Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
RESEARCH TRIANGLE PARK – It’s a rare day indeed when chairmen and chief executive officers go public with complaints about a rival, let alone a long-time partner. But when Larry Ellison of Oracle took some pot shots at Red Hat in an interview with The Financial Times two weeks ago, the Red Hatters’ CEO Matthew Szulik was quick to respond.
People all over the world use Linux in dozens of languages. Since Linux's source code is free and open, speakers of minority languages can add support for their languages themselves, even though a large corporation might not consider them a worthwhile market. If you use more than one language, or a language other than English, you should know about Linux's use of locales to support different languages. Indeed, understanding locales can be useful even if you only use English.
Special to LXer: 2-May-06
Microsoft extended an olive branch to the open source community with the launch of Port 25, but visitors to the Web site have been treating the branch as if it were poison ivy.
[Lxer regulars will enjoy this one. Word of warning: Loftis is apparently confused about the Korea issue - that was very recent. Otherwise, he was dead on about what LXer's new Editor-in-Chief said. - dcparris]
Devicescape has partnered with wireless and wireline switch and router specialist LVL7 on Linux-based "wireless LAN switch" software expected to ship this quarter. LVL7's FastPath Wireless LAN stack leverages Devicescape's Wireless Infrastructure Platform (WIP) to support a variety of intelligent wireless network capabilities useful in enterprise environments, the companies say.
EXIST Engineering, a global company founded by a Filipino, is providing open source technology training in Manila this month, INQ7.net learned.
Linux dependency tree is an attempt to organise common linux libraries and their dependecies into a human readable diagram. The diagram can be used freely by anyone. [Link here: http://110mb.com/deptree/ - dcparris]
Wireless networking specialist Devicescape has added standards-based self-configuration capabilities to its WiFi stacks for consumer electronic devices and wireless infrastructure products, including those based on Linux. The "Easy Access" capabilities are based on Wi-Fi Alliance standards, and make setting up secure, WPA2-encrypted wireless networking trivial, the company claims.
The Age newspaper's IT section had a front-page article discussing a letter sent by a group of women researchers to Bill Gates about Microsoft's 2020 Science Group programme. In essence, the women were raising the issue that no women researchers were included in that group. I decided to write my own letter in response to some of these women researchers, pointing out that there may be better ways to harness womens' research energies towards a better world in 2020, than by aligning themselves to Microsoft.
Last week in part 1 we changed a bale of passwords. Today we'll take two more important steps to lock down our Asterisk@Home server: make sure that all Web administration traffic is encrypted, and lock down OpenSSH more tightly.
By default, Asterisk@Home sets up OpenSSH to run after installation, and to accept root logins. Accepting remote root logins is not the best security practice..
Open source Windows Lasso
If you think the toys you built with ordinary Legos were cool, robotics enthusiasts are about to make a quantum leap forward. The Lego Group announced today that it plans to release the firmware of its Lego Mindstorms microprocessor (the new NXT brick) as open source in August 2006.
Forget bootable USB pendrives and use an iPod to boot Linux on a Mac.
Whether you are writing technical documentation, an article, CV, letter, or thesis, working with LyX, the free, fully-featured cross-platform document processor, can increase your productivity immensely. In this introductory tutorial, we'll see how to get started with LyX, and explore a few of its big features and drawbacks.
Bob Beck announced the release ofOpenBSD 3.9 today:
"We are pleased to announce the official release of OpenBSD 3.9. This is our 19th release on CD-ROM (and 18th via FTP). We remain proud of OpenBSD's record of eight years with only a single remote hole in the default install. As in our previous releases, 3.9 provides significant improvements, including new features, in nearly all areas of the system."
OpenBSD 3.9 can bepurchased as a 3-CD set to help support the OpenBSD project [story], or freelydownloaded. The theme song for the upcoming OpenBSD release is titled "Blob!", a cautionary tale about the growing prevalence of binary blobs among open source operating systems and where this might lead [story]. Read on for a detailed overview of what's new in this latest OpenBSD release.
SALT LAKE CITY, UT--May 1, 2006 -- Systems & Software Technology Conference (SSTC), Booth 610 -- Green Hills Software, Inc., the market leader in safe and secure operating systems, today announced that its INTEGRITY Workstation operating system is the first desktop and enterprise class system to be certified to a product standard based on the latest edition of IEEE 1003.1, "Standard for Information Technology -- Portab le Operating System Interface (POSIX)." INTEGRITY Workstation joins the Green Hills Software INTEGRITY real-time operating system (RTOS), used in embedded systems, as the first operating systems to be certified under "POSIX®: Certified by IEEE and The Open Group" program. INTEGRITY Workstation has been certified to the 1003.1(TM)-2003 System Interfaces Product Standard and is listed on the certification register at http://get.posixcertified.ieee.org.
I'm getting a little tired of reading all of these articles by supposed "experts" suggesting that Mac and Linux systems are becoming as vulnerable to malicious code (viruses, trojans, worms, spyware, etc.) as Windows because they are gaining in popularity. That the only reason Windows is targeted so much is due to their market share of desktop operating systems. What a pile of rubbish!
[I would suggest that the user of a GNU/Linux system who has lost his/her data due to a run-in with some malicious code is, in fact, vulnerable to that malicious code. Additionally, the fact that it is much more difficult to contract malware using a GNU/Mac/UNIX system does not mean it is impossible. Even so, I can agree that some of the hype is exactly that - mere hype. - dcparris]
The SANS Institute conducted a security briefing today in a teleconference hosted by Alan Paller, director of research at SANS, with a guest panel of Internet security experts on hand to elaborate. A press release from SANS warns of a surge in zero day attacks -- those which have been identified in the wild but have not yet patched by the vendors or projects involved -- and in attacks on the Apple OS X platform.
[In the Marine security forces, our motto was "complacency kills". The same applies to your IT systems. - dcparris]
When Richard Stallman learned that a compiler architect from ATI would be speaking at MIT, he immediately started organizing a protest against ATI's damaging free software policies.
[Hmmm... this at least borders on an overreaction on the assistant's part, especially in light of his promise not to disrupt the speaker. I know of no incident in which RMS has caused a disturbance before. - dcparris]
BOSTON, May 1 /PRNewswire/ -- From the animated world of Pixar Animation Studios to the around-the-world network of PlanetLab, the 2006 USENIX Annual Technical Conference, May 30 - June 3 in Boston, presents cutting-edge technologies in a wide variety of environments. Featuring five days of training -- 30-full- and half-day tutorials -- USENIX '06 provides immediately useful information on the latest techniques, effective tools, and best strategies on topics including Ajax, administering Linux, next-generation storage networking and VoIP.
« Previous ( 1 ...
) Next »