:https://lunduke.com/ This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit lunduke.substack.com/subscribe
From AI-powered code generation boosting productivity to adversaries using the same tools to hunt zero-days, the panel exposes the coming wave of AI-fueled cyberattacks—and why most companies aren't ready for it. Cotton blocks Trump-backed effort to make daylight saving time permanent The End of Cybersecurity Amazon says it didn't cut 14,000 people because of money. It cut them because of 'culture' Here's How the AI Crash Happens US government is getting closer to banning TP-Link routers Neato cloud shutdown sees robocleaners robbed of their smarts FCC will vote to scrap telecom cybersecurity requirements Trump FCC Votes To Make It Easier For Your Broadband ISP To Rip You Off Swedish Death Cleaning But for Your Ditital Life The F5 Hack is a Big Deal OpenAI Releases Agentic Security Researcher 'Do not trust your eyes': AI generates surge in expense fraud Proton Data Breach Observatory aims to alert you in near real-time Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked YouTube denies AI was involved with odd removals of tech tutorials 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea. Samsung's $2000 smart fridges are getting ads - gHacks Tech News ESPN, ABC, and other Disney channels go dark on YouTube TV Host: Leo Laporte Guests: Jill Duffy, Alex Stamos, and Stacey Higginbotham Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: ziprecruiter.com/twit zscaler.com/security miro.com canary.tools/twit - use code: TWIT Melissa.com/twit
From AI-powered code generation boosting productivity to adversaries using the same tools to hunt zero-days, the panel exposes the coming wave of AI-fueled cyberattacks—and why most companies aren't ready for it. Cotton blocks Trump-backed effort to make daylight saving time permanent The End of Cybersecurity Amazon says it didn't cut 14,000 people because of money. It cut them because of 'culture' Here's How the AI Crash Happens US government is getting closer to banning TP-Link routers Neato cloud shutdown sees robocleaners robbed of their smarts FCC will vote to scrap telecom cybersecurity requirements Trump FCC Votes To Make It Easier For Your Broadband ISP To Rip You Off Swedish Death Cleaning But for Your Ditital Life The F5 Hack is a Big Deal OpenAI Releases Agentic Security Researcher 'Do not trust your eyes': AI generates surge in expense fraud Proton Data Breach Observatory aims to alert you in near real-time Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked YouTube denies AI was involved with odd removals of tech tutorials 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea. Samsung's $2000 smart fridges are getting ads - gHacks Tech News ESPN, ABC, and other Disney channels go dark on YouTube TV Host: Leo Laporte Guests: Jill Duffy, Alex Stamos, and Stacey Higginbotham Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: ziprecruiter.com/twit zscaler.com/security miro.com canary.tools/twit - use code: TWIT Melissa.com/twit
From AI-powered code generation boosting productivity to adversaries using the same tools to hunt zero-days, the panel exposes the coming wave of AI-fueled cyberattacks—and why most companies aren't ready for it. Cotton blocks Trump-backed effort to make daylight saving time permanent The End of Cybersecurity Amazon says it didn't cut 14,000 people because of money. It cut them because of 'culture' Here's How the AI Crash Happens US government is getting closer to banning TP-Link routers Neato cloud shutdown sees robocleaners robbed of their smarts FCC will vote to scrap telecom cybersecurity requirements Trump FCC Votes To Make It Easier For Your Broadband ISP To Rip You Off Swedish Death Cleaning But for Your Ditital Life The F5 Hack is a Big Deal OpenAI Releases Agentic Security Researcher 'Do not trust your eyes': AI generates surge in expense fraud Proton Data Breach Observatory aims to alert you in near real-time Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked YouTube denies AI was involved with odd removals of tech tutorials 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea. Samsung's $2000 smart fridges are getting ads - gHacks Tech News ESPN, ABC, and other Disney channels go dark on YouTube TV Host: Leo Laporte Guests: Jill Duffy, Alex Stamos, and Stacey Higginbotham Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: ziprecruiter.com/twit zscaler.com/security miro.com canary.tools/twit - use code: TWIT Melissa.com/twit
From AI-powered code generation boosting productivity to adversaries using the same tools to hunt zero-days, the panel exposes the coming wave of AI-fueled cyberattacks—and why most companies aren't ready for it. Cotton blocks Trump-backed effort to make daylight saving time permanent The End of Cybersecurity Amazon says it didn't cut 14,000 people because of money. It cut them because of 'culture' Here's How the AI Crash Happens US government is getting closer to banning TP-Link routers Neato cloud shutdown sees robocleaners robbed of their smarts FCC will vote to scrap telecom cybersecurity requirements Trump FCC Votes To Make It Easier For Your Broadband ISP To Rip You Off Swedish Death Cleaning But for Your Ditital Life The F5 Hack is a Big Deal OpenAI Releases Agentic Security Researcher 'Do not trust your eyes': AI generates surge in expense fraud Proton Data Breach Observatory aims to alert you in near real-time Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked YouTube denies AI was involved with odd removals of tech tutorials 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea. Samsung's $2000 smart fridges are getting ads - gHacks Tech News ESPN, ABC, and other Disney channels go dark on YouTube TV Host: Leo Laporte Guests: Jill Duffy, Alex Stamos, and Stacey Higginbotham Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: ziprecruiter.com/twit zscaler.com/security miro.com canary.tools/twit - use code: TWIT Melissa.com/twit
