Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
After a couple of steps back over the summer, Mozilla's Firefox browser now holds 11.51% of the market in browsers used.
Red Hat will integrate the Xen virtualization hypervisor in its next commercial release of enterprise Linux due in late 2006. Built-in virtualization and built-in support for stateless Linux as well as improved automation and management tools will make Red Hat Enterprise Linux 5 a more compelling platform for the data center and grid deployments [ED-Not a dupe, the earlier story was about Xen's inclusion in the 2.6 kernel. This is about RH's own distribution. Both issues are very important to Linux in the enterprise]]
According to c't Magazine this latest contribution by Microsoft to the initiative "Germany Safe on the Net," which a short while ago took stock of its progress so far, unfortunately fails to meet the high expectations aroused.
It's not flashy, but if you're re-using text often or need to streamline your template and macro lists, spend a little time with AutoText.
STMicroelectronics (STM) is sampling an SoC (system-on-chip) that it says supports all required HD-DVD and Blu-Ray codecs and security schemes. The STB7109 is based on an SH-4 core, and supports Linux and other embedded OSes, along with codecs and security schemes from both Microsoft and international standards bodies.
Ruby Weekly News is a summary of the week's activity on the ruby-talk mailing list / the comp.lang.ruby newsgroup, brought to you by Tim Sutherland, with contributions from Christophe Grandsire.
Although modern desktop Linux distributions pride themselves in minimizing the need for users to resort to command-line activities, there are times when a visit to a shell prompt can come in handy. To this end, a concise guide to Linux shell scripts is now available from the LinuxHelp blog.
Apple on Monday released Mac OS X 10.4.3 Update, which delivers overall improved reliability and compatibility for Mac OS X v10.4 and is recommended for all users.
After previous efforts failed, Red Hat is stepping forward to get Xen virtualization technology included in the Linux kernel as quickly as possible.
Wal-Mart and Hewlett-Packard will likely celebrate this Thanksgiving season by attempting to crush their competitors with low-price desktops and notebooks, according to a Web site that tracks bargains.
If Scientigo can make its XML patent claims stick, all XML users, from office suite users to programmers, may be affected.
Just two months ago, Novell opened the development process behind SUSE Linux, creating the openSUSE project. Novell's move gave developers a chance to be involved in SUSE, which previously had been developed privately without community input. In the short time since openSUSE was unveiled, developers have begun work on several new and interesting SUSE derivatives.
Levanta, a Linux system management software company, unveiled code for a virtual file system that improves data sharing between Linux machines.
The policies from Open Source Risk Management offer protection in the event of an intellectual property lawsuit.
[ED-This was hotly debated in the early SCO days, but with SCO on its deathbed maybe we can look at this a bit more nuanced. ]
It took more than two and a half years, but the SCO Group finally has disclosed a list of areas it believes IBM violated its Unix contract, allegedly by moving proprietary Unix technology into open-source Linux.
In a five-page document filed Friday, SCO attorneys say they identify 217 areas in which it believes IBM or Sequent, a Unix server company IBM acquired, violated contracts under which SCO and its predecessors licensed the Unix operating system. However, the curious won't be able to see for themselves the details of SCO's claims: The full list of alleged abuses were filed in a separate document under court seal.
The secret agent quietly enters the generic-looking office complex. The agent's assault team has the building surrounded and is standing by in case the operation goes bad. The mission: to find a computer containing information that will save the country from an enemy attack.
The agent moves from the warehouse area to the offices in search of the target's computer. He finds it in the last office. The machine is on, and after gaining access to the computer, the agent starts scanning through files only to find them encrypted.
The agent calls the computer expert at base. The expert "remote controls" the machine and tries some generic passwords - they do not work. The expert runs a password-cracking program, and in seconds, the files are accessible.
The bad guys are caught, the country's security is maintained and the world is saved, all in the course of an hour - excluding commercials, of course!
Worldwide PDA shipments increased nearly 21 percent year-over-year in Q3, and are on track to reach record levels in 2005, said Gartner today in a report that seems to contradict pessimistic PDA market reports from competing research firms. Linux accounted for a paltry 0.7 percent of shipments, according to Gartner.
Opinion: Software patents are nasty, brutish and anything but short. For the sake of the United States' technological development, they must be stopped.
Foreword -- This article describes the features and capabilities of MiniGUI, a lightweight graphics framework for embedded systems based on uClinux, Linux, eCos, or proprietary real-time OSes. The article is written by Wei Yongming, who wrote MiniGUI for a CNC (computer numerical control) system, then released it to open source
At that point I knew conclusively that the rootkit and its associated files were related to the First 4 Internet DRM software Sony ships on its CDs. Not happy having underhanded and sloppily written software on my system I looked for a way to uninstall it. However, I didn’t find any reference to it in the Control Panel’s Add or Remove Programs list, nor did I find any uninstall utility or directions on the CD or on First 4 Internet’s site. I checked the EULA and saw no mention of the fact that I was agreeing to have software put on my system that I couldn't uninstall. Now I was mad.
[Ed.- Amazing, isn't it? I cannot even begin to fathom the mentality that thinks planting this sort of crap on our computers is OK. Also see Bots in the A/C, spyware in the 'fridge for a naive, self-serving perspective on a similar subject.]
« Previous ( 1 ...
) Next »