Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
QEMU is an open source cross-platform emulator for Linux hosts. It allows you to emulate a number of hardware architectures (x86, x86-64, and PowerPC are currently known to work, with others, including SPARC and MIPS, in development). QEMU thereby lets you run another operating system on top of your existing OS. Going through the process of installing and configuring QEMU not only gave me a worthwhile new software tool, but also helped me learn a few things about Linux.
Oracle Corp. CEO Larry Ellison knows all about battles with old friends. After all, Oracle just pulled off high-profile takeovers of PeopleSoft Inc. and Siebel Systems Inc. - a pair of rival software makers run by former subordinates who turned against him. Now, Ellison is straddling another set of fractured friendships in a drama unfolding around Salesforce.com Inc. and NetSuite Inc.The pioneering upstarts - conceived by a younger generation of Ellison's corporate progeny - have been helping steer the business software industry in a new direction with applications that are accessed directly over the Internet.
Once considered a crazy idea, the concept of online, or "on-demand," software has turned into a hot market as thousands of companies decide they would rather lease applications monthly than pay an upfront licensing fee and then deal with the costs - and headaches - of installation, maintenance and the inevitable software upgrades.
Robert Vamosi writes: ...it didn't surprise me to read last week that a new buffer overflow vulnerability was found within the very popular Skype VoIP service. But what will make or break VoIP will be how this very young industry handles emerging security issues and whether the public eventually puts its trust in the new technology. Judging by the way Skype has handled its recent vulnerabilities, I think the prognosis is good for VoIP in the long run.
[A positive prognosis for Skype and VoIP, generally speaking. Oh what fun it is to defend your Skype calls from Internet-based attacks! - Ed]
In a VPN configuration, most personal firewalls are configured to drop their shields (because all traffic is heading to and from a trusted source), so the VPN client is, in fact, a liability because there is no need to use a libpcap outbound wormhole-tunnel communications channel. The firewall will happily ignore whatever packets a malicious program might need and they go unfiltered through the "secure" VPN connection... Creating and using a wormhole-tunnel communications channel is not limited to malicious use by malware, spyware, viruses or worms. The following scenario illustrates how one can legitimately (and more robustly) bypass the firewall without the use of libpcap.
[Ed.- and don't forget email, web browsers, and all the ways that SSH can sneak around firewall rules.]
On Tuesday Oregon Governor Ted Kulongoski announced the contribution of $350,000 by search technology leader Google Inc. to a joint open source technology initiative of Oregon State University and Portland State University. With the grant, the universities will collaborate to encourage open source software and hardware development, develop academic curricula and provide computing infrastructure to open source projects worldwide. The universities will also help provide a bridge between Oregon's universities and Oregon's growing open technology industry.
Its Database 10g Express Edition is free, and is compatible with the vendor's higher-end offerings.
Jennifer Mears writes: "Best known for its grassroots environmental protection activities, the Sierra Club also helps thousands of members get outdoors each year with trips that span the globe. Sierra Club has offered these worldwide adventures for more than a century, but in recent years its IT team has focused on streamlining the trip-reservation process by enabling members to sign up online."
Shareholders attending Sun Microsystems' annual meeting Thursday chastised Chief Executive Scott McNealy for everything from the company's performance and low stock price to his stewardship...A second shareholder proposal, to tie stock options for senior executives more closely to the company's performance, was defeated. But it got a sizable 42.8 percent of the votes.
Mark Brunelli writes: The days leading up to this week's Open Source Business Conference (OSBC) bore witness to an influx of announcements from open source companies and projects looking to make headlines ahead of the show.
[This article highlights some of the big announcements leading up to the Open Source Business Conference - Ed]
"There have been a couple of runs at trusted operating systems in the past, but the difference between what's out there now and what we're announcing is that, in the Linux world, we'll have trusted capabilities in a standard distribution," said Paul Smith of Red Hat.