From AI-powered code generation boosting productivity to adversaries using the same tools to hunt zero-days, the panel exposes the coming wave of AI-fueled cyberattacks—and why most companies aren't ready for it. Cotton blocks Trump-backed effort to make daylight saving time permanent The End of Cybersecurity Amazon says it didn't cut 14,000 people because of money. It cut them because of 'culture' Here's How the AI Crash Happens US government is getting closer to banning TP-Link routers Neato cloud shutdown sees robocleaners robbed of their smarts FCC will vote to scrap telecom cybersecurity requirements Trump FCC Votes To Make It Easier For Your Broadband ISP To Rip You Off Swedish Death Cleaning But for Your Digital Life The F5 Hack is a Big Deal OpenAI Releases Agentic Security Researcher 'Do not trust your eyes': AI generates surge in expense fraud Proton Data Breach Observatory aims to alert you in near real-time Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked YouTube denies AI was involved with odd removals of tech tutorials 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea. Samsung's $2000 smart fridges are getting ads - gHacks Tech News ESPN, ABC, and other Disney channels go dark on YouTube TV Host: Leo Laporte Guests: Jill Duffy, Alex Stamos, and Stacey Higginbotham Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: ziprecruiter.com/twit zscaler.com/security miro.com canary.tools/twit - use code: TWIT Melissa.com/twit
From AI-powered code generation boosting productivity to adversaries using the same tools to hunt zero-days, the panel exposes the coming wave of AI-fueled cyberattacks—and why most companies aren't ready for it. Cotton blocks Trump-backed effort to make daylight saving time permanent The End of Cybersecurity Amazon says it didn't cut 14,000 people because of money. It cut them because of 'culture' Here's How the AI Crash Happens US government is getting closer to banning TP-Link routers Neato cloud shutdown sees robocleaners robbed of their smarts FCC will vote to scrap telecom cybersecurity requirements Trump FCC Votes To Make It Easier For Your Broadband ISP To Rip You Off Swedish Death Cleaning But for Your Digital Life The F5 Hack is a Big Deal OpenAI Releases Agentic Security Researcher 'Do not trust your eyes': AI generates surge in expense fraud Proton Data Breach Observatory aims to alert you in near real-time Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked YouTube denies AI was involved with odd removals of tech tutorials 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea. Samsung's $2000 smart fridges are getting ads - gHacks Tech News ESPN, ABC, and other Disney channels go dark on YouTube TV Host: Leo Laporte Guests: Jill Duffy, Alex Stamos, and Stacey Higginbotham Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: ziprecruiter.com/twit zscaler.com/security miro.com canary.tools/twit - use code: TWIT Melissa.com/twit
This show has been flagged as Clean by the host. This is more going over what I like about taskwarrior rather than a comprehensive guide, please check https://taskwarrior.org/docs/start/ for a more comprehensive quickstart. Taskwarrior is Free and Open Source Software that manages your TODO list from the command line. It is flexible, fast, and unobtrusive. It does its job then gets out of your way. Provide feedback on this episode.
Im Silicon Valley wächst die Sorge vor einer Spekulationsblase rund um Künstliche Intelligenz (KI) – einer KI-Blase. Tech-Unternehmen wie OpenAI oder NVIDIA steigen stark an der Börse. Doch Beobachter vermuten, dass diese Bewertungen nicht mehr dem tatsächlichen Wert der Unternehmen entsprechen. Weitere Themen: · Am Wochenende ist die Lage zwischen Pakistan und Afghanistan eskaliert: Taliban-Kämpfer haben pakistanische Grenzposten angegriffen. Dabei wurden auf beiden Seiten dutzende Menschen getötet. Zuletzt ist es am Dienstag zu weiteren gewaltsamen Zusammenstössen gekommen. · Ab dem 1. November gelten in den USA neue Exportkontrollen für «kritische Software». Da US-Software auch in der Schweiz weit verbreitet ist, wächst hierzulande die Sorge über die Abhängigkeit der Schweizer Behörden von amerikanischer Software. Eine mögliche Lösung besteht darin, vermehrt auf Open-Source-Software zu setzen. · In Kanada sorgt ein stillgelegter Freizeitpark in Niagara Falls für Schlagzeilen. Im «Marineland» leben noch immer 30 Belugas. Der Park droht, die Weisswale einzuschläfern, falls die kanadische Regierung keine finanzielle Hilfe leistet.
