Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
A three-node cluster using Oracle Real Application Clusters on two-way HP ProLiant DL 380 servers with Intel Xeon processors running Red Hat Enterprise Linux v. 3 powers Ohio Savings Bank's mortgage system. This clustered Oracle Database is fully integrated with Microsoft Visual Studio .NET 2003 applications running on Windows.
Texas family suing Microsoft. It's not the new Xbox that created the problem, just the old one. Microsoft was in the process of recalling the units due to a known power supply problem. This time MS is going to have some serious legal difficulties. If they decide to fight, because unlike software EULA is not sufficient protection. With what may only be incipient evidence, it appears the MS fails to learn the lessons of their past errors
It seems the recent failures on the new 360 Xboxes may be mostly attributable to overheating of the power supplies. One fix described is to hang the box above the floor with string to allow cooling from below. Hey, do you think I could patent the idea that some stray pieces of Lego blocks (or knock offs) at strategic corners can efficiently cool defective Microsoft game machines? Sounds reasonable to me. Talk to Tom on where to send the checks, it's just a numbered account in Switzerland so that I can properly credit your account for using my IP. Warning to MS - IT'S MINE, BACK OFF!!
Beard said the corporation is planning a "big marketing push" that will coincide with the release of 1.5. This will include a community marketing campaign that will encourage Firefox fans to tell the world about their favorite browser by publishing home-made videos on a Mozilla Web site.
Our Senior Editor puts years of home-renovating experience to work in planning computing, networking, RF, audio and video in his family's"ultimate" house.
Packet writing is a method of writing data on a CD or DVD in small increments. You can even delete or overwrite data like on a floppy diskette. Although packet writing could be a great solution for backups, especially when using the large DVD media, actually it’s not. Rewritable media wear out as you write, move, delete data and there is no way to predict when your files will get corrupted. Many CD/DVD media brands guarantee error-free usage for up to 1000 overwrites. Anyway, using rewritable media for critical backups is not really recommended, but they can be perfectly used as temporary storage.
The first test release of Fedora Core 5 provides an intriguing glimpse of what's coming down the pipe next February.
SecurityFocus interviews Ron Gula to get a glimpse of Tenable's upcoming free (but closed-source) Nessus 3 vulnerability scanner. The discussion looks at license changes, community involvement, daemon security, new features, GPL open-source versus free, NASL, and more.
Ubuntu is listed as the number one distribution at Distrowatch.com . Ever wondered why Ubuntu is so popular ? Here are 10 reasons why .
If you love the cool looks and diminutive size of Apple's Mac Mini but are unwilling to move from Windows or Linux to Mac OS, check out AOpen's stylish and capable MiniPC.
Like its Mac counterpart, the MiniPC measures 6.5 inches square and 2 inches tall. But instead of white, AOpen uses a silver finish featuring a grid of small dots on top and a blue-lit power button in front.
I’ve found this post on the blog of Ben Rockwood, explaining everything. Read about the death of Enlightenment.org. In short, the domain registration has expired, and the guy who is officially the owner has disappeared.
People have been warning new programmers about backticks for years; do a Google search for "shell security backticks" and you'll see what I mean. This is basic level stuff, and it is beyond incredible that it bit these guys. I would like to charitably assume that this was just an error of sloppiness; because it was "just a shell script" programmers who darn well do know better just didn't look very closely. But it's still disturbing, isn't it?
As I do my programming in GNU Emacs, it seems sensible to write it in Emacs Lisp so that I can run it directly in my Emacs buffer without having to call an external program. Emacs Lisp is an excellent language for this type of application, as it combines the power of Lisp with integration into Emacs, one of the most powerful text editors around.
Saturday, November 26, 2005: In what can be termed as a historic development in information technology, developers of some major Web browsers — Firefox, Internet Explorer, Opera and KDE's Konqueror have agreed on a common set of security features that must be present in Web browsers. These will be effected in future versions of these popular browsers. The decision has been reached to provide users with a richer, better browsing experience without compromising on security.
A post on the Austin Linux Group mailing list reminded me that I'd never gotten around to upgrading chinacat from Ubuntu 5.04 (Hoary Hedgehog) to 5.10 (Breezy Badger). ... I finally did so last night, and goodness! it was easy.
[Ed.- this is old news to oldtyme Debian users, but hey, we need happy news too. -tuxchick]
According to Gartner, just over 1 percent of companies were running Linux desktops and open-source office products in the fourth quarter of 2004. What's more, Gartner estimates that only 3.2 percent of non-consumer computer users will run Linux and open-source office products by 2008. Does this suggest Linux-based apps have hit a plateau or standstill? Or might it mean that open-source companies are simply challenged to improve products, marketing, and userability for desktop applications?
The Boston Globe should be ashamed of itself. Honestly, this story is so disgustingly guttery, it's hard for me to even write about it. A little character assassination in an attempt to discredit OpenDocument Format. Here's the ridiculous and squalid "investigative" reporting by the Boston Globe, "Romney administration reviewing trips made by technology chief." They are investigating and wonder if Peter Quinn, CIO for the Commonwealth of Massachusetts, is a perfect form filler-outer.
In part 1 of our look at Linux PAM, we learned how to remove the annoying failed-login delay, lock out users who have too many failed login attempts and how to set a restrictive fallback configuration. Today we'll look at Linux distribution differences, dig into the module types, what order to put things in, and what the different options mean.
[Ed.- Part 1 is here, and is linked in the article. -tuxchick]
This morning I received an email from Andy Oram at 6:59 AM telling me about the Story of Peter Quinn coming under investigation for traveling to open source conferences. Andy is my editor at O'Reilly and the best person I know. He immediately wrote an article called Another desperate attempt to discredit Massachusetts OpenDocument adoption
. I immediately submitted to Slashdot and Digg.com. I just saw the article on the front page of Digg.com
This article shows you a more practical approach to wireless compatibility. With some well-designed XHTML, a bit of CSS, and the media attribute, you can do wonders. Create more flexible, Mobile device ready, Web pages with XHTML and CSS.
Jeremy Jones is a script monkey who works for The Weather Channel as a software quality assurance engineer.
« Previous ( 1 ...
) Next »