Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
For the first ten years of its life, free software was largely a hacker's tool. All the early programs – Emacs, GCC, Perl, Linux – were written by coders for coders (usually themselves). It was the rapid uptake of the Internet by business in the mid-1990s that led to free software being used by companies, not just their employees.
[LXer presents this access to LWN's normally subscriber-only content in full cooperation with Jonathan Corbet, Executive editor, LWN.net. LXer hopes you enjoy this free peek at LWN's excellent community magazine and thanks Mr. Corbet for his cooperation.]
Sun Microsystems will release sample code next month giving Solaris 10 its first injection of virtualization on Intel and AMD hardware, finally expected in 2007.
With the National Security Agency (NSA) monitoring our phone calls, now might be a good time to think seriously about the security of our email as well. In particular, you might want to think about encrypting your email, and about whether it's safe in the hands of third-party providers like Yahoo!, Google, and Microsoft.
If you can persuade Windows-using friends and family to use encryption, Lucas recommends Mozilla Thunderbird as a replacement for Outlook and Outlook Express, saying that Microsoft "doesn't provide clear and open access to APIs you need to write a solid plugin [for encryption] ... not to mention that the people I help with their computers, once I hook them up with Thunderbird, they stop calling me [for support]."
The open nature and yes, the hype around Linux has made lots of mobile-oriented companies to consider using Linux for their next-generation cellphones. But there is a major problem on the way to success, a problem which is created not by Linux itself, but by the greed and close-mindness of these same companies that endorse Linux.
On June 28, Magistrate Judge Brooke Wells ruled largely in favor of IBM's "Motion to Limit The SCO Group Inc.'s Claims Relating to Allegedly Misused Material." This means that the vast majority of SCO's claims against IBM for misusing Unix code in Linux have been thrown out.
ATLANTA – (NASDAQ:VRSO) Verso Technologies has said that the company and IBM have executed a strategic teaming agreement to offer the Verso MetroNet VoIP Overlay solution on the IBM® eServer™ BladeCenter platform. The joint offering creates a Linux-based VoIP solution running on the IBM eServer BladeCenter and will be globally positioned and marketed by both companies.
For its central source code management KDE last year migrated from the venerable "Concurrent Versioning System" (CVS) to the newer, more powerful Subversion (SVN) software. [....] Now the next big change is happening: KDE is leaving the aging "autotool" build chain behind. [....] KDE 4 will feature a completely different build system: CMake.
In typical KDE fashion the current move to CMake was not a "decision by committee". Instead, the old rule "who codes, decides" made itself felt once again. Let's look back at the history of this change.
A small Sri Lankan firm of open-source developers says it's time to bring a fresh set of concepts and standards to the notion of an application server.
The X10 protocol is a fairly primitive tool for transmitting data over power lines that allows you to turn things on and off remotely. In this article, Peter Seebach shows how to extend the software capabilities, setup a dynamic web interface and how to use cron for scheduling tasks. All this can be done easily
with off-the-shelf hardware and a couple of hundred lines of simple code.
Do you like Ubuntu? Do you like KDE? Would you like to have them both in one distribution, but with more than Kubuntu can give you? If that's you, then SimplyMEPIS 6.2 is your operating system.
SAN FRANCISCO — Altium Ltd. Thursday (June 29) announced the release of a new Tasking VX-toolset for the Nios II family of embedded processors from programmable logic supplier Altera Corp.
An in depth article on how to secure your Linux web server. Who says that security is ever "easy"? It's a must-have for anybody running a web server - even if it's at home.
slashdot story:'"Remember how the VA was pinning the theft of 26.5 million veterans' personal records on a hard working-but-renegade employee whose laptop was stolen? Surprise! It turns out that the employee had written permission to bring the sensitive data home. Fortunately, the laptop has been recovered. It is still unclear how the laptop was recovered, or if any of the veterans' personal data was leaked."'
The best quote I heard on this was that databases are becoming like plutonium, very concentrated and potentially very powerful.
An IBM-led group of 10 data storage vendors initiated an open-source project on the Eclipse Foundation community Web site June 28 to build a new API for developing software that manages storage devices and the networks in which they reside.
SAN JOSE, Calif. -- He's bent the ear of world leaders on social causes. He's a Nobel Peace Prize nominee. He's a rock star. But could the lead singer of U2 also become a front man for a grass-roots campaign seeking to change how the music industry does business? The Free Software Foundation hopes so.
Today we're going to configure our Internet router/gateway to give priority to Asterisk traffic. This how-to is for admins who have nice sturdy Linux-based Internet gateways. If you're using a commercial router with its own operating system, like Cisco, you'll have to learn the traffic-shaping incantations peculiar to it.
Theodore Ts'o offered an insightful summary of issues affecting future development on theext3 filesystem, "it is clear that many people feel they have a stake in the future development plans of the ext2/ext3 filesystem, as it [is] one of the most popular and commonly used filesystems, particular amongst the kernel development community. For this reason, the stakes are higher than it would be for other filesystems." He listed the three main concerns for future development as stability, compatibility confusion, and code complexity, "unfortunately, these various concerns were sometimes mixed together in the discussion two months ago, and so it was hard to make progress. Linus's concern seems to have been primarily the first point, with perhaps a minor consideration of the 3rd. Others dwelled very heavily on the second point."
Red Hat's acquisition of JBoss is now worth about $35 million less than it was when first announced on April 10.
You probably already know that a firewall is an essential component in your network border security. But you may not know that a Linux-based iptables firewall is especially robust and configurable. Today we'll set up system administration using Webmin, and in our next installment we'll create a good stout Internet-connection sharing firewall.
« Previous ( 1 ...
) Next »