Science is an open process. Experimental information and results must be published so results are verifiable and reproducible. These results are then shared with the larger community to benefit all humanity. It makes sense that the software used for scientific computations should also be open. Here are a few scientific programs of general utility.
AXIGEN, the professional messaging solutions vendor, announced today its new Technical Support Program. The program includes as a special offer the ground-breaking concept of FIRsT Support.
20th Anniversary of North America's Largest and Most Comprehensive IT Event Continues to Drive Revolution in Business Technology
Every wise old system and network administrator knows that security is a multilayer process. You have your firewalls and other border security, perhaps some internal network segmentation, and application and operating system security. However, locking down the operating system is probably the most crucial link in this chain.
Corruption of computer magazines? Far-fetched? I don't think so. Correction. I know it is not far-fetched. If you happen to live in Europe, you may have seen many computer magazines this summer that included the Microsoft Office 2007 test suite on CD. You may have bought such a magazine and wondered why they were so friendly to Microsoft.
Authentication is the process in which a program determines whether a user is actually the person who he claims to be. It is used in any kind of a system that provides different services to people depending upon their membership. When you log in to your favorite mailbox, access ATM, or use the services of Net Banking; what you are actually doing is obtaining service from the service provider after proving your credibility using your credentials (i.e. generally your user name and password).
A recent Slashdot item on Wi-Fi security was a timely reminder of the weaknesses of default Wi-Fi encryption protocols, and the dangers of using unencrypted, public Wi-Fi connections. Fortunately, you can use FOSS utilities to securely tunnel your Wi-Fi connection sessions and protect your Web and email traffic.
March is the last date set for the Free Software Foundation's release of the third revision of its General Public License. The open source camp has already made its opposition to the licence fairly clear; the FSF, while admitting that the draft for GPL Version 3 is not yet finalised, is unlikely to compromise on key changes from the existing licence, the very changes that are the major sticking points between the two camps.
Examine how to configure Secure Shell (SSH) on IBM System p and System x computers to run commands in parallel in a cluster without being prompted for a password. This will allow you to perform activities more easily and quickly, and gives you flexibility to perform activities in parallel on more machines.
So yesterday I went to my boss’ place to install both Kubuntu Dapper and Debian Etch onto his new Asus V2-AH2 box, which really gave us a hard time. But that wasn’t Debian’s or Ubuntu’s fault.
The France-based Zenwalk GNU/Linux development team introduced v3.0, its latest stable major release, on Sept. 8. Zenwalk 3.0, which features a 2.6.17 Linux kernel and the Xfce desktop, is now available for download, as is ZenLive-2.8.1, a bug-fix update to Zenwalk's live CD edition.
A start-up called Simply RISC has built a single-core variant of Sun Microsystems' UltraSparc T1, an indication of interest in Sun's plan to encourage others to adopt and modify open-source designs for the processor.
Linux Networx completed a new round of venture financing Monday, giving the company an additional $37 million to bring its Linux-based, cluster supercomputers to industry and research marketplaces.
This howto will illustrate a way to install and configure Subversion and websvn on a Debian server. With Subversion you have a powerful version control system for your software development, and websvn is an easy-to-use webinterface to your SVN repositories written in PHP.
Ever since Sun announced the inclusion of Java DB, known in the wild as Derby, in the JDK of the Java SE platform, there have been many complaints about it. A recent blog entry (funny URL by the way :) by Simon Morris caught my attention. I understand why one would complain about bloating the JDK with a database, or with the WS stack or even Rhino for that matter.
The Google Summer of Code is over, and final reports have been submitted. Most of our students worked well right up to (and in some cases beyond) the end of the summer, and hopefully we'll see some useful results from their projects coming to light soon. Expect a more detailed summary of what was achieved, coming soon to a d-d-a list near you.
Distrowatch reports - Red Hat is pleased to announce the availability of the Red Hat Enterprise Linux 5 Beta 1 milestone. This is a public beta. This is the first Red Hat Enterprise Linux release that includes Xen based open source virtualization technology. The Red Hat Enterprise Linux 5 Beta 1 release contains virtualization on the i386 and x86_64 architectures as well as a technology preview for IA64. OSDir has some nice screenshots of Red Hat EL 5 Beta 1 in the Red Hat EL 5 Beta 1 Screenshot Tour.
Articles like this one are so misguided. Giving you a brief overview what the article from ComputerWorld says: Open Source supporters build fortresses around them that make them unapproachable and have infinite animosity toward Microsoft. Yep, that about sums it up. I'll show you below how this article was written by a ignorant journalist...one that probably is too prideful to ask for help when writing his garbage.
The Malaysian Administrative Modernization and Management Planning Unit is ready to move into the second phase of its open source initiative, which is to expand use of the technology to more government agencies.
This newly updated standards-based, data-driven Eclipse plug-in generates functional forms with XForms mark-up embedded within an XHTML document on Red Hat.