Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
For months, the Globe's ombudsman has been ignoring calls to investigate the story that led to Peter Quinn's resignation. Last night, he finally responded
Two vulnerabilities were identified in PostgreSQL, which could be exploited by malicious users to cause a denial of service or obtain elevated privileges.
The first flaw is due to an error in the "SET ROLE" command when restoring the previous role setting after an error, which could be exploited by malicious authenticated users to gain superuser privileges.
The second issue is due to an error in the "SET SESSION AUTHORIZATION" command when the application has been compiled with Asserts enabled, which could be exploited by malicious users to cause a denial of service.
At today's meeting of the House International Relations Subcommittee on Global Human Rights, Google took the opportunity to explain how "Don't be evil" squares with collaborating with censors, while Cisco, Yahoo, and Microsoft expressed their positions much more clearly than they had hoped. All in all, it was a very good day for the Cult of the Dead Cow and others
hoping to bring sunshine to the dark alley where free-market collaborators make money helping unelected authoritarian regimes control their citizens.
The C type system is often misunderstood or overlooked. This article, the second in a series, discusses the derived types
, or types that are built from other types, and some of the interactions that occur when data of multiple types are mixed. Part 1 introduces the basics of the C type system
, with an overview of what it means to talk about type and a discussion of the basic types in some detail.
New CTO Jeff Jaffe has high hopes for the Linux enterprise desktop as more corporate IT departments bring open source into their environments.
According to the report by Gavin Clark in The Register from the Open Source Business Conference (OSBC) in San Francisco yesterday, Linus Torvalds has "misread" the draft of version 3 of the GNU Public License (GPL).
Though it is increasingly diversified, Oracle's primary business is selling its own proprietary database software. MySQL, in contrast, is a leader among several companies trying to commercialise rival open-source products.
MySQL Chief Executive Marten Mickos confirmed the acquisition attempt in an interview at the Open Source Business Conference in San Francisco but wouldn't provide details such as when the approach was made or how much money Oracle offered.
Olson believes that Oracle, which has grown into an industry powerhouse based on its proprietary technology, is trying to understand the nature of open source communities and build approaches to them into its business models. Olson told a small audience of about 100 during a scheduled, seven-member panel discussion that "Oracle was pretty sophisticated in how they approached us. What impressed me was their deep interest in sustaining the community."
JasperSoft Launches Global Preferred Partner Program, Announces One Million Downloads of JasperReports
TimeSys has added support for another Freescale communications processor to its suite of low-cost embedded Linux developer services. The company's subscription-based LinuxLink service is now available to customers of Freescale's MPC8548E PowerQUICC III communications processor family, the company says.
BURLINGAME, CALIF. - Mårten Mickos may give away his software, but that doesn’t mean his competitors aren’t taking him seriously. His MySQL has raised $39 million in funding, claims to have more than 8 million installations of its database software, and counts Alacatel, Google, and Yahoo! among its customers; they get free software but pay the company for support and maintenance.
Red Hat's new release of its Certificate System will focus on automated logins and U.S. government security criteria. (DesktopLinux)
Red Hat Inc., which launched the "Security in a Networked World" initiative for Linux/open-source security last August, announced plans this week to fortify its enterprise desktop Linux platform. "Security" in this context, however, is about identity management and authentication, rather than the typical Windows concern with viral/worm protection.
Microsoft has made an official response to a European Commission demand that it justify its failure to meet obligations imposed under a 2004 anti-trust ruling. But its response appears to have been something akin to "up yours". The firm not only said in a statement this afternoon that its software documentation was good enough, but that it supplied it in time and that the EC had not even bothered to read it.
Online backup specialist Asigra has upgraded its Televaulting system to support multi-platform protection for Unix, Linux, Windows and Mac systems, and to support Oracle 10g and PostgreSQL 8.0 database servers.
By now, you've probably installed the latest versions of Firefox and Thunderbird. The most recent releases include a lot of new and interesting features, but do they have all the functionality you're looking for? If not, that's where extensions come in. The Mozilla applications have too many extensions to try to write about them all, but I wanted to share some of the extensions that I find most useful for day-to-day browsing and email.
Former Veritas exec Peter Levine takes the reins at the open-source virtualization startup.
Open-source software has to meet all the usual criteria that dictate software success...and then it has to meet some more.
[The only purpose of posting this article is to show how OSS is making news in the major media. -tadelste]
Oracle's predicted buying spree of open source companies kicked off yesterday with the purchase of embedded database open source company Sleepycat. It's rumoured that Zend and JBoss are also on Oracle's shopping list.
Red Hat, Inc.(NASDAQ:RHAT), the world's leading provider of open source solutions to the enterprise, today announced achievements and plans that the company is making to further fortify the Red Hat Enterprise Linux platform. Red Hat launched the 'Security in a Networked World' initiative for Linux and open source security in August 2005. Since then Red Hat has been working to increase platform-level security, provide increased security for all applications on the Red Hat platform, and achieve the highest levels of security certifications in the industry.
"End-user security, applications and data remain the core focus of the Red Hat Security in Networked World initiative. With the continued expansion of Red Hat Enterprise Linux powering both server and desktop solutions for customers, protecting all aspects of system resources remains a top priority," said Paul Cormier, executive vice president of engineering at Red Hat.
« Previous ( 1 ...
) Next »