Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
I recently installed Fedora Core 5 and wanted to use my Mac formatted (HFS+) iPod Nano with it. I had read mixed reports about iPod/Linux compatibility so I didn't expect it to be easy. The transition was mostly undemanding, but the minor problems I encountered weren't what I expected.
With software companies better able to crack down on piracy, some people find they're having to make tough choices, according to Grigor Gatchev. Nearly every day in Bulgaria, he writes, computer experts have conversations that go something like this:
Next Tuesday at OSCON in Portland, I'll be giving a 3.5 hour tutorial titledOpen Source Clue Training: How to Market to People Who Hate Marketing.As I prepare for that, I thought I'd share some of the curriculum I've come up with. I'm looking for constructive feedback, suggestions and Stories From the Real World that might be useful to the tutorial. Here we go...
OTTAWA -- Day two of the eighth annual Ottawa Linux Symposium (OLS) was more technical than the first. Of the talks, the discussions on the effects of filesystem fragmentation, using Linux to bridge the digital divide, and using Linux on laptops particularly caught my attention, but Dave Jones' talk titled "Why Userspace Sucks" really stole the show.
Aged geeks should remember the Cult of the Dead Cow (CDC) well. The hacker group was particularly famous for its easy-to-use Back Orifice spyware trojan released in 1998, which was as good for corporate espionage as it was for humorous office pranks. So it's with some irony that CDC has released an open source client that secures your instant messenger communications over the Internet.
If you're developing Java EE applications using the Eclipse integrated development environment, IBM has just made your life a little easier. We're providing one-stop access to two value-added Eclipse 3.2 bundles that include key projects in the Callisto release: Web Tools Platform (WTP) and Graphical Modeling Framework (GMF). Download one or both of these free Eclipse project bundles from our high-bandwidth servers with fiber connections to the Internet. Registration is NOT required
The Open Management Consortium, founded in May, is a grouping of small companies seeking to bring open-source business models to systems management, an area dominated by larger companies. Although it is still fledging, the organization is already in discussion with larger software providers to join the group and support it financially, said William Hurley, a co-founder of the consortium and chief technology officer of start-up Qlusters.
I have a column (/var/opinion) in an upcoming issue that deals with my struggles to get a MythTV system working. The column ends with a tease about yet another column on Linux standards. I don't want to spoil either, so I'll leave it at that. However, I have another beef about the way my MythTV system is shaping up, or more accurately, falling apart.
The events program and speaker list have been announced for the fall Embedded Systems Conference, set for Sept. 25-28 in Boston. The event will feature 160 exhibitors and 82 classes in eight tracks. A Linux/Open Source track features classes from well-known embedded Linux trainer/consultant Bill Gatliff.
Learn how to transfer an entire file system on a live system, including how to create, copy, and re-enable the new file system. If you have a UNIX disk or system failure or simply fill up your file system, then you need to create a new partition and file system and copy over the contents all on a live system. Effectively transferring components and retaining all of their information is a vital part of the migration process.
For now, Internet service providers are prohibited from discriminating against connections to particular sites on the Internet: they are required to treat traffic to Google exactly the same as traffic to Yahoo! or MSN. This principle of equality is called "network neutrality." However, large telecommunication companies are lobbying congress to scrap the network neutrality rules that have been in place since the birth of the Internet. We don't have to look far to see why this is a bad idea.
[They are chomping at the bit to be able to block content from subscribers to then charge for access to it.- Scott]
LXer Feature: 22-Jul-2006
Lobby4Linux founder, Ken Starks (a.k.a., Helios) recently went to Washington to take the fight for freedom - whether it's software or media - to the hallowed halls of Congress. Now he faces an even greater battle - a battle for his very life.
Advances in technology have revolutionized the way people live, learn and work, but these benefits have not spread around the world evenly. A digital divide exists between communities in their access to computers, the Internet, and other technologies. The United Nations is aware of the importance of including technology development as part of a larger effort to bridge this global digital divide. This article looks at how various United Nations agencies use free and open source software to meet the goal of putting technology at the service of people around the world.
Linux users are flocking to the stay-connected, work-anywhere contemporary lifestyle. R Cubed's LS1250-L Linux laptop is just right for these active mobile professionals.
Fluffy Spider Technology (FST) will reportedly port its user interface technology to ERTOS, a micro-kernel based real-time Linux implementation likely to be used in Qualcomm mobile phones. FST's "FancyPants" UI technology has already been embedded in a multimedia-enabled mobile terminal used in New York City taxis
Behind the firewall: If your company is averse to openness and transparency and is unlikely to change, then this article is not going to interest you much. Unless, of course, you are considering a change of direction.
One of Sun's CTOs has said that they will *truly* be opening Java, but in stages, a piece at a time.
[This has an interesting comment from Bruce Perens - dcparris]
File permissions are usually confusing to newer Linux users. Most 'newbies' are not accustom to implementing file security because of thier DOS/Windows background. Why do we need file security? It is primarly needed to ensure data protection and privacy from other system users. In other cases, file security is needed to prevent 'normal users' (as opposed to system administrators) from changing configurations or accidently damaging a system.
Has Redmond finally accepted that open source should be embraced, or are the company's recent partnerships with community-developed software providers simply another way to crack the competition?
« Previous ( 1 ...
) Next »