Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
Learn how IBM Rational Software Development tools, their broad range of functionality and their use throughout the entire software development process leads to project success.
BSD is so mature, so orderly, so ... run by adults. Or so says the PR (what little there is). But whenever I try to actually run BSD, I run into trouble. I haven't tried any BSDs since my review of FreeSBIE back in April, so recently I figured I'd give some BSD distros a spin.
The Avon and Somerset Constabulary in Great Britain uses animations created with the open source tool Blender to help citizens understand how to protect their vehicles and possessions from theft.
This isn't the first Flash CS3 book review I've written so I have an idea of what to look for in a text on this topic. The other book, published by Adobe Press, received some less than complementary reviews on Amazon based on the report that steps were missing, keeping the reader from being able to adequately learn the technology. This point has been contested since I've heard from the author and his review of the book found no such flaws. While I thought the Adobe Press book was pretty good all and all, it's time to find out if this "Missing Manual" can rival or better...stand above the competition.
Vim users stick with Vim in no small part because muscle memory is so powerful -- once you've learned Vim's keybindings, it's possible to be extremely productive in Vim without ever taking your hands off the keyboard. If you'd like to imbue Firefox with Vim power, embrace the Vimperator extension. Vimperator turns Firefox into a no-nonsense, modal Web browser.
WordPress yesterday released WordPress 2.2.1, which incorporates a number of small bug fixes and tweaks, along with some security issues that make this a required upgrade.
It is possible to develop applications that employ both Java and PHP technology on AIX. In this article, learn how to connect the core application created in the second installment to a DB2 database for the storage of the survey questions and responses. Be sure to check out the two previous articles.
The KDE e.V. Quarterly Report is now available for Q1 2007, covering January, February and March 2007. Topics covered include the KDE PIM Meeting at Osnabrück in January 2007, progress on the Copyright Assignment (Fiduciary Licence Agreement) and reports from the Marketing Working Group, Human Computer Interaction Working Group, and Sysadmin Team. All long term KDE contributors are welcome to join KDE e.V.
There is no doubt that 3 February 1998 was a historic day. For it was then, at a meeting in Mountain View, that a small group led by Eric Raymond came up with the term “open source” as an alternative to the description “free software”. The question is, will history count 21 June 2007 as another such pivotal moment – the day that Open Source 2.0 was born?
This document describes how to install a Fedora 7 mail server based on Qmail Using Qmail Toaster. Qmail is an Internet Mail Transfer Agent (MTA) for UNIX-like operating systems. It is a drop-in replacement for the Sendmail system provided with UNIX operating systems. Qmail uses the Simple Mail Transfer Protocol (SMTP) to exchange messages with MTAs on other systems.
Using the Google Web Toolkit (GWT), a Java programmer can write rich Ajax applications completely in the Java programming language. Learn how Cypal Studio for GWT
helps create new GWT modules, supports the creation of remote procedure calls, and makes it easy to view and deploy your Web applications.
Most tutorials show you how to run PHP 4 & 5 simultaneously using CGI. We know CGI is not scalable. This article
shows how to run both instances in a scalable way. It even tells you how to run eAccelerator in both!
Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.
Honolulu based Blue Cliff, Inc. has been awarded two contracts to install and implement the VistA Electronic Medical Record System. The State of Idaho Department of Health and Welfare (IDHW) awarded a contract for the installation and implementation of Blue Cliff's Open Source VistA (OS VistA) hospital information system at their Orofino, Blackfoot and Boise Idaho locations...
One of the main selling points touted by many Linux-oriented vendors is stability. Once a customer buys a subscription for an "enterprise" Linux or embedded systems product, the vendor will fix bugs in the software but otherwise keep it stable. The value for customers is that they can put these supported distributions into important parts of their operations (or products) secure in the knowledge that their supplier will provide updates which keep the system bug-free and secure without breaking things. This business model predates Linux by many years, but, as the success of certain companies shows, there is still demand for this sort of service.
This is a beautiful puzzle game for Linux with over 210 unique puzzles to solve. Excellent graphics, unique game play and sheer number of levels make this a very enjoyable puzzle game for kids and adults alike.
Get an introduction to swap space, learn how to configure and administer it, capture statistics, and tune your Virtual Memory Manager settings to provide for optimum swap space configuration and performance. Check out the previous 2 articles.
Linux Linux Everywhere. Except where you can see it. There is a lot of discussion in the media about Linux and Microsoft. The recent agreements between Microsoft and various Linux distros came as quite a surprise for some people, as there is a significant difference in the business model and philosophy of open source software versus commercial software. "Microsoft has announced a partnership with Novell and will help promote Linux. This is stunning. This is like Red Sox fans announcing they're going to root for the Yankees."
I wrote once that I wanted to be a tech analyst when I grew up, because no one seems to expect them to get their facts right. That, I reasoned, would make it an easy gig. I could lean back in my chair, put my feet up on the desk, and just make things up. Why research? And people would actually print it as if it were true. And next time they wanted to know something, they would call me up again, even though I called it completely wrong the last time, had huge gaps in my knowledge, got random but truly vital facts utterly wrong, and said the opposite of what is observably true.
Last week we learned how to create and use an encrypted, password-protected hard-drive partition usingcryptsetup-luks. Today we're going to learn how to mount it automatically at boot, how to encrypt a USB stick, and some slick password-management hacks.
« Previous ( 1 ...
) Next »