For episode 611 of the BlockHash Podcast, host Brandon Zemp is joined by Tim Lewis, Co-founder of tea.xyz.Tea Protocol's CoinList token launch comes at a pivotal moment as critical open-source infrastructure faces a funding crisis. With Shipyard ceasing support for libp2p, the networking backbone powering Ethereum, IPFS, and $100B+ worth of blockchain networks, on September 30th due to resource constraints, Tea.xyz's blockchain-based solution for compensating open-source maintainers has never been more relevant. Founded by Homebrew creator Max Howell, Tea represents the convergence of crisis and solution, demonstrating how crypto can finally solve real infrastructure problems rather than fueling speculation. ⏳ Timestamps: (0:00) Introduction(1:17) Who is Tim Lewis?(6:10) What is Tea Protocol?(10:36) Solutions for open source software development(18:45) Dev incentivization & contributors(20:52) Tea Token Sale(22:47) Tea roadmap(26:12) Events & Conferences(27:25) Tea website, socials & community
Destination Linux, DL 437, Linux Podcast, Open Source, Linux News, NVIDIA, Intel, AI Alliance, CUDA on Linux, Ubuntu CUDA, Steam Malware, Gaming Security, Trojan Virus, Vivaldi AI, Privacy Concerns, Scapy, Network Tool, Linux Community, Open Source
Software supply chain veteran Brian Fox unpacks the security implications of the new EU Cyber Resilience Act and its profound impact on open-source projects. He reveals the hidden infrastructure risks threatening open-source projects and shares insights for senior software leaders navigating this regulatory landscape. Read a transcript of this interview: http://bit.ly/46nxjUM Subscribe to the Software Architects' Newsletter for your monthly guide to the essential news and experience from industry peers on emerging patterns and technologies: https://www.infoq.com/software-architects-newsletter Upcoming Events: InfoQ Dev Summit Munich (October 15-16, 2025) Essential insights on critical software development priorities. https://devsummit.infoq.com/conference/munich2025 QCon San Francisco 2025 (November 17-21, 2025) Get practical inspiration and best practices on emerging software trends directly from senior software developers at early adopter companies. https://qconsf.com/ QCon AI New York 2025 (December 16-17, 2025) https://ai.qconferences.com/ QCon London 2026 (March 16-19, 2026) https://qconlondon.com/ The InfoQ Podcasts: Weekly inspiration to drive innovation and build great teams from senior software leaders. Listen to all our podcasts and read interview transcripts: - The InfoQ Podcast https://www.infoq.com/podcasts/ - Engineering Culture Podcast by InfoQ https://www.infoq.com/podcasts/#engineering_culture - Generally AI: https://www.infoq.com/generally-ai-podcast/ Follow InfoQ: - Mastodon: https://techhub.social/@infoq - X: https://x.com/InfoQ?from=@ - LinkedIn: https://www.linkedin.com/company/infoq/ - Facebook: https://www.facebook.com/InfoQdotcom# - Instagram: https://www.instagram.com/infoqdotcom/?hl=en - Youtube: https://www.youtube.com/infoq - Bluesky: https://bsky.app/profile/infoq.com Write for InfoQ: Learn and share the changes and innovations in professional software development. - Join a community of experts. - Increase your visibility. - Grow your career. https://www.infoq.com/write-for-infoq
Ralf ist verhindert und wir begrüßen dafür erneut Luka in unserer Runde. Roddi ist zurück aus China und berichtet von seiner Reise an die chinesische Ostküste. Tim und Luka wiederum waren in Schweden und erzählen von ihrer Teilnahme an der Goatmire-Konferenz. Wir reden über das Open Vehicle Control System, einem zu einem Elektroauto umgebauten Verbrenner-Polo, der komplett durch Open Source Software gesteuert wird, über ein weiteres Computational Music System namens Sonic Pi, die IoT-Distributions- und Betriebsplattform Nerves des Elixir-Ökosystems und einen Badge-Prototyp für den 39C3, den Tolino-E-Reader, Dithering und ein wenig den in der letzten Woche vorgestellten Applekram. Dann nehmen wir uns noch mal AI vor und schauen auf das Paper von OpenAI wie sie glauben das Halluzinationsproblem in den Griff bekommen zu können und den AutoCodeBenchmark bei dem Tencent 30 LLMs auffordert in 20 verschiedenen Programmiersprachenen 6800 Programmieraufgaben zu lösen und ihr werdet nicht glauben, was dabei am besten abgeschnitten hat.
In the world of Free and Open Source Software, you don't owe any subscription fees, your work isn't fed into an AI, and your money can go where it matters - to your team and your games. But is anything ever TRULY free? Well, it turns out, sometimes yes. In this presentation, we'll go over some incredible products in the FOSS ecosystem that you can and should adopt into your tech stack, what the expectations are for being a part of an open source community, and what risks and benefits are involved with abandoning big tech subscriptions in favor of open source.
My guest this week, Rémi Delaporte-Mathurin from MIT, Cambridge, Massachusetts/US, will tell us about the first Open Source Software in Fusion Energy (OSSFE) conference from earlier 2025 - but also why it is important to use and develop open source software in the field and the difficulties he met during his career. Links:https://ossfe.github.io/OSSFE_2025/ The conference websitehttps://ossfe.github.io/OSSFE_2025/plot some conference statshttps://www.youtube.com/@OSSFE-conf OSSFE YouTube channelhttps://github.com/OSSFE the main website of OSSFEhttps://join.slack.com/t/ossfeworkspace/shared_invite/zt-31yacoitt-yl1aAPLxkm5NkCdv8VpfNg Slack channel for OSSFEhttps://ossfe.github.io/OSSFE_2026/ next year's conferencehttps://zenodo.org/communities/ossfe OSSFE on Zenodohttps://www.linkedin.com/in/remidelaportemathurin/ Rémi on LinkedInGet in touchThank you for listening! Merci de votre écoute! Vielen Dank für´s Zuhören! If you're like to support this show, you can leave a little tip at https://en.tipeee.com/code-for-thought-podcast/ Contact Details/ Coordonnées / Kontakt: Email mailto:peter@code4thought.org UK RSE Slack (ukrse.slack.com): @code4thought or @piddie US RSE Slack (usrse.slack.com): @Peter Schmidt Mastodon: https://fosstodon.org/@code4thought or @code4thought@fosstodon.org Bluesky: https://bsky.app/profile/code4thought.bsky.social LinkedIn: https://www.linkedin.com/in/pweschmidt/ (personal Profile)LinkedIn: https://www.linkedin.com/company/codeforthought/ (Code for Thought Profile) This podcast is licensed under the Creative Commons Licence: https://creativecommons.org/licenses/by-sa/4.0/
This week on The Business of Open Source, I spoke with Rob Taylor, CTO/CSO and founder of ChipFlow. Although ChipFlow is unambiguously a software company, it creates software that facilitate the creation of semiconductors, so it straddles the software and hardware worlds.Some of the things we talked about include: The state of open source in the semiconductor space, and why that matters. A large part of it is the high cost of proprietary software for chip design, and the fact that there are a lot of barriers to entry, both for the design software and to chip creation. Rob also talked about how an open source approach is the only way to bridge between research institutions and universities and the commercial world — too often, researchers would do brilliant work during a Ph.D. program and then it would be completely lost when they entered the commercial world. On the other hand, open source is little-known and mistrusted in the semiconductor space. Rob described it as a marketing liability, which is why it's downplayed on the company webpage. —> I come across this more often than is often recognized inside the open source bubble. It's one thing to build an open source company in the software infrastructure space, where open source has a positive reputation and is often seen as simply table stakes; it's quite another to build an open source company in a conservative industry where open source doesn't have a positive image. Perhaps the most interesting thing is that this means you have to have a reason other than marketing to build and maintain the open source project. Want to join others to talk about the challenges and opportunities in building open source companies? Join us at Open Source Founders Summit next spring in Paris.
