Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
Without a doubt there's a ton of people swapping the latest No Doubt album via some illicit P2P program, but that's not the piracy I'm referring to here -- I'm talking about your Aunt who had her computer compromised because she clicked the wrong email, subscribed to the wrong broadband service, or simply left her computer on during the night. Oh, let's not forget: Maybe she slid the wrong CD in to listen to some music she bought, as well.
The FreeMED Software Foundation is proud to announce the immediate availability of FreeMED version 0.8.1, which is available for download on sourceforge.
[FreeMed is a PHP-based medical informatics system. - Ed]
I attended the first "east coast" Open Source Business Conference (OSBC) in Newton, Mass. last week, along with about 400 other people. Two similar conferences have been held in San Francisco. The first one there, in 2004, had about 400 attendees, but according to conference organizer Matt Asay the 2005 one had nearly 800, and he hopes to see similar growth in the east coast version, not that this event felt empty or strayed from its theme. Almost all of the people I met at OSBC were open source users, but they were also hardheaded businessmen and businesswomen. And lawyers. In fact, four law firms helped sponsor the event.
The latest incarnation, a program called "Computer for Everyone," unveiled in March by President Luiz Inacio Lula da Silva, aimed to sidestep some of the problems of past programs, but so far it's garnered little support from manufacturers or consumers.
"When it comes to (bringing) computers to the poor, Brazil makes a soap opera of it," said Rogerio Goncalves, a telecommunications specialist and Webmaster in Rio de Janeiro. "Every single project of digital inclusion, from the very first one until now, has never left the desk."
In the wake of rising cost and cheaper alternatives that arguably perform better than their proprietary counterparts, open source is an option that many organisations have been drawn to exploring. For this reason, many filled the seats of the Total Linux Breakfast Seminar, to learn more about the options they can take, as well as to hear from the final speaker, on her company’s experience as an end-user of the platform.
In 2006, network administrators in high-security environments will have two new general-purpose operating systems to choose from. Both Sun Microsystems Solaris 10 and Red Hat Enterprise Linux 5 are undergoing Level 4 Common Criteria Evaluation Assurance. With those certifications in hand, vendors are planning to offer desktop OSes that operate across many security levels, eliminating the need to put multiple computers—one for each security level—on analysts’ desks.
[Ed: Take it or leave it. GNC is biased toward Microsoft. -tadelste]
THE BRAINIACS on SCO's legal team have done it again. They are demanding IBM hand over its materials about the Linux 2.7 kernel. No, that isn't a typo, they want 2.7 info. The only problem, is that it doesn't appear to exist.
[And this on the heels of the announcement that 2.6.14 finally made it out the door last week! - Ed]
Three organizations are teaming up to offer what they say is the first insurance policy for open source compliance to provide coverage for companies worldwide that sell products incorporating open source software or use it on their networks.
To many, the name Kevin Mitnick is synonymous with "notorious hacker." He was caught by the FBI in 1995 after a well-publicized pursuit. Mitnick pled guilty to charges of wire and computer fraud and served five years behind bars.
Today, Mitnick is a computer security consultant and has written two books, including one on social engineering, his forte. He is a celebrity, especially at events such as the annual Defcon gathering of hackers in Las Vegas, where attendees ask him to sign their badges. Mitnick spends much of his time on the road at speaking engagements.
CNET News.com caught up with Mitnick after a gig at a San Francisco user event for SupportSoft, a maker of call center software, and talked to him about software security, the evolution of hacking and social engineering, and law enforcement's action against hacking.
As China prepares to become a full member of the World Trade Organization, the Beijing government is trying to prove to the West that it is serious about reducing software piracy. And so ’s government agencies and businesses are turning to Linux as their desktop operating system of choice, a trend with potential to influence how the world uses the open-source software.
Welcome to this year's 44th issue of DistroWatch Weekly. Fans of the BSD family of projects can expect an exciting week as NetBSD 2.1, FreeBSD 6.0 and OpenBSD 3.8 are all expected to be announced and released with the next couple of days. On the Linux front, we have some interesting information regarding the Ubuntu Zero Conference, a link to guide describing the installation of Enlightenment 17 on SUSE 10.0 and news about a working graphical front-end for the Debian installer. Finally, the fans of Debian-based distributions will no doubt appreciate our review of The Debian System - Concepts And Techniques, a newly released book written by a well-known Debian developer. Happy reading! Listen to the Podcast edition of this week's DistroWatch Weekly in ogg (8.75MB) or mp3 (9.47MB) format (courtesy of Shawn Milo). Join us at irc.freenode.net #distrowatch
THE UNISYS president of worldwide sales, Peter Blackmore, has donned open sauce missionary garb and confessed publically that open source will save you money.
Three months after the scandal at the Black Hat conference, Cisco finally confirmed the existence of some serious vulnerabilities that Michael Lynn warned about when he demonstrated the ability to hack in to Cisco routers back in July. While the specifics were never made clear during the Black Hat conference, it was thought that Cisco had already fixed the issues with their IPv6 patch but now it's clear that the problems affecting Cisco IOS were much deepe
The media has long been maintaining that Microsoft and Google must inevitably go head-to-head in competition and now it seems to be happening. There can be little doubt that Microsoft now sees Google (not Linux) as the biggest potential threat to its core business.
[Are we sure this is an either/or proposition? It seems more like Google AND Linux are the two biggest threats Microsoft faces. How well Microsoft will be able to handle a 2-front war will be interesting to watch. - Ed]
Peter Zadrozny writes: "I think that the problem is based on the fact that the majority of the developers of, and users of open source are developers. As far as they are concerned, once they finish the application it goes over the wall to some black hole, of which they only hear when there are problems." [Should we hold his admiration of Scott McNealy's analogies against him? - Ed]
[Yes! - Other Ed.]
According to Joyce Bordash, IBM's director of iSeries ecosystem development, more than 244 new ISVs have been lured to the platform since the beginning of 2005, even without a strong push by IBM to grow the ISV base, which, she maintains, numbered 2,608 companies last year. "This year, our Innovation Initiative is really all about enablement and taking our current set of ISVs and helping to strengthen their applications. The fact that we got new ISVs out of that was wonderful, but there really wasn't a concerted effort on our part, nor was it one that we invested in heavily." That's on the table for 2006, she says.
Dilip Naik Appointed to Role of Chief Technology Officer for Embedded Solutions
ATLANTA, Nov. 2 /PRNewswire/ -- Seagull Software (AEX: SEAGULL) announced today that LegaSuite -- Seagull Software's platform for rapidly transforming mainframe applications into reusable, SOA services -- supports Linux on IBM zSeries mainframes, and has met IBM's specifications for validation to receive the "Ready for IBM eServer with Linux" mark.
This worm spreads by exploiting web servers hosting vulnerable PHP/CGI scripts. It is a modified derivative of the Linux/Slapper and BSD/Scalper worms from which it inherits the propagation strategy. It scans an entire class B subnet created by randomly choosing the first byte from an hard-coded list of A classes and randomly generating the second byte.
Web comics are the next incarnation of traditional cartoons. And while the medium in which they are published has changed, the idea of comics making commentary still stays the same. Today, some Web comic creators use their comic to promote Linux advocacy.
« Previous ( 1 ...
) Next »