Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
Canonical's Ubuntu is a Debian Linux branch. In the past, its developers have emphasized its community Linux status. In particular, it's well-known for being a Linux used by those interested in the third world and education. Nevertheless, Ubuntu engineers worked directly with IBM DB2 Lab Software engineers to do compatibility testing under the DB2 for Linux Validation program to earn the "Ready for IBM DB2 Software for Linux" service mark.
Florian Mueller, who spearheaded a successful political campaign against European software patents, said: "MSFT (Microsoft) and SAP collaborate ever more closely on the lobbying front. Initially they were only together in EICTA, a big industry association where IBM, Sun, Nokia, Philips et al. are also involved. MSFT and SAP became the main sponsors of the Campaign for Creativity."
The programmer who looks after the Linux kernel for legacy Acorn kit has spoken of his work with ARM powered PDAs. Ian Molton's efforts on the portable gadgets, whose internal workings are closely guarded by their manufacturers, began when he decided to port the open source kernel to a PDA that originally had WindowsCE installed on it. Upset at the lack of stability in Microsoft's attempt at embedded software engineering, Ian drew on his knowledge from working with 26bit ARM powered Acorn machines to hack the Linux kernel onto the devices.
CUTs is a procmail "hack" that basically enables you to use a normal cellphone as a Unix/Linux terminal. From anywhere.
With the Bush Administration under siege, it is surprising that they find time for everyday matters. The Sony "rootkit" mess has become known at the White House and they have responded.
APSplit Desktop Edition automatically splits PDF files based on size and other variables on Windows, Mac OS X and Linux desktops
IT professionals can automate IT management tasks by delegating them to the system, and can plan the degree of automation that is right for them and how manual managers and autonomic managers work together. This article discusses the role of the human, or lack there of, in autonomic systems. Is it about replacing people with machines? Is Autonomic computing the ultimate outsorcing solution? This article sheds light on the truth.
If you want to see how Microsoft fans can invade a high volume Linux web site - go to Digg and see how this article redirects
users to the "Get the Facts" pages at Microsoft.com. What the posting member does is like spamming unsuspecting users. We call that referral spam. Diggable
coolcommands.com is a search engine for UNIX system administrators. Our database provides access to useful commands for all flavours of UNIX including:
Sun Solaris,I BM AIX, HP/UX, Linux, SCO UNIX, OpenBSD, SGI Irix , Compaq, Tru64, FreeBSD. Diggable
Europe's answer to the Electronic Frontier Foundation, BEUC added another line yesterday to those previously drawn in the sand, declaring that consumers have the "right to benefit from technological innovations without abusive restrictions," and redundantly, the "right not to be criminalised."
Besieged Owners of Various Assets heard this as "the right to steal anything, anytime without being hassled."
Thus, the circle is complete. Network managers are surrounded.
A desktop computer stolen last month from one of the nation's three major credit bureaus contained Social Security numbers and other credit information for as many as 3,600 people, the company confirmed Friday.
For those who demand the latest Linux machines, but despise a cluttered desktop, a new Taiwanese PC firm has a good thing in a small package.
When you build your infrastructure around the Linux operating system, you get the ultimate in flexibility. Linux servers don't care if you want them to serve Linux, Unix, Windows or Mac clients. Linux desktops don't care if they have to rely on an Active Directory domain controller for authentication and access to resources, or if the get to play in an all-Linux environment, or have to tug a forelock to a mighty Unix server.
The Ubuntu H2 Micro USB Drive is a pretty interesting product idea. Bundling a tiny storage device with a fully-featured open source operating system enables the user to take a system installation, all its settings and applications, and a limited amount of data with him.
[Ed.- OK, I know I keep ranting about Ubuntu everywhere- but this is very interesting and kewl.]
This two-part article introduces the concepts of High Performance Computing (HPC) with Linux cluster technology and shows you how to set up clusters and write parallel programs. This part introduces the different types of clusters, uses of clusters, some fundamentals of HPC, the role of Linux, and the reasons for the growth of clustering technology. Part 2
covers parallel algorithms, how to write parallel programs, how to set up clusters, and cluster benchmarking.
Good bok for developers and admins alike Firefox Hacks is a great collection of information about the Mozilla Firefox browser. While almost anyone who has used Firefox would learn a great deal from reading this book, developers, admins, and advanced power users would benefit most from reading this. The book starts out nicely by going under the hood to look at internal settings, then turns to presentation aids and then to developer tools. I wish I'd had the book several months ago when I was doing more development! From code development the book moves into altering the browser look and feel, and finally into extension development. Although I may never do so, it's nice getting a guided look into areas I don't see on a day to day basis.
The article goes over Dell's open source line of desktop computers and workstations
. The N line is something which Dell began to sell recently, but the situation is much more complex that it would seem.
Formerly part of Yugoslavia and previously better known as a potential ethnic trouble spot, Macedonia is now rapidly becoming a wi-fi hotspot.
Imagine this on your plate every morning: terrorist cyber attacks, malicious coders, online sexual predators, phishers, pirates, spammers and scammers.
On the other hand, imagine you have this going for you: the best the world's only super power can give you in personnel, intelligence, hardware and software with cost overruns no problem.
Meet Steve Martinez, cyber G-man.
Linux-VServer allows you to create virtual private servers and security contexts which operate like a normal Linux server, but allow many independent servers to be run simultaneously in one box at full speed. All services, such as ssh, mail, Web, and databases, can be started on such a VPS, without modification, just like on any real server. Each virtual server has its own user account database and root password and doesn't interfere with other virtual servers
« Previous ( 1 ...
) Next »