video: https://youtu.be/PdyDXEbu56k This week on Destination Linux, we're putting software to the test with a brand-new community tool at IsItReallyFOSS.com, a site that helps you find out if projects claiming to be open source live up to it. Then Jill takes us through the latest release of Fastfetch 2.49, the modern Neofetch alternative that's quickly becoming the go-to tool for showing off your Linux system specs. Plus we look into a troubling story about a free VPN Chrome extension that secretly spied on users while posing as a trusted privacy tool. All of this and more on this episode of Destination Linux. Sponsored by Sandfly Security: the revolutionary agentless platform designed for Linux. Visit https://destinationlinux.net/sandfly to experience security that's not just effective but gives you peace of mind. No agents. No downtime. Just cutting-edge protection. Forum Discussion Thread (https://destinationlinux.net/forum) Download as MP3 (https://aphid.fireside.fm/d/1437767933/32f28071-0b08-4ea1-afcc-37af75bd83d6/c33d51f6-b767-43ce-bc33-24dae891ab2a.mp3) Support the show by becoming a patron at tuxdigital.com/membership (https://tuxdigital.com/membership) or get some swag at tuxdigital.com/store (https://tuxdigital.com/store) Hosted by: Ryan (DasGeek) = dasgeek.net (https://dasgeek.net) Jill Bryant = jilllinuxgirl.com (https://jilllinuxgirl.com) Michael Tunnell = michaeltunnell.com (https://michaeltunnell.com) Chapters: 00:00 Intro 01:54 Community Feedback 06:36 Sandfly Security 09:37 Let's Play A Game : Is It Really FOSS? 24:45 Fastfetch 2.49: Neofetch Successor 29:33 FreeVPN: Chrome Extension Caught Spying 41:37 Cute Quokka, Mid Wallpaper 47:03 Burp Suite: Intercept, Modify, Repeat 49:53 Support the Show 57:41 Outro 58:15 Post Show
In this episode I chat with the authors of a recent paper on open source security: Open Source, Open Threats? Investigating Security Challenges in Open-Source Software. I chat with Ali Akhavani and Behzad Ousat about their findings. There are interesting data points in the paper such as a 98% increase in reported vulnerabilities compared to a 25% growth in open source ecosystems. We discuss the challenges of maintaining security in a rapidly expanding digital landscape, and learn about the role of community engagement and automated tools in addressing these discrepancies. It's a great paper and a fantastic discussion. The show notes and blog post for this episode can be found at https://opensourcesecurity.io/2025/2025-08-oss-threats-ali-behzad/
with @nayafia and @smc90 Ideas, memes, and vibes are some of the most important drivers of modern technology adoption, marketing, and much more -- and have been much-covered by everyone from Darwin to Dawkins to Girard to many others. Yet the topic of antimemetics -- self-censoring (vs. self-propagating) ideas -- whether something fringe, forgotten, or forbidden -- haven't been studied as much, especially in the context of modern networks. So in this special book-launch episode, we cover the important concept of antimemetics (and memetics) -- focusing on: where and how ideas take off in groups, whether in online chats or other high-shared context communities; how ideas not just spread but are contained, or mutate in strange ways; why packaging ideas matters; and what we can all do to move ideas to action. Where do bureacracy, institutions, and protocols come in? What about tacit knowledge that lies in these communities, how (or do) we make it explicit? What roles -- from truth tellers to champions to individual nodes in networks -- can and do people play in making something go from mere commentary to reality? After all, ideas -- or ideas as viruses -- are how movements happen, how innovation happens, how things change... or don't ever change despite being discussed all the time. Our expert guest in this special book episode (following in our long tradition of sharing what we're reading) is Nadia Asparouhova, the author of the new book, Antimemetics: Why Some Ideas Resist Spreading; she is also the author of the book Working in Public: The Making and Maintenance of Open Source Software. a16z crypto's Sonal Chokshi -- who previously hosted Nadia's book-launch episode for the a16z Podcast and almost a decade before that on the changing culture of open source -- interviews Nadia on these themes, how they connect, and why they matter for the crypto industry and beyond. We also dig into some critiques -- and opportunities for builders -- too, including what happens to the public commons; network propagation including across networks; reality distortion fields; hidden knowledge; and cultural stagnation vs. cultural abundance. All this and more in this episode of web3 with a16z!