Jonathan Riddell writes: "Two recent articles cover the success of Trolltech and their product Qt 4, on which KDE 4 will be based. Trolltech: A case study in open source business looks at the continued growth of the company based on dual licenced Free Software. The article describes what KDE and Trolltech gain from each other, including user feedback to Trolltech and sponsored developers for KDE. The Australian Computerworld declairs that Qt 4 raises the bar for cross-platform app dev tools. They cover the separate modules of Qt 4 and the cross-platform quality, giving it a 9.2 out of 10 approval rating."
[As pointed out in the KDE News post, the Computer World article erroneously refers to software in the public domain. This stuff has been around for over 22 years. Seems like professionals in the field would have some concept of this by now. - Ed]
Despite this enormous increase in memory capacity, many of the problems that exist on today's machines are the same as those of their early predecessors--namely, running out of memory.
This article, the first in the series, discusses the Unix dynamic memory allocation system along with the concept of memory segmentation. It also reviews the utilities top and ulimit, giving special attention to their role in memory management. Memory management is an important concept to grasp regardless of which programming language you use. You must be most careful with C, where you control all memory allocation and freeing. Languages such as C++, Java, Perl, and PHP take care of a lot of the housekeeping automatically. Nevertheless, all of these languages and others can allocate memory dynamically, and thus the following discussion applies to them all
Welcome to this year's 44th issue of DistroWatch Weekly. Fans of the BSD family of projects can expect an exciting week as NetBSD 2.1, FreeBSD 6.0 and OpenBSD 3.8 are all expected to be announced and released with the next couple of days. On the Linux front, we have some interesting information regarding the Ubuntu Zero Conference, a link to guide describing the installation of Enlightenment 17 on SUSE 10.0 and news about a working graphical front-end for the Debian installer. Finally, the fans of Debian-based distributions will no doubt appreciate our review of The Debian System - Concepts And Techniques, a newly released book written by a well-known Debian developer. Happy reading! Join us at irc.freenode.net #distrowatch
Hewlett-Packard is expected to announce its first blade servers that use Intel's Itanium processor on Tuesday in the US, sources familiar with the product plans said.
As one might expect, IBM tries to keep careful tabs on hot and emerging market segments across all of its product lines. The go-to guy for up-to-the-minute analysis data for the iSeries market is Chip McClellan, IBM's senior marketing manager for market segments. I talked with McClellan recently and learned a lot about where IBM and its business partners will be investing time and energy in the near future and what 2006 might look like.
Don't you just hate it when you can't find a file you need, but you know it's on your computer? Wouldn't you like an easy way to track down files anywhere on your computer? If so, I have good news for you, a command available to you at the friendly Linux CLI called find.
Welcome to today's installment of More Tips and Tricks For Hardworking Admins, the finest and freshest collection of mini-howtos on the Web. Today we'll do dynamic blocking of SSH server attacks, run nested window managers, and take a peek at hacking the Linksys WRTG54.
[Ed.- The DenyHosts utility, for dynamic blocking of SSH or other port attacks, is quite ingenious and easy to use. Also, XNest is covered, for running multiple window managers simultaneously. Just try to do that with poor ole feeble MS Windows!]
A group of companies including PalmSource and France Telecom plan to launch an initiative in mid-November to standardize the applications layer of Linux-based mobile devices, representatives involved in the project said. The group will be called the Linux Phone Standardization Forum (LiPS).
Q:What's the difference between an enterprise wireless access point from a big name vendor, and a SOHO grade one from the likes of Belkin, Buffalo or Netgear? A: About 500 bucks OK, say it's not a very funny joke. In fact it's not really a joke at all – more of an economic observation. But like most jokes, there is a point to it: When you go shopping for wireless access points, do you really need to spend five times as much on an enterprise product which does the same base function – providing wireless network access – as a SOHO one?
ReactOS is an open-source Operating System designed to be compatible with Windows NT. Version 0.2.8 sees the culmination of months of work since 0.2.7, and sees the project coming closer to the long-awaited 0.3.0 release.
[For those of you who just can't do without your Windows NT. The psyche_eval package is sold separately. Hey, at least ReactOS is libre! - Ed]
« Previous ( 1 ...
) Next »