CybersecurityGuidesTLS and networking2 Comments20 Min ReadTLS (Transport Layer Security), the compatible successor to SSL (Secure Socket Layer), is the basis of…
CybersecurityGuidesSecurity and cryptography algorithms: A guide2 Comments13 Min ReadThese algorithms have been extensively studied by cryptographers, and open-source implementations have benefited from the scrutiny…
Artificial IntelligenceNewsThe copyright conundrum in artificial intelligence age0 Comments3 Min ReadThe rise of generative AI tools has reignited longstanding debates about copyright law, ownership, and innovation.
CybersecurityGuidesEssential Python web security2 Comments13 Min ReadThis series explores the critical security principles every Python web developer should know. While hard and…
Community ManagementClosing the Gap: Accelerating environmental Open Source2 Comments7 Min ReadA recap of the Open Sustainable Technology project's first four years, focusing on its catalog of…
GuidesPractical Open SourceHow to make reviewing pull requests a better experience1 Comment8 Min ReadPull requests are often time consuming for Open Source maintainers. Here's how to make the process…
Community ManagementOpenSource.Net turns one with a redesign2 Comments1 Min ReadWe're getting a new look and need your input!
GuidesPractical Open SourceMigrating to Open Source databases: A path to innovation0 Comments4 Min ReadPercona CEO Ann Schlemmer on the advantages of Open Source databases to foster innovation while containing…
CybersecurityPractical Open SourceSteady in a shifting Open Source world: FreeBSD’s enduring stability1 Comment5 Min ReadFreeBSD's new release cycle and extended support offer stability and predictability. Here's how to get involved.
Best Open PracticesGuidesBeyond TikTok: Open Source at ByteDance0 Comments3 Min ReadByteDance's Open Source project Monolith is designed to handle high-throughput, low-latency operations, making it perfect for…