GitHub is advocating for a European Union Sovereign Tech Fund to help pay the open source software developers building and maintaining software relied upon by economies and societies just like any other necessary infrastructure like roads and bridges.Apple gets called out by the Open Web Advocacy group saying its technical rules and restrictions are blocking other browser vendors from successfully offering their own search engines to iOS users in the EU.Last episode we talked about Amazon's new AI coding editor Kiro, and this week, we learned about a feature called Agent Hooks which let users write automation tools that agents can use within the IDE to do predefined actions like maintaining code quality, checking for security vulnerabilities, standardizing and enforcing team processes, and more. Think of it like pre-commit hooks but with AI behind them!Timestamps:0:51 - GitHub is advocating for an EU tech fund9:21 - An update on non-WebKit browsers on iOS15:30 - Kiro's agent hooks26:28 - Kilo Code28:35 - eslint-config-prettier got hacked33:15 - @media(hover: hover)36:05 - What's making us happyLinks:Paige - GitHub is advocating for an EU Sovereign Tech FundJack - Kiro's Agent HooksTJ - An update on non-WebKit browsers on iOSKilo Code - open source AI agent VS Code extension (not to be confused with the Kiro fork)Popular npm package eslint-config-prettier got hacked@media(hover:hover)Paige - Relax Meditation appJack - Physical books like the Annihilation seriesTJ - Apple Watch series 10Thanks as always to our sponsor, the Blue Collar Coder channel on YouTube. You can join us in our Discord channel, explore our website and reach us via email, or talk to us on X, Bluesky, or YouTube.Front-end Fire websiteBlue Collar Coder on YouTubeBlue Collar Coder on DiscordReach out via emailTweet at us on X @front_end_fireFollow us on Bluesky @front-end-fire.comSubscribe to our YouTube channel @Front-EndFirePodcast
Liz Steininger is the CEO of Least Authority: a company which specializes in auditing open source software since 2014. Originally founded by Zooko Wilcox, Least Authority has conducted more than 100 security audits in the space. Some of the best known contractors who requested an expert review include the Ethereum Foundation, the Electric Coin Company, Metamask, the KeyStone hardware wallet, and Avalanche. Least Authority also builds products that make use of Zero Knowledge Proofs: PrivateStorage (a cloud storage system that's designed to make the host unaware of the files being stored), ZKAPs (Zero Knowledge Access Passes, an authorization system that separates the payer from the data on the items being bought), and Winden (a file-sharing service that's encrypted and requires no identity from the sender and receiver). In a space which often defers to "check the code, it's open source", companies such as Least Authority offer high quality verification which makes it easier for the average non-technical person to trust that something is safe. Also, it helps builder have the peace of mind that what they're working on will not bring any unforeseen consequences.
For episode 540 of the BlockHash Podcast, host Brandon Zemp is joined by Mike Lieberman CTO and Co-Founder of Kusari.Kusari began in 2022 with the goal to secure the software supply chain. They are passionate about this problem, as they constantly faced the same issue: identifying the software they're using and protecting against threats to that software. This led to slow response to security vulnerabilities, uncertainty about licensing and compliance, and even basic maintenance challenges. Kusari brings transparency and security to software supply chains, providing clarity and actionable insights. ⏳ Timestamps: 0:00 | Introduction1:10 | Who is Mike Lieberman?6:10 | What is Kusari?15:37 | Open-source software GUAC20:00 | Threat landscape in 202528:43 | AI for software security31:03 | Decentralized AI models32:40 | Quantum computing39:27 | Kusari roadmap 202544:32 | Kusari website, socials & community
Software supply chain security has been on the top of minds lately, for a very good reason. With most steps depending on digital infrastructure, there are a lot of opportunities for cyber attacks to happen. At the same time, there is an often silent mistrust in open source software, because it is designed and developed in public environments. People think that because everyone can see the source code, and is aware of some of the bugs in it that aren't fixed yet, it somehow gives them the upper hand to carry out attacks against these projects. There's something odd about this perception though.In this MOSE Shorts segment, Wayne Starr shares his view on the state of software supply chain security in the open source ecosystem. He highlights the XZ incident, and how it was caught because the software was open source. He also highlights that this challenge is also present in closed source software, however, it is much harder to spot. This makes proprietary software even less secure, and you have to work twice as much to ensure that you are well protected when using it. Think about the "SolarWinds vulnerability" as an example.Learn more about:- Why the open environment is an advantage fro security perspective- SBOMs and their applicability and application in different ecosystems, like Go, Python or C- Why it matters how you release software- Can people still be hobbyists in the open source ecosystem?- User experience, air-gapped environments and the Zarf project- The productization work that turns open source projects into products- A case for experimenting with something in the product first, and then implementing it in the upstream project Hosted on Acast. See acast.com/privacy for more information.
