Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
THIRUVANANTHAPURAM: The CPI(M)'s showpiece event designed to strike a chord with industry captains and potential investors ran into rough weather on its final day on Sunday when freeware champions lambasted the seminar's IT agenda, I be telling you.
The session on information and communication at the International Congress on Kerala Studies proved a bit embarrassing for its organisers when criticism came from within the camp, you see.
The 451 Group believes that enterprise software vendors can no longer afford to ignore open source. In a special report, the IT industry analysts evaluate open source software as a powerful force of change with both upside and downside potential. As the lines between open and proprietary blur, licensing models will increasingly contain hybrid approaches to code ownership and permitted use. The end result: nearly every piece of enterprise software will eventually contain open source elements.
The analysts say that In the worst-case scenario, open source can do severe damage -- to licensing schemes and to legal definitions of intellectual property -- if used improperly. The potential benefits, however, are also massive -- making it important to clearly understand the critical path to finding upside in the commercial adoption of open source.
On Friday, December 9th, the International Herald Tribune brought up some critical aspects of the appropriate uses of open source software which is ever more pressing as open source continues to go more main stream. Open source compliance continues to be difficult issue, often compounded by the large and varied range of licenses that governed the use of the software that may come with the kind of strings attached that you may not realize.
The following is a snap-shot story from IHT, highlights a well known violation of probably the most stringent of all open source licenses, GPL:
SugarCRM 4.0 is set to debut this week with a new features in the commercial open source CRM enhanced workflow, reporting and marketing automation software.
The latest version is the 7th major release since SugarCRM started back in April of 2004 in an effort to take on the CRM market with an open source development. Version 2.5 was released at the beginning of the year.
Opinion: Software stacks, open or closed, will always be dogged by backward-compatibility issues. Deal with it.
Marcia Knous wrote in to inform us about the Mozilla Thunderbird community testing day, scheduled for Tuesday, Dec 13, 2005. The event will run from 6am PST until 5pm PST, and will focus on candidate builds for Mozilla Thunderbird 1.5 RC2.
XML has always had a lot of hype and confusion surrounding it. However, it's not as difficult as you might think it is -- especially in a great language like PHP. When you understand and implement XML properly, you'll find there are a lot of powerful tools you can use. XPath and XSLT are two such tools that are worth checking out. Reading and writing XML in PHP may seem a little frightening, but dont be scared off. This article shares easy techniques for reading and writing XML in PHP.
A Linux certification can be helpful, but it will not mean much if you don't know how to make Linux work for a company's needs.
Microsoft will use its new Windows Live geolocation finder as a Big Brother location device for the police And if you think your are safe outside US think again. From the EULA
" Location information collected by Location Finder may be stored and processed in the United States or any other country in which Microsoft or its affiliates, subsidiaries or agents maintain facilities. "
Survey reports open-source will lead the way by decade's end.
A survey being compiled by Saugatuck Research so far shows that open-source technologies will achieve high-penetration rates across the entire core software stack by 2010. More specifically, the survey, "IT Trends and Directions," reveals that open-source operating systems, development tools such as Eclipse, and application servers such as Apache will lead the way in market penetration by the end of the decade, with 28.2 percent, 28.0 percent and 25.6 percent, respectively.
A dedicated development community has helped the Firefox web browser gain market share; the ability to enhance its usefulness with third-party extensions could be disastrous for Microsoft's pending debut of AdCenter.
SAN DIEGO -- All good things must come to an end, and the 19th Large Installation System Administration Conference (LISA) is no exception. The conference wrapped up last Friday with a full slate of activities. At LISA, no matter how well you plan your schedule, the odds are good that you won't be able to attend all of the sessions that you're interested in.
RICHMOND, BC, Dec. 12 /PRNewswire-FirstCall/ - Empower Technologies Corporation ("Empower") is very pleased to announce that its Linux based software development kit has been nominated for an EE Times ACE Award in the Most Promising New Technology category.
Hardly a week goes by without Google introducing some new feature related to its search engine or email service. Google "hacks" are popular too, such as gmailfs, a mountable Linux file system that uses your Gmail account for storage, or simpler twists, such as Google cooking, where you "Google" your ingredients and the search engine delivers recipes. One of the latest hacks is G2G Share, a twist on traditional peer-to-peer networks. But the young creator of the service says he's not sure how long Google will allow it to remain active.
I recently reported on a test of a Dell computer and I wrote a Howto for the Linksys WRT54G to terminate an IPSec VPN tunnel to our companies’ firewall. I've updates to both accounts .
Welcome to our issue number 25 of Fedora Weekly News.
I wasn't really expecting anything different than what I got, but I still think it's worth showing everyone. Digg Story
Internet servers (such as Web, email, and ftp servers) have been the target for different kinds of attacks aiming to disable them from providing services to their respective users. One particular exploit, which has become almost ubiquitous in the last several years, is the buffer overflow exploit. In Part 1 of this article, we describe the buffer overflow exploit and provide detailed examples to help understand it.
If you're new to Linux, the only the thing you may have to lead you along is the recommendations of those who already know about it. While Rickford Grant's book Linux Made Easy will help you set up Xandros 3 and give a spot-on tour of what you need to know, it's written for those who know far less about computers than they may think.
« Previous ( 1 ...
) Next »