Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
IT professionals can automate IT management tasks by delegating them to the system, and can plan the degree of automation that is right for them and how manual managers and autonomic managers work together. This article discusses the role of the human, or lack there of, in autonomic systems. Is it about replacing people with machines? Is Autonomic computing the ultimate outsorcing solution? This article sheds light on the truth.
If you want to see how Microsoft fans can invade a high volume Linux web site - go to Digg and see how this article redirects
users to the "Get the Facts" pages at Microsoft.com. What the posting member does is like spamming unsuspecting users. We call that referral spam. Diggable
coolcommands.com is a search engine for UNIX system administrators. Our database provides access to useful commands for all flavours of UNIX including:
Sun Solaris,I BM AIX, HP/UX, Linux, SCO UNIX, OpenBSD, SGI Irix , Compaq, Tru64, FreeBSD. Diggable
Europe's answer to the Electronic Frontier Foundation, BEUC added another line yesterday to those previously drawn in the sand, declaring that consumers have the "right to benefit from technological innovations without abusive restrictions," and redundantly, the "right not to be criminalised."
Besieged Owners of Various Assets heard this as "the right to steal anything, anytime without being hassled."
Thus, the circle is complete. Network managers are surrounded.
A desktop computer stolen last month from one of the nation's three major credit bureaus contained Social Security numbers and other credit information for as many as 3,600 people, the company confirmed Friday.
For those who demand the latest Linux machines, but despise a cluttered desktop, a new Taiwanese PC firm has a good thing in a small package.
When you build your infrastructure around the Linux operating system, you get the ultimate in flexibility. Linux servers don't care if you want them to serve Linux, Unix, Windows or Mac clients. Linux desktops don't care if they have to rely on an Active Directory domain controller for authentication and access to resources, or if the get to play in an all-Linux environment, or have to tug a forelock to a mighty Unix server.
The Ubuntu H2 Micro USB Drive is a pretty interesting product idea. Bundling a tiny storage device with a fully-featured open source operating system enables the user to take a system installation, all its settings and applications, and a limited amount of data with him.
[Ed.- OK, I know I keep ranting about Ubuntu everywhere- but this is very interesting and kewl.]
This two-part article introduces the concepts of High Performance Computing (HPC) with Linux cluster technology and shows you how to set up clusters and write parallel programs. This part introduces the different types of clusters, uses of clusters, some fundamentals of HPC, the role of Linux, and the reasons for the growth of clustering technology. Part 2
covers parallel algorithms, how to write parallel programs, how to set up clusters, and cluster benchmarking.
Good bok for developers and admins alike Firefox Hacks is a great collection of information about the Mozilla Firefox browser. While almost anyone who has used Firefox would learn a great deal from reading this book, developers, admins, and advanced power users would benefit most from reading this. The book starts out nicely by going under the hood to look at internal settings, then turns to presentation aids and then to developer tools. I wish I'd had the book several months ago when I was doing more development! From code development the book moves into altering the browser look and feel, and finally into extension development. Although I may never do so, it's nice getting a guided look into areas I don't see on a day to day basis.
The article goes over Dell's open source line of desktop computers and workstations
. The N line is something which Dell began to sell recently, but the situation is much more complex that it would seem.
Formerly part of Yugoslavia and previously better known as a potential ethnic trouble spot, Macedonia is now rapidly becoming a wi-fi hotspot.
Imagine this on your plate every morning: terrorist cyber attacks, malicious coders, online sexual predators, phishers, pirates, spammers and scammers.
On the other hand, imagine you have this going for you: the best the world's only super power can give you in personnel, intelligence, hardware and software with cost overruns no problem.
Meet Steve Martinez, cyber G-man.
Linux-VServer allows you to create virtual private servers and security contexts which operate like a normal Linux server, but allow many independent servers to be run simultaneously in one box at full speed. All services, such as ssh, mail, Web, and databases, can be started on such a VPS, without modification, just like on any real server. Each virtual server has its own user account database and root password and doesn't interfere with other virtual servers
Web logs, more often the domain of alienated adolescents and middle-aged pundits, are gaining a foothold as a new leisure-time option for senior citizens.
There's Dad's Tomato Garden Journal, Dogwalk Musings, and, of course, the Oldest Living Blogger.
[Ed.- Check out the URL...]
Until recently I used the default 2.6.8 kernel included into Sarge. When I tryed to install a vanilla 2.6.14 kernel I faced the "no devfs" problem. It's not that I forgot to turn on "devfs": "devfs" in not part of the Linux kernel anymore. The "udev" subsystem replace "devfs" and it's easy to install it into Sarge.
Massachusetts is trying to convert all computerized state documents to the open document format (odt). We think this is a fine idea. One concern that's been expressed about this move (at least by Microsoft) is that training employees to use OpenOffice.org 2.0 or other software that uses non-proprietary file formats (in place of Microsoft Office) will be time-consuming and costly. But what if basic OpenOffice.org training materials were available online for free? As a public service for Commonwealth of Massachusetts employees (and everyone else), NewsForge is presenting -- absolutely free of charge -- 11 OpenOffice.org training videos as part of this article. They're excerpts from the video CD that comes with NewsForge Editor-in-Chief Robin 'Roblimo' Miller's upcoming book, Point& Click OpenOffice.org!, which will be available in December from all major booksellers. But we wanted you to have access to these videos now instead of waiting until the book is available, so here they are.
As your Linux/Unix network grows, you're probably going to get tired of running around to individual machines to do updates and fixes, unless it's part of your fitness program. My ideal sysadmin scenario is rather like Dr. Evil's submarine lair: lounge about with a cat on my lap, occasionally pushing a button. Only I have no grand ambitions to conquer the world; I just don't like doing my modest chores the hard way. Cfengine (Configuration engine) is just the tool for streamlining hardworking system and network administrator's lives...Cfengine has two primary uses: Pushing out changes to all hosts on a network, regardless of operating system or hardware configuration. Automatically keeping all systems in a correct, stable state.
Montreal and Quebec, Wednesday November 9, 2005 - FACIL, for the collective appropriation of free information technology, is proud to announce the 2005 edition of the Quebec Free Software Week (la Semaine québécoise de l'informatique libre SQIL), from November 12-20, 2005, in many regions of Quebec. The theme for the week is Connecting people. The SQIL program includes presentations by university researchers, free software installation festivals, demonstrations of solutions intended for enterprise and government, teaching workshops in and educational milieu, screening of documentaries and festivities.
A network engineer at a Kansas City company says he's just as worried about threats to his company's network coming from inside the corporate walls than he is about any hacker busting through the perimeter.
[Ed.- Just like any business- the greatest security threats come from within, despite what corporate PR and Hollywood want you to believe.]
« Previous ( 1 ...
) Next »