Der Messengerdienst Signal oder das Betriebssystem Linux basieren auf Open-Source-Software, das heißt auf freier und kostenloser Software. Das Besondere daran ist, dass der Quellcode bei Open-Source-Software offen liegt. Im Gegensatz zu kommerziellen Angeboten, die oft teuer sind. Getragen wird diese Open-Source-Idee von Millionen Freiwilligen auf der ganzen Welt, die in ihrer Freizeit und meistens unbezahlt coden und auch Fehler im Internet reparieren. Davon profitieren alle. Doch sie tun das manchmal bis zum Burnout. In dieser 11KM-Folge erzählt BR-Journalist André Dér-Hörmeyer vom Podcast Wild Wild Web von der Motivation der Open-Source-Maintainer und warum das Internet ohne sie unsicherer wird. Hier geht's zum Podcast von André Dér-Hörmeyer: „Wild Wild Web“: https://1.ard.de/wild-wild-web In der 11KM-Folge “Kampf um die Wahrheit: Wikipedia in Gefahr” geht es auch um Schwarmintelligenz bzw. Open-Source-Content: https://1.ard.de/11KM_Wikipedia_in_Gefahr Diese und viele weitere Folgen von 11KM findet ihr überall da, wo es Podcasts gibt, auch hier in der ARD Audiothek: https://www.ardaudiothek.de/sendung/11km-der-tagesschau-podcast/12200383/ An dieser Folge waren beteiligt: Folgenautor: Christian Schepsmeier Mitarbeit: Claudia Schaffer, Marc Hoffmann Host: David Krause Produktion: Timo Lindemann, Fabian Zweck, Regina Staerke und Hanna Brünjes Planung: Nicole Dienemann und Hardy Funk Distribution: Kerstin Ammermann Redaktionsleitung: Fumiko Lipp und Lena Gürtler 11KM: der tagesschau-Podcast wird produziert von BR24 und NDR Info. Die redaktionelle Verantwortung für diese Episode liegt beim NDR.
This show has been flagged as Explicit by the host. More Command line fun: downloading a podcast In the show hpr4398 :: Command line fun: downloading a podcast Kevie walked us through a command to download a podcast. He used some techniques here that I hadn't used before, and it's always great to see how other people approach the problem. Let's have a look at the script and walk through what it does, then we'll have a look at some "traps for young players" as the EEVBlog is fond of saying. Analysis of the Script wget `curl https://tuxjam.otherside.network/feed/podcast/ | grep -o 'https*://[^"]*ogg' | head -1` It chains four different commands together to "Save the latest file from a feed". Let's break it down so we can have checkpoints between each step. I often do this when writing a complex one liner - first do it as steps, and then combine it. The curl command gets https://tuxjam.otherside.network/feed/podcast/ . To do this ourselves we will call curl https://tuxjam.otherside.network/feed/podcast/ --output tuxjam.xml , as the default file name is index.html. This gives us a xml file, and we can confirm it's valid xml with the xmllint command. $ xmllint --format tuxjam.xml >/dev/null $ echo $? 0 Here the output of the command is ignored by redirecting it to /dev/null Then we check the error code the last command had. As it's 0 it completed sucessfully. Kevie then passes the output to the grep search command with the option -o and then looks for any string starting with https followed by anything then followed by two forward slashes, then -o, --only-matching Print only the matched (non-empty) parts of a matching line, with each such part on a separate output line We can do the same with. I was not aware that grep defaulted to regex, as I tend to add the --perl-regexp to explicitly add it. grep --only-matching 'https*://[^"]*ogg' tuxjam.xml http matches the characters http literally (case sensitive) s* matches the character s literally (case sensitive) Quantifier: * Between zero and unlimited times, as many times as possible, giving back as needed [greedy] : matches the character : literally / matches the character / literally / matches the character / literally [^"]* match a single character not present in the list below Quantifier: * Between zero and unlimited times, as many times as possible, giving back as needed [greedy] " a single character in the list " literally (case sensitive) ogg matches the characters ogg literally (case sensitive) When we run this ourselves we get the following $ grep --only-matching 'https*://[^"]*ogg' tuxjam.xml https://archive.org/download/tuxjam-121/tuxjam_121.ogg https://archive.org/download/tuxjam-120/TuxJam_120.ogg https://archive.org/download/tux-jam-119/TuxJam_119.ogg https://archive.org/download/tuxjam_118/tuxjam_118.ogg https://archive.org/download/tux-jam-117-uncut/TuxJam_117.ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://archive.org/download/tuxjam_116/tuxjam_116.ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://ogg http://tuxjam.otherside.network/wp-content/uploads/sites/5/2024/10/tuxjam_115_OggCamp2024.ogg https://ogg https://archive.org/download/tuxjam_114/tuxjam_114.ogg https://archive.org/download/tuxjam_113/tuxjam_113.ogg https://archive.org/download/tuxjam_112/tuxjam_112.ogg The last command returns the first line, so therefore https://archive.org/download/tuxjam-121/tuxjam_121.ogg Finally that line is used as the input to the wget command. Problems with the approach Relying on grep with structured data like xml or json can lead to problems. When we looked at the output of the command in step 2, some of the results gave https://ogg . When run the same command without the --only-matching argument we see what was matched. $ grep 'https*://[^"]*ogg' tuxjam.xml This episode may not be live as in TuxJam 115 from Oggcamp but your friendly foursome of Al, Dave (thelovebug), Kevie and Andrew (mcnalu) are very much alive to treats of Free and Open Source Software and Creative Commons tunes. https://tuxjam.otherside.network/tuxjam-115-oggcamp-2024/ https://tuxjam.otherside.network/tuxjam-115-oggcamp-2024/#respond https://tuxjam.otherside.network/tuxjam-115-oggcamp-2024/feed/ With the group meeting up together for the first time in person, it was decided that a live recording would be an appropriate venture. With the quartet squashed around a table and a group of adoring fans crowded into a room at the Pendulum Hotel in Manchester, the discussion turns to TuxJam reviews that become regularly used applications, what we enjoyed about