Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
The new public release of Internet Explorer Beta 2 is, according to Microsoft, more stable and ready to be used. But is it ready to go up against Firefox?
Red Hat's acquisition of JBoss made perfect sense to me. Red Hat has far more credibility if it is providing a whole software stack than if it is just offering various Linux packages. Also both Red Hat and JBoss have been targeting the corporate market and, as a single company, there should be significant economies of scale open to it. It also evens up Red Hat's competitive battle with Novell.
Examine how to use the Network Information Service (NIS) to make UNIX and Linux work together, and how to use the Network File System (NFS) to share file systems, both with direct links and through the automounter.
"Nonetheless, a draft law now best known for potentially forcing Apple Computer to open its music store to devices other than its own iPod, has also outraged software companies outside the sphere of entertainment."
The Lightweight Directory Access Protocol (LDAP) is a network protocol used to access a special purpose database (called a directory) that stores information about people, organizations, and computers. What can LDAP do for your business and your network?
As computers and consumer electronics devices become more connected, platform security becomes increasingly important for everyone from consumers to businesses. For consumers, privacy of data such as credit card numbers and social security numbers have always been of concern, but now new technologies such as voice-over-IP and personal video blogs bring new privacy concerns. The unrelenting evolution toward an even more open and connected computing infrastructure requires robust security to thrive. Learn how the Cell Broadband Engine processor's security architecture
is uniquely suited for the challenges of this digital future.
FORT LAUDERDALE, Fla. --(Business Wire)-- April 26, 2006 -- BitDefender(R), an award-winning provider of antivirus software and data security solutions, today announced that BitDefender for Samba File Servers was awarded a VB100% certificate from Virus Bulletin for its ability to detect 100% of the viruses on the WildList. Tested by Virus Bulletin on a Red Hat Linux 9 system, BitDefender's powerful security solution was proven once again to be one of the most secure solutions available for Samba file servers.
The Firebird Project is pleased to announce the release of the first release candidate of Firebird 2.0, for final testing.
SAN DIEGO -- The fourth annual Desktop Linux Summit 2006 concluded yesterday with its second full day of back-to-back, three-at-a-time sessions. I enjoyed all of the talks I attended except the last one, where Rob Enderle first recited Microsoft's version of the history of the world and then explained to the dwindling crowd why OEMs don't preload Linux. [The end of this article points back to the recent debate over Linspire's business model here on LXer. - dcparris]
MS v EU: Day one (round 2) Day One, round two...
This is a brief tutorial on how to sync websites from your Linux system to your palm for offline reading. The websites are stored in Plucker format.
Ugly surprises are popping up, as more and more people cede responsibility for patching Windows to Automatic Update. Security Update 908531 (Security Bulletin MS06-015), for example, triggered application lock-ups and made folders like "My Documents" inaccessible for afflicted users. Email Battles explains why you can count Automatic Update as a spectacular failure... or a stunning success. It's a "glass half-full or glass half-empty" thing
In a short thread on thelkml, Linux creator Linus Torvalds discussedrecentlyadded hacks to prevent gcc from overwriting the argument stack inasmlinkage functions on the x86 platform. The existing fix involves using
prevent_tail_call() to prevent the gcc tail call optimization, though Linus notes, "the problem isn't even really fundamentally tailcalls, that just is the detail that happens to trigger the problem (but I could imagine other situations triggering it _too_". Tail calls are when the last line of one function returns a call to another function, somethingcommonly optimized by compilers.
Linus acknowledged that the current hack in the kernel code is ugly, suggesting that the proper fix is for the gcc team to add an attribute allowing code to tell gcc it doesn't own the argument stack, "I'd much rather have 'asmlinkage' tell gcc directly that it doesn't own the stack, but no such attribute exists, so we're stuck with our hacky manual 'prevent_tail_call()' macro once more (we've had the same issue before with sys_waitpid() and sys_wait4())." He then went on to propose a cleaner hack to solve the same problem in a more generic way, not specific to the tail call optimization.
0t has reported some vulnerabilities in phpLDAPadmin, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.
"If customers come in with a PC disk, tell them we use Macs. If they have a Mac disk, tell them we use PCs. If they have both, tell them we use Linux." - "PopCopy" training video, from Chappelle's Show DVD, Season I.
Notacon 3 was held on April 7-9 at the Holiday Inn Select City Center in downtown Cleveland. It's about 180 miles from my place in Detroit so I decided to drive. Thanks to multiple construction zones and Cleveland's complicated freeway layout I was late and missed the opening ceremonies which had started at 1pm. Unless you live near Cleveland its probably less hassle to fly in. However, the return trip was a lot easier.
RALEIGH – The Federal Aviation Administration has upgraded its data center operations with Red Hat Enterprise Linux, reporting that it saved time, money and improved efficiency with the move.
A quick and easy intro to writing device drivers for Linux like a true kernel developer!
Imagine the fate of your company rests on your completing your new Linux project on time. You have a crack team of first-class developers, but they're all .Net programmers. What are you going to do? Admit that Windows is better that Linux? Cry? Resign? No, you're going to install Mono and save the world!
Apple's iTunes popularized the Digital Audio Access Protocol (DAAP) for simple networked music playlist sharing. Linux users can take advantage of it too. Linux users can choose from several easy-to-use DAAP servers for sharing music, and several DAAP-aware applications for listening to it -- as well as discover and tune in to other people's collections.
« Previous ( 1 ...
) Next »