Showing all newswire headlines
View by date, instead?« Previous ( 1 ...
6115
6116
6117
6118
6119
6120
6121
6122
6123
6124
6125
... 7383
) Next »
In this howto I will show you step-by-step how to successfully set up a long distance calls service in your Cybercafé, using open source software. The main element is *starShop-OSS, an open source application designed to monitor and bill, in real time, calls made via Asterisk PBX. This service is commonly called callshop or taxiphone.
Welcome to this year's 37th issue of DWN, the weekly newsletter for the Debian community. Debian will be present at the Wizards of OS conference next weekend in Berlin, Germany. André Luiz Rodrigues Ferreira wondered if there will be special Debian themes available for the desktop environments in etch. Adrian von Bidder discovered a 16 core MIPS server with Debian pre-installed.
How to save Mashup request results to a DB2 9 database, plus how take some of the load off of those external Mashup services and greatly improve performance with pureXML.
Microsoft has just posted the text of a new patent "promise not to assert " at its Website, and pledged that it will honor that promise with respect to 20 listed Web Services standards.
Cluster Resource, Inc.TM, a leading provider of cluster, grid and utility computing software, announced today at GridWorld’s Exhibit Showcase the inclusion of Grid Learning in Moab Grid Suite® -- a new feature designed to help maximize usage of grid resources.
Inspired by Cisco and Microsoft, Symantec and Juniper Networks have struck back against rivals Microsoft and Cisco with an astonishingly vague, sweeping partnership of their own.
So you just bought and assembled a brand-new AMD64 workstation. The only decision that remains is whether to install a 64-bit Linux distribution, or stick with comfortable, tried-and-true IA-32. If you are seeking an easy answer to that question, I can't help you. Running 64-bit Linux has its pros and cons. Unfortunately, a lot of the cons are out of your hands -- but they're not really Linux's fault, either.
Collax, a leading provider of Linux servers for small and medium sized businesses, announced today that former IBM, Novell and SUSE executive Richard Seibt has joined its Board of Directors.
Did you miss out on the LinuxWorld 2006 conference and expo held last month in San Francisco? Well, we have some good news for you: the show management has posted the keynote talks online for free public viewing.
Science is an open process. Experimental information and results must be published so results are verifiable and reproducible. These results are then shared with the larger community to benefit all humanity. It makes sense that the software used for scientific computations should also be open. Here are a few scientific programs of general utility.
AXIGEN, the professional messaging solutions vendor, announced today its new Technical Support Program. The program includes as a special offer the ground-breaking concept of FIRsT Support.
20th Anniversary of North America's Largest and Most Comprehensive IT Event Continues to Drive Revolution in Business Technology
Every wise old system and network administrator knows that security is a multilayer process. You have your firewalls and other border security, perhaps some internal network segmentation, and application and operating system security. However, locking down the operating system is probably the most crucial link in this chain.
Corruption of computer magazines? Far-fetched? I don't think so. Correction. I know it is not far-fetched. If you happen to live in Europe, you may have seen many computer magazines this summer that included the Microsoft Office 2007 test suite on CD. You may have bought such a magazine and wondered why they were so friendly to Microsoft.
Authentication is the process in which a program determines whether a user is actually the person who he claims to be. It is used in any kind of a system that provides different services to people depending upon their membership. When you log in to your favorite mailbox, access ATM, or use the services of Net Banking; what you are actually doing is obtaining service from the service provider after proving your credibility using your credentials (i.e. generally your user name and password).
A recent Slashdot item on Wi-Fi security was a timely reminder of the weaknesses of default Wi-Fi encryption protocols, and the dangers of using unencrypted, public Wi-Fi connections. Fortunately, you can use FOSS utilities to securely tunnel your Wi-Fi connection sessions and protect your Web and email traffic.
March is the last date set for the Free Software Foundation's release of the third revision of its General Public License. The open source camp has already made its opposition to the licence fairly clear; the FSF, while admitting that the draft for GPL Version 3 is not yet finalised, is unlikely to compromise on key changes from the existing licence, the very changes that are the major sticking points between the two camps.
Examine how to configure Secure Shell (SSH) on IBM System p and System x computers to
run commands in parallel in a cluster without being prompted for a password. This will allow you to perform activities more easily and quickly, and gives you flexibility to perform activities in parallel on more machines.
So yesterday I went to my boss’ place to install both Kubuntu Dapper and Debian Etch onto his new Asus V2-AH2 box, which really gave us a hard time. But that wasn’t Debian’s or Ubuntu’s fault.
The France-based Zenwalk GNU/Linux development team introduced v3.0, its latest stable major release, on Sept. 8. Zenwalk 3.0, which features a 2.6.17 Linux kernel and the Xfce desktop, is now available for download, as is ZenLive-2.8.1, a bug-fix update to Zenwalk's live CD edition.
« Previous ( 1 ...
6115
6116
6117
6118
6119
6120
6121
6122
6123
6124
6125
... 7383
) Next »