OggCamp 2024 and for the third section the gang put their reputation on the line and allow open questions from the sea of dedicated fans. OggCamp 2024 on Saturday 12 and Sunday 13 October 2024, Manchester UK. Two of the hits are not enclosures at all, they are references in the text to OggCamp what we enjoyed about OggCamp 2024 Normally running grep will only get one entry per line, and if the xml is minimised it can miss entries on a file that comes across as one big line. I did this myself using xmllint --noblanks tuxjam.xml > tuxjam-min.xml I then edited it and replaced the new lines with spaces. I have to say that the --only-matching argument is doing a great job at pulling out the matches. That said the results were not perfect either. $ grep --only-matching 'https*://[^"]*ogg' tuxjam-min.xml https://archive.org/download/tuxjam-121/tuxjam_121.ogg https://archive.org/download/tuxjam-120/TuxJam_120.ogg https://archive.org/download/tux-jam-119/TuxJam_119.ogg https://archive.org/download/tuxjam_118/tuxjam_118.ogg https://archive.org/download/tux-jam-117-uncut/TuxJam_117.ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://archive.org/download/tuxjam_116/tuxjam_116.ogg https://tuxjam.otherside.network/tuxjam-115-ogg https://tuxjam.otherside.network/?p=1029https://tuxjam.otherside.network/tuxjam-115-oggcamp-2024/#respondhttps://tuxjam.otherside.network/tuxjam-115-ogg https://ogg http://tuxjam.otherside.network/wp-content/uploads/sites/5/2024/10/tuxjam_115_OggCamp2024.ogg https://ogg https://archive.org/download/tuxjam_114/tuxjam_114.ogg https://archive.org/download/tuxjam_113/tuxjam_113.ogg https://archive.org/download/tuxjam_112/tuxjam_112.ogg You could fix it by modifying the grep arguments and add additional searches looking for enclosure . The problem with that approach is that you'll forever and a day be chasing issues when someone changes something. So the approach is officially "Grand", but it's a very likely to break if you're not babysitting it. Suggested Applications. I recommend never parsing structured documents , like xml or json with grep. You should use dedicated parsers that understands the document markup, and can intelligently address parts of it. I recommend: xml use xmlstarlet json use jq yaml use yq Of course anyone that looks at my code on the hpr gittea will know this is a case of "do what I say, not what I do." Never parse xml with grep, where the only possible exception is to see if a string is in a file in the first place. grep --max-count=1 --files-with-matches That's justified under the fact that grep is going to be faster than having to parse, and build a XML Document Object Model when you don't have to. Some Tips Always refer to examples and specification A specification is just a set of rules that tell you how the document is formatted. There is a danger in just looking at example files, and not reading the specifications. I had a situation once where a software developer raised a bug as the files didn't begin with ken-test- followed by a uuid . They were surprised when the supplied files did not follow this convention as per the examples. Suffice to say that was rejected. For us there are the rules from the RSS specification itself, but as it's a XML file there are XML Specifications . While the RSS spec is short, the XML is not, so people tend to use dedicated libraries to parse XML. Using a dedicated tool like xmlstarlet will allow us to mostly ignore the details of XML. RSS is a dialect of XML . All RSS files must conform to the XML 1.0 specification, as published on the World Wide Web Consortium (W3C) website. The first line of the tuxjam feed shows it's an XML file. The specification goes on to say "At the top level, a RSS document is a element, with a mandatory attribute called version, that specifies the version of RSS that the document conforms to. If it conforms to this specification, the version attribute must be 2.0." And sure enough then the second line show that it's a RSS file.
In this episode of 'Cybersecurity Today', host Jim Love is joined by panelists Laura Payne from White Tuque and David Shipley from Beauceron Security to review significant cybersecurity events over the past month. The discussion covers various impactful stories such as the disappearance of a professor, a data breach at Hertz, and government officials using a commercial app during a conflict. They dive deep into the ransomware attack on PowerSchool and its implications for K-12 schools in North America. The conversation also highlights the vulnerability of critical infrastructures, including the food supply chain and the importance of robust cybersecurity measures. Finally, the panel touches upon the progression towards post-quantum encryption by major tech companies like AWS and Google, signaling advancements in securing future technologies. 00:00 Introduction and Panelist Welcome 00:20 Major Cybersecurity Incidents of the Month 02:04 PowerSchool Data Breach Analysis 04:11 Ransomware and Double Extortion Tactics 12:20 4chan Security Breach and Its Implications 16:31 Hertz Data Loss and Retail Cybersecurity 17:44 Critical Infrastructure and Cyber Regulation 27:03 The Importance of CVE Database 27:54 Debate on Vulnerability Scoring 30:17 Open Source Software and Geopolitical Risks 31:43 The Evolution and Challenges of Open Source 37:17 The Need for Software Regulation 46:50 Signal Gate and Compliance Issues 54:08 Post-Quantum Cryptography 56:10 Conclusion and Final Thoughts
In this episode of Zero to CEO, I speak with Paula Paul, Founder and Distinguished Engineer at Greyshore, about how companies can drive real value from open source software. With over four decades of experience in tech, Paula shares insights on open source supply chain security, the power of community, and how organizations can adopt cloud-native technologies more efficiently. We also explore the shift from “every company is a tech company” to “every company is a SaaS company,” and Paula reflects on her remarkable journey as a woman in tech since the 1980s. This episode is a must-listen for anyone interested in software innovation, digital transformation, and the future of technology.
