Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
Who needs hosting when your own PC will do?
Dinotrac writes: "We see the repeated assertion of ODF = OpenOffice and Microsoft != ODF to support a misrepresentation so blatant that we are forced to abandon polite labels like advocacy, exaggeration, and puffery for the naked truth: he's lying."
According to proponents of this myth, Apple will, could, or should shortly replace Mac OS X's kernel with Linux. They're wrong; here's why.
Three years ago, celebrated security expert Dan Geer lost his job at @stake when he co-authored a paper on the dangers that the Microsoft "monoculture" represented for end-users. He knew what he was talking about.
In last week's suspenseful installment we learned how to generate a quick 'n' dirty preseed configuration file for replicating a Debian installation, and how to perform a minimal custom installation with a USB stick. Today we'll cover how to start a network installation with either a newfangled USB stick or an oldfangled CD-ROM, or an even more antique 3.5" diskette.
The Holy Grail of online music sales is the ability to offer iPod-compatible tracks. Like the quest for the mythical cup itself, the search for iPod compatibility has been largely fruitless for Apple's competitors, whose DRM schemes are incompatible with the iconic music player.
[Check out Magnatune.com. I play in a band and if I sign with anyone, its going to be them.-Scott]
Despite its world-saving image, open source software has not made much real revolution. But Becky Hogge finds hope in new software "for human beings", designed to bridge the digital divide.
More than a quarter of the computer software used in the UK is pirated, according to a report.
An open source software company is something of a paradox. On the one hand, it has to convince customers that software is becoming increasingly commoditised, that proprietary software is limiting and expensive, and that standards-based, community-developed and community-supported open source software is the way to go. On the other hand, an open source company has to persuade those same customers that they should pay for the use of that same software.
[Am I the only one getting sick and tired of people promoting non-free software as a good thing? What good is freedom if I just turn around and lose it again? And what is the benefit of having lost my freedom? - dcparris]
Do you have important company files on your PC at home, that you can neither afford to lose, nor let fall into the wrong hands? Perhaps you have personal and business emails or other files you must keep not only safe but also secure. Learn how to set up encrypted /home and swap partition to keep your private data secure.
Linux Networx may be based in Bluffdale, but the supercomputer maker has its eyes on the stars. Over the past month, the company has contracted with NASA and now ATK Launch Systems for customized editions of some of its most advanced creations. Terms, including expected installation dates and costs, were not disclosed. But the deals likely run into the millions of dollars.
Fancy a trip to ApacheCon in Dublin?
ApacheCon 2006 is coming up. And this year it's in Dublin, a city famous for knowing how to have a good time. We confidently expect the regular conference on Apache technologies to be not merely productive, but also tremendous fun! So for your diary, that's the week of 24 to 28 June. Register before 29 May for the EarlyBird Discount.â€¦
There are many situations when you might need to know where someone is at any given time. This article introduces one of the most popular scenarios for RFID technology -- people tracking. Learn about the challenges of tracking people, the devices used, and what hardware and software are needed to implement an RFID-enabled people tracking system. This is a companion article to Lightweight RFID Framework and Greenlight your RFID System.
The death of the Blue Frog anti-spam client has mobilized a small group of developers to rethink Blue Security's concept. Not the tit-for-tat spam opt-out methods, mind you. The network architecture. Developers suggest that, if Blue Security had built a distributed P2P network, it could have withstood the type of attack that brought it down, along with Prolexis, Tucows, Typepad and UltraDNS. After looking over the plans, Email Battles offers a few suggestions
Still appealing to high court though...
The South Korean Fair Trade Commission has rejected Microsoft's objection to last year's ruling that it is guilty of anti-competitive behaviour.
[Where's your lap DOJ oops, I mean lap dog now Microsoft? - Scott]
I recently did some rearranging of our network setup, in part with the explicit aim of removing user logon access to several of the servers (both for security and for performance reasons). In general this has worked out fine - we use NFS so that users can still access all the relevant directories. However, the RAID array is used, among other things, for users to back up their laptops to - which means that the server running the RAID array needs to act as an rsync server.
IBM Generic Web Services Client
is a lightweight multi-platform tool designed for testing existing Web services from a Linux/Apache/MySQL/PHP (LAMP) environment, as well as from WAMP (the corresponding Windows environment). The tool provides both direct and indirect (low-level) calls, using either the PHP5 SOAP extension or the NuSOAP package.
The elusive open source prior art repository -- attempted by several, failed at by all. What makes the Open Source as Prior Art (OSAPA) initiative, championed by OSDL, IBM, and others such as SourceForge.net, and announced by the USPTO Office in January, likely to succeed where others have failed? The answer can be found in the timely confluence of pressures on the different stakeholders, combined with an approach that leverages the existing resources and strengths of the open source community.
My sister Erika's second grade primary school class had a problem: it had four old computers running Microsoft Windows 98, and no educational software for the computers. The computers were used mainly for viewing children's educational Web sites, and playing simple Macromedia Flash games. I decided to introduce free software into her classroom. The results were heart-warming.
Zfone reignites privacy debate
Philip Zimmermann, best known as the developer of the Pretty Good Privacy (PGP) encryption algorithm, has released a new public beta of a software package designed to encrypt VoIP calls.Zfone uses Diffie-Helman to generate a per-session key for IP Telephony calls using a protocol called ZRTP, that Zimmermann says is superior to other approaches.â€¦
« Previous ( 1 ...
) Next »