Archive for the ‘Free Software’ Category

‘Stand Your Ground’ change passes in late session compromise – Miami Herald


Miami Herald
'Stand Your Ground' change passes in late session compromise
Miami Herald
A change to the state's Stand Your Ground self-defense law is heading to Gov. Rick Scott after the Senate agreed late Friday to go along with a House proposal. The House and Senate both wanted to change the law but had clashed on a legal issue in the ...
Change in Florida's 'stand your ground' law heading to Gov. Scott's deskWFTV Orlando
Florida House, Senate still at odds in 'stand your ground' disputeOrlando Weekly (blog)
Florida's 'stand your ground' law: The battle to change the burden of proofActionNewsJax.com
Orlando Sentinel
all 232 news articles »

Read more:
'Stand Your Ground' change passes in late session compromise - Miami Herald

`Stand Your Ground’ Change Heads To Governor – WLRN

A change to the state's stand your ground self-defense law is heading to Gov. Rick Scott after the Senate agreed lateFridayto go along with a House proposal.

The House and Senate both wanted to change the law but had clashed on a legal issue in the bill (SB 128).

But with time running out in the legislative sessionFriday, the Senate voted 22-14 with Tallahassee Democrat Bill Montford joining Republicans in support to accept the House proposal.

The move came in exchange for getting the House to accept the Senate's more far-reaching language on a separate measure (SB 436) dealing with religious expression in public schools.

I thought that it was a reasonable resolution to both matters, and they're both constitutional issues, said Sen. Rob Bradley, a Fleming Island Republican who sponsored the stand your ground bill. And we wrapped it all up in a bow, and we resolved them both in a satisfactory manner.

The overall issue stems from a Florida Supreme Court ruling in 2015 that said defendants have the burden of proof to show they should be shielded from prosecution under the "stand your ground" law.

In "stand your ground" cases, pretrial evidentiary hearings are held to determine whether defendants should be immune from prosecution.

While the House and Senate broadly supported the idea of shifting the burden of proof from defendants to prosecutors in the pre-trial hearings, they differed on a legal standard.

The House proposal said prosecutors in pre-trial stand your ground hearings would have to overcome the asserted immunity sought by defendants through "clear and convincing evidence." The Senate fought for a higher standard of proof, known as "beyond a reasonable doubt.

The two chambers needed to reach agreement byFriday, the final scheduled day of the annual legislative session. Lawmakers will meet againMondayto vote on budget-related issues but will not take up other matters.

In the end, , the Senate agreed to go along with the clear and convincing evidence standard.

Proponents of the bill, which had support from groups such as the National Rifle Association, said shifting the burden of proof would better protect the rights of defendants. But critics argued, in part, that the change would lead to cases ending before all the facts are revealed.

Sen. Jose Javier Rodriguez, D-Miami, saidFridaythe House version didn't alleviate his concerns about the bill.

If you talk to prosecutors, they're already gearing up just in case we pass this bill to expend significant amount of resources, in literally every single case where there is violent activity, where they (defendants) can raise this at the pre-trial stage and force the prosecutors to basically put on a trial at the pre-trial stage, Rodriguez said.

View post:
`Stand Your Ground' Change Heads To Governor - WLRN

Time for software-based networking to free up network managers – TechTarget

Network managers have groaned for years that their high-priced technical people are chained to mundane tasks required to manually configure and manage switches, routers and other network components.

Enter a new era where software and automation take center stage.

While the industry has promised change through software-based networking for many years, 2017 just may be the year it finally happens on a broader scale.

Gartner networking research vice president Andrew Lerner said software's ascendancy should come as no surprise. Network switches have always been packed with software -- it's just that the industry grew comfortable viewing its products as hardware.

The big sticking point for years was that too much of the work configuring network components was manual and time-consuming, a cumbersome process that called for software-based networking innovation.

"What we're seeing now is a move away from manual and noncentralized networking to a more automated and centralized network management," Lerner said. "And the automation and centralization of policies is just much better done in software."

In the past, networking shops have spent 80% of their time just keeping the lights on. Seth Pricesenior network engineer, Durham County, N.C.

Automating tasks and allowing IT staffers to be more productive were among the prime reasons why Durham County, N.C., moved to exploit the software that underpins Cisco's Application Centric Infrastructure (ACI). The government agency is in the midst of a network infrastructure upgrade that will enable it to rely far more on software and automation and less on manual configuration.

In the past, networking shops have spent 80% of their time just "keeping the lights on," said Seth Price, the county's senior network engineer. By deploying Cisco's Application Policy Infrastructure Controller (APIC) and Cisco's enterprise module, APIC-EM, Price said the county's IT staff can reverse the equation and spend 80% of its time on innovation.

The county plans to use APIC to not only automate data center router and switch configurations, but to use APIC-EM -- in conjunction with Cisco Stealthwatch and Identity Services Engine (ISE) -- to create a proactive security posture where malware can be automatically detected, contained and remediated.

Durham County began rolling out APIC last July and recently got to the point where the controller software is fully up and running. Now, the county is focusing on getting APIC-EM deployed, which Price said should pay huge dividends because the software will be used across 40 county facilities connected to the enterprise network.

Here's what Price envisions after integrating APIC-EM with Stealthwatch and ISE: In the event that malware is detected on an endpoint device, Stealthwatch will automatically connect to Cisco ISE, which stores all of the county's network policies. ISE will notify both APIC and APIC-EM that the device in question can only talk to a remediation server. If the malware can be removed, the device would be allowed back on the network. If it can't, the software automatically reimages the device.

"If I had to do all of that by hand, the damage would be done and the bad guys would be long gone," Price said. "Here in Durham County, we have a small staff. I'm in charge of the network, but I'm also responsible for security. We need technologies that will help us do more with less or with the same amount of people."

APIC-EM also has a feature that lets network managers automatically assign bandwidth policies.

Price said the feature, EasyQoS (Easy Quality of Service), eliminates nearly all the manual configuration tasks required to manage bandwidth. He said when a top manager or the CIO has an important video conference, for example, he uses EasyQoS to give full priority to the video conference for the duration of the presentation.

"Once the call is over, the system automatically removes that QoS policy," Price said. "This serves an important function for network managers because, in the past, a lot of policies would be built, and people would forget to take them down."

Now, our network engineers can spend more of their time doing other projects with new technologies. Brian McEvoysenior global network engineer, Symantec

At Symantec, two Cisco applications -- APIC-EM and EasyQoS -- allowed the company to streamline policy updates throughout its offices worldwide, said Brian McEvoy, senior global network engineer. In the past, before Symantec deployed the software, two engineers would work for six months to hand-configure policy updates for about 100 company offices, a task that resulted in about $200,000 in execution update costs alone.

Symantec is also using software to set policies for its IWAN, or Intelligent WAN, wide area network infrastructure rather than manual coding.

"This technology totally transforms the IT operation," McEvoy said. "Now, our network engineers can spend more of their time doing other projects with new technologies."

Software-based networking can transform organizations in ways management would never have thought possible.

J. Todd Watkins, director of technology and innovation at Eufaula City Schools in Eufaula, Ala., said once officials deployed a new wireless system based on Extreme Networks' wireless access points, management software and analytics engine at the district's middle school, technology usage skyrocketed.

"When teachers have zero confidence in the technology, they won't use it," Watkins said, explaining that the old network had poor connectivity and required manual configuration. "Now, confidence in our new learning management system at the middle school is way up."

Extreme's Management Center software lets the district automate policy updates. Now, every new request for service can be addressed more quickly, and the district can prioritize bandwidth based on its needs.

"When the district runs standardized tests, we can change the class of service to a higher level of priority for that day," Watkins said. "We also have visibility we didn't have in the past. If a wireless client can't get on the network, it will tell us if it's the access point, the switch or an uplink port that's the problem."

Plans are in the works to add Extreme's technology to the high school and the district's two elementary schools this summer.

Change automation is altering face of networking

Exploiting software to automate tasks

Using DevOps for network testing

Go here to see the original:
Time for software-based networking to free up network managers - TechTarget

Nonprofits needing free help with their websites, web-based applications and software solutions are invited to … – Akronist

Application deadline is May 15

Nonprofits needing free help with their websites, web-based applications and software solutions are invited to apply to the Eighth Annual Cleveland GiveCamp.

GiveCamp is a weekend-long event July 21 through 23 that pairs technology talent with area nonprofits. Over the course of a weekend, technology professionals, developers, designers, database administrators, marketing professionals and others donate their time to help area nonprofit organizations with a wide range of projects, including developing websites, mobile apps and more.

A list of requirements and online application may be found at http://www.clevelandgivecamp.org/nonprofits. Deadline is May 15.

Nonprofits must provide proof of their 501(c)(3) status (IRS Determination letter), upload a copy of their most recent IRS Form 990 and have representatives present the weekend of the event. For more info, email info@clevelandgivecamp.org.

GiveCamp is an international initiative started in 2007 to bring together technology talent to help local nonprofits in need. Cleveland GiveCamp is one of the largest events in the country. Since its inception, our local our volunteers have donated nearly $4 million of free development work to more than 250 regional nonprofits.

See the rest here:
Nonprofits needing free help with their websites, web-based applications and software solutions are invited to ... - Akronist

Free downloads: white papers on embedded software and security – Elektor (blog)

May 3, 2017 | 09:00

In close cooperation with PRQA, Elektor is offering a free download of three high-quality papers on how to create secure embedded software. After registration, all three papers become available as a PDF file.

Headquartered in the UK, PRQA has offices in the United States and customers across the globe.PRQA has pioneered software coding governance for critical software applications in industries ranging from the automotive to aerospace, from transport to finance, and from medical devices to energy. PRQA promotes safe coding practices and wants to ensure the highest quality code for safety-critical and mission-critical systems. As such, the company recently published three white papers. All three of them focus on the combination of embedded software and security. Developing Secure Embedded Software - Quality Doesnt Equal Security Most organizations put considerable focus on software quality, but software security is different. Embedded development presents the challenge of coding in a language that is inherently insecure; and quality assurance does little to ensure security. Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards Many embedded systems and connected IoT products lack proper security due to outdated software development practices. Organizations now know they need to incorporate security into the software SDLC, yet many lack security expertise and are struggling with how to implement best practices. Using Static Analysis to Overcome the Challenges of Reusing Code for Embedded Software This paper explains why software reuseis a growing problem within development organizations, why the way embedded software is developed needs to change and what organizations can do to improve reliability, safety, and security while reducing development time. Anyone interested in these white papers can register here.

See the original post here:
Free downloads: white papers on embedded software and security - Elektor (blog)