Unlock the secrets to entrepreneurial success with host Gabriel Flores on The Shades of Entrepreneurship™ by understanding the role of open source software in empowering businesses. Hear how David Young build Federated Computer's suite of tools is transforming the way entrepreneurs build and customize their infrastructure for optimal performance.Support the showSubscribe at theshadesofe.com
Computer software seems to be everywhere. No matter what kind of computer you use or where you use it, all computers use software. That is the entire point of a computer. However, not all software is the same. There are actually enormous differences between software applications. Not just what they do, but how they were written, the business models behind them, the legal licenses that cover them, and the philosophy behind them. Learn more about free and open source software, what it is, and how it works on this episode of Everything Everywhere Daily. Sponsors Mint Mobile Cut your wireless bill to 15 bucks a month at mintmobile.com/eed Quince Go to quince.com/daily for 365-day returns, plus free shipping on your order! Stitch Fix Go to stitchfix.com/everywhere to have a stylist help you look your best Tourist Office of Spain Plan your next adventure at Spain.info Stash Go to get.stash.com/EVERYTHING to see how you can receive $25 towards your first stock purchase and to view important disclosures. Subscribe to the podcast! https://everything-everywhere.com/everything-everywhere-daily-podcast/ -------------------------------- Executive Producer: Charles Daniel Associate Producers: Austin Oetken & Cameron Kieffer Become a supporter on Patreon: https://www.patreon.com/everythingeverywhere Update your podcast app at newpodcastapps.com Discord Server: https://discord.gg/UkRUJFh Instagram: https://www.instagram.com/everythingeverywhere/ Facebook Group: https://www.facebook.com/groups/everythingeverywheredaily Twitter: https://twitter.com/everywheretrip Website: https://everything-everywhere.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices
David Young's journey to becoming a tech entrepreneur is anything but conventional. His career path took him from studying ancient Greek at Indiana University to Wall Street, and eventually to Silicon Valley, where he founded and scaled successful technology startups, including Joyent. David's latest venture, Federated Computer has attracted funding from top-tier investor, Lightning Ventures.
With John Wolpert, an esteemed speaker, writer and thinker in technology and business innovation. As a CEO, product executive, and advisor, he's been at the vanguard of technological breakthroughs from the early days of the Web to the rise of artificial intelligence. John is known for founding Flywheel, a pioneer in the ride-hailing industry. His work at IBM made him a key figure in the evolution of open source software, blockchain, and AI. He's co-founded global R&D consortia and industry standards bodies, and his thought leadership on Open Innovation has been showcased in the Harvard Business Review. John has led countless new venture workshops and spoken before the European Union and the Australian Parliament in his mission to help organizations work together to solve hard problems.
Fran is the creator and lead maintainer of Zap Store, an open permissionless app store for android and desktop. Zap Store uses nostr and verifiable social reputations to provide users and developers a secure, easy to use, alternative to the walled garden app stores operated by Apple and Google.Fran on Nostr: https://primal.net/p/npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9 Download Zap Store: https://zapstore.dev/EPISODE: 146BLOCK: 875198PRICE: 936 sats per dollarsupport dispatch: https://citadeldispatch.com/donate nostr live chat: https://citadeldispatch.com/stream nostr account: https://primal.net/odell youtube: https://www.youtube.com/@CitadelDispatch podcast: https://serve.podhome.fm/CitadelDispatch stream sats to the show: https://www.fountain.fm/ join the chat: https://citadeldispatch.com/chatlearn more about me: https://odell.xyzOutro Video by Webworthy: https://primal.net/p/npub1rj7eh0eu3skwcyr5adpcjwxft9z4yjdspjryq6gynqw2j49f9a3quqjpw2 (00:00:00) CNBC Intro(00:00:48) MicroStrategy's Bitcoin Strategy with Michael Saylor(00:06:00) Quantum Computing and Bitcoin's Future(00:07:05) US Digital Currency and Stablecoins(00:09:51) MicroStrategy's Addition to Nasdaq 100(00:13:00) Introduction to Citadel Dispatch with Odell(00:15:26) Zapstore: A Permissionless App Store(00:17:37) The Challenges of App Stores and PGP Verification(00:23:41) Nostr's Role in Open Source and Freedom Tech(00:32:07) Security and Verification in Zapstore(00:47:09) Discoverability and Social Layer in App Stores(00:55:03) Monetization and Ethical Business Models(01:04:51) The Future of Zapstore and Open Source Software(01:34:44) Onboarding Challenges in Nostr
Mars Lan, Co-Founder & CTO at Metaphor1, an AI-powered social platform that enhances data governance by empowering all employees, not just data teams, to easily collaborate, search, and share insights through an intuitive, AI-driven interface. Subscribe to the Gradient Flow Newsletter: https://gradientflow.substack.com/Subscribe: Apple • Spotify • Overcast • Pocket Casts • AntennaPod • Podcast Addict • Amazon • RSS.Detailed show notes - with links to many references - can be found on The Data Exchange web site.
Lawfare Fellow in Technology Policy and Law Eugenia Lostri sits down with John Speed Meyers, head of Chainguard Labs, and Paul Gibert, a research scientist at Chainguard Labs to talk about the distinct challenges of securing open source software (OSS). They discuss what sorts of harms OSS compromises can lead to, how Log4J opened a political window for action on OSS security, and how the software liability debate affects OSS developers.Meyers and Gibert authored a Lawfare article questioning the conventional wisdom on how software liability could deal with OSS.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/c/trumptrials.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.