Showing headlines posted by caitlyn
) Next »
Normally Linux distribution ISOs work perfectly when written to a USB for booting as a 'Live USB' allowing both usage and installation of the distro. Unfortunately with the introduction of Intel Atom based mini PCs the issue of requiring a 32-bit bootloader to boot a 64-bit OS arose
A person with company A has a concern about some work that needs to be done. They call outsource IT firm B with whom they have a contract. Firm B has nobody on staff with the required experience. Company B is big and well known. Their solution: call recruiter C who in turn checks their database and realizes that Linux systems consultant D has the experience. Hi! I'm D.
The machines where sound has been a problem have Intel SST sound on the SOC which uses the Conexant codec. On those systems the "sound card" is simply not detected.
This is good news for owners of many recent tablets and notebooks running on recent Intel Atom (Cherry Trail) based SOCs. These include systems by Acer, ASUS, HP, Toshiba and probably others.
7.3 Final Available. After small tweak/fixes 7.3 is now live and the default 7 release.
After a fairly un-eventful rebuild RC build is available at the usual spot:
My recent post about how quickly newly commissioned Linux systems can be attacked and possibly compromised led to a bunch of e-mail queries about resources which explain how to lock down a variety of Linux distributions.
How quickly will a newly commissioned system be attacked? Here's my recent experience.
I've been testing the Red Hat Enterprise Linux 7 Release Candidate. One thing that stuck out right away was the lack of a 32-bit x86 build. In last week's DistroWatch Weekly Jesse Smith questioned the need for such a build, which is only useful on legacy hardware, in the enterprise. [...] While I certainly understand Jesse's point about 32-bit being legacy hardware, there are still many use cases where 32-bit and current enterprise quality software and OS are necessary.
Amazon may share its name with mythology's greatest female warriors, but the world's largest online retailer employs just 18 women among its 120 most senior managers, and none of them report directly to the boss. Amazon's founder, chief executive and chairman, Jeff Bezos, runs the company through a select all-male group of 12, known internally as the S Team (Senior Team), who have a direct line to him. And the S Team themselves seem reluctant to employ women, according to a leak from an internal directory.
I haven't written about sexism in the Information Technology field in six and a half years. Any time I have ever written about gender issues, sexism or discrimination in IT, and particularly when I wrote for O'Reilly, there would be many comments by men who would get all defensive, tell me it's all in my pretty little head or if I would just get tougher and ignore it it would all go away. Others would fall back on sexist stereotypes, claiming women are just not interested in computing or are simply not as good at anything related to math, science and engineering than their male counterparts.
Karanbir Singh has announced the release of CentOS 6.5, the latest stable build of the enterprise-class Linux distribution compiled from the Red Hat Enterprise Linux 6.5 source code.
I was building a rpmpackage for Tengine the Dynamic Module loading Nginx fork. As usual since there was a no decent tutorial I decided to write my own.
Recently (actually 3 weeks ago) I bought a Raspberry Pi for myself and it wasn't until today that I power it on by the first time. Call it RealLife™ for simplicity.
Eric (a fellow Fedora board member) has a post describing his vision for what Fedora as an end goal should look like. It's essentially an assertion that since we have no idea who our users are or what they want, we should offer them everything on an equal footing.
Shockingly enough, I disagree.
This Open Source Guide is about LDAP, OpenLDAP 2.x and ApacheDS on Linux and the BSD's (FreeBSD, OpenBSD and NetBSD). It is meant for newbies, Rocket Scientist wannabees and anyone in between.LDAP is a complex subject. This Guide was born out of our pathetic attempts to understand LDAP, since it promised a veritable nirvana - common source for information, unlimited scalability using a replication model, inherent resilience, fast read performance, fine-grained control over who can do what to what data - the list goes on. Wonderful stuff.
App.net cofounder Bryan Berg noticed that LinkedIn was DNS-hijacked tonight and that traffic was rerouted to a shady India-based site, http://www.confluence-networks.com.
That’s bad for LinkedIn, but there’s worse news for you. According to Berg, that site does not require SSL (secure sockets layer), which means that anyone who visited in the last hour or so sent it their long-lived session cookies in plain text … a potential security risk.
Google today put the squeeze on software vendors with a new policy for vulnerability disclosure that allows its researchers to provide details on zero-day bugs they find within seven days if the affected vendor hasn't provided an advisory or a patch. Google is now dramatically narrowing the patch window for the most dangerous zero-day bugs it discovers and get used in attacks in the wild.
A research team led by Bell Labs' Xiang Liu has published an article in Nature Photonics describing a way to send and receive information at 400Gbps across 12,800km of optical fiber – an enormous potential gain of both speed and effective distance compared to current technology.
The internet has long gone by the rules of the mob. The one with the most followers, the post with the most comments, the memes that won’t die. Every day millions more Netizens join the collective and throw their weight around in whatever way they choose. The web has been a great enabler of crowdsourcing. The millions and millions of eyes, ears and voices means that the collective power of people has been used to create Wikipedia and other archive sites, online dictionaries such as Urban Dictionary, even write a book.
Criminals are using an old weakness in the Ruby on Rails web application framework to recruit vulnerable servers into a botnet. Developers running Ruby on Rails should install an update that was released in late January for a serious remote execution flaw that attackers began exploiting in the past week.
) Next »