Version 2 of Google’s Flutter toolkit adds support for desktop and web apps

At an online event, Google today announced Flutter 2, the newest version of its open-source UI toolkit for building portable apps. While Flutter started out with a focus on mobile when it first launched two years ago, it spread its wings in recent years and with version 2, Flutter now supports web and desktop apps out of the box. With that, Flutter users can now use the same codebase to build apps for iOS, Android, Windows, MacOS, Linux and the web.
“The big thing that justifies the major version number shift is, of course, the availability of web and desktop support,” Flutter product lead Tim Sneath told me. “And that’s just a fairly profound pivot. It’s rare for products that you suddenly have all these additional endpoints.”
Image Credits: Google
He noted that because of Flutter’s open-source nature, web and desktop support had been “cooking in the open” for a while, so the


Original URL: http://feedproxy.google.com/~r/Techcrunch/~3/7ED2BOERTSU/

Original article

An Introduction to Open Data Kit

With just a little imagination, you could easily make yourself a pretty cool mobile app using Open Data Kit.

The Screening Room

Open Data Kit is a free and open source set of tools which help organizations author, field, and manage mobile data collection solutions. The flexibility that open source offers means that the use cases for these tools are very broad. Check this introductory video about ODK tools which explains a rural medicine use case.

As an educator, I can’t help but visualize a very fun scavenger hunt where students use clues from one location to reach the next location of clues — and then take photos of milestones along the way. The mischievous elf inside of me suggests that some of the photos for this scavenger hunt be a challenge to take. A challenge, but not a dangerous challenge.
The post An Introduction to Open Data Kit appeared first on FOSS Force.


Original URL: http://fossforce.com/2017/02/introduction-open-data-kit/

Original article

Securing SourceForge With HTTPS

SourceForge says, “With a single click, projects can opt-in to switch their web hosting from HTTP to HTTPS.”

SourceForge has added a feature that gives project websites the opportunity to opt-in to using SSL HTTPS encryption. Project admins can find this option in the Admin page under “HTTPS.”
Opting-in will also trigger a domain name change, from http://name.sourceforge.net to https://name.sourceforge.io. Visitors using the old domain will automatically redirect to the new domain.
This is the latest of several changes that BIZX, LLC has made since acquiring the site, along with Slashdot, in January.
The changes started with the ending of the controversial and unpopular DevShare monetization program as a “first order of business.” That program, which bundled third party proprietary software offers with Windows downloads, had prompted several high profile open source projects — including GIMP and phpMyAdmin — to leave to find other solutions.
In May, SourceForge added security scanning to find adware, viruses,


Original URL: http://fossforce.com/2016/12/securing-sourceforge/

Original article

First look: Visual Studio for Mac is here at last, almost

Visual Studio for Mac is something that many Microsoft developers have sought for more than a decade. As Mac OS X became interesting in the early 2000s, coders who spent most of their days working in Visual Studio on Windows wondered why they couldn’t use the same languages, frameworks, and tools for the Mac, rather than needing to learn Objective-C, Cocoa, and Xcode, all of which were substantially different from the languages and tools for Windows development.To read this article in full or to leave a comment, please click here(Insider Story)


Original URL: http://www.computerworld.com/article/3144130/application-development/first-look-visual-studio-for-mac-is-here-at-last-almost.html#tk.rss_all

Original article

Joomla websites attacked en masse using recently patched exploits

Attackers are aggressively attacking Joomla-based websites by exploiting two critical vulnerabilities patched last week.
The flaws allow the creation of accounts with elevated privileges on websites built with the popular Joomla content management system, even if account registration is disabled. They were patched in Joomla 3.6.4, released Tuesday.
Hackers didn’t waste any time reverse engineering the patches to understand how the two vulnerabilities can be exploited to compromise websites, according to researchers from Web security firm Sucuri.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3136932/security/joomla-websites-attacked-en-masse-using-recently-patched-exploits.html#tk.rss_all

Original article

Mozilla launches free website security scanning service

In order to help webmasters better protect their websites and users, Mozilla has built an online scanner that can check if web servers have the best security settings in place.
Dubbed Observatory, the tool was initially built for in-house use by Mozilla security engineer April King, who was then encouraged to expand it and make it available outside the company.
She took inspiration from the SSL Server Test from Qualys’ SSL Labs, a widely appreciated scanner that rates a website’s SSL/TLS configuration and highlights potential weaknesses. Like Qualys’ scanner, Observatory uses a scoring system from to 100 — with the possibility of extra bonus points — which translates into grades from F to A+.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3112954/security/mozilla-launches-free-website-security-scanning-service.html#tk.rss_all

Original article

AWS buys Cloud9 IDE in snub to Google

Amazon Web Services has bought Cloud9, a popular web-based developer environment that recently aligned itself with the Google Cloud Platform.
Cloud9 is a browser-based IDE (integrated development environment) with a fairly rich feature set for building and deploying applications. Because it runs in a browser, developers can pick up their work from any machine, and Cloud9 has tools that let developers collaborate on projects.
Along with Codenvy, it was one of the few remaining popular, independent cloud IDEs.
“While the cloud IDE space is hot, as a market, IDEs are not an easy way to make money,” said IDC analyst Al Hilwa. “The technology is better used as a sweetener to make broader platforms more attractive to developers.”To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3095719/cloud-computing/aws-buys-cloud9-ide-in-snub-to-google.html#tk.rss_all

Original article

Three popular Drupal modules patch site-takeover flaws

The security team of the popular Drupal content management system worked with the maintainers of three third-party modules to fix critical vulnerabilities that could allow attackers to take over websites.
The flaws allow attackers to execute rogue PHP code web servers that host Drupal websites with the RESTWS, Coder or Webform Multiple File Upload modules installed. These modules are not part of Drupal’s core, but are used by thousands of websites.
The RESTWS module is a popular tool for creating Rest application programming interfaces (APIs) and is currently installed on over 5,800 websites. Unauthenticated attackers can exploit the remote code execution vulnerability in its page callback functionality by sending specially crafted requests to the website.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3095388/security/three-popular-drupal-modules-patch-site-takeover-flaws.html#tk.rss_all

Original article

Go from SHA-1 to SHA-2 in 8 steps

As deadlines go, Jan. 1, 2017, isn’t far away, yet many organizations still haven’t switched their digital certificates and signing infrastructure to use SHA-2, the set of cryptographic hash functions succeeding the weaker SHA-1 algorithm. SHA-1 deprecation must happen; otherwise, organizations will find their sites blocked by browsers and their devices unable to access HTTPS sites or run applications.7. Get the new certificateTo read this article in full or to leave a comment, please click here(Insider Story)


Original URL: http://www.computerworld.com/article/3081501/security/go-from-sha-1-to-sha-2-in-8-steps.html#tk.rss_all

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: