Home Blog Page 9184

IBM ditches AMD in North America

Author: JT Smith

ZDNet News: “IBM has quietly discontinued using Advanced Micro Devices’ chips in PCs sold in North
America, as the battle for market share between AMD and Intel intensifies.

Big Blue continues to use AMD chips in computers sold in Asia, but an IBM spokesman
confirmed Monday that the company has dropped AMD’s Athlon and Duron chips from its
desktop lineup for the United States and Canada. Athlon-based PCs in Europe are also going by
the wayside.”

Category:

  • Unix

Intel looks to Summit to bring chips to new heights

Author: JT Smith

eWEEK: “Intel Corp. will use IBM server technology as one
of the validation platforms to test its upcoming Intel Xeon MP
processor and its next-generation processors, currently code-named
McKinley.

Intel is testing its 32- and 64-bit processors using IBM’s Summit
chip-set technology, its high-end interconnect technology
developed for mainframes and supercomputers, which would result in
far greater SMP (symmetric multiprocessing) performance and
scalability, Bill Zeitler, senior vice president of IBM’s server group,
told delegates at the company’s Solutions technical developers
conference here Wednesday.”

Category:

  • Unix

NeuLevel sues Amazon over .biz lottery

Author: JT Smith

Reuters: “NeuLevel, which plans to make Internet addresses like www.show.biz operational by October 1,
filed a motion last Thursday in an Alexandria, Virginia, federal court asking the court to declare
that it does not run afoul of federal trademark laws or state laws that ban many kinds of lotteries.

The Sterling, Virginia, company filed the complaint against Internet retailer Amazon.com which,
according to NeuLevel, has threatened to sue if NeuLevel does not change its registration
methods.”

Hacker tools and their signatures, part three: Rootkits

Author: JT Smith

From SecurityFocus: “This is the third installment of a series devoted to examining hacker tools and their signatures. In this installment we will be looking at some of the
signatures related to the KOH rootkit. The purpose of this paper is to assist the reader in detecting the KOH rootkit. Through this process, it is hoped
that the reader will also learn steps to take to defend against the installation of these types of rootkits.”

Category:

  • Linux

STM opts for embedded Linux software

Author: JT Smith

Posted at TUXIA: “TUXIA, a developer of embedded Linux software for information appliances and thin clients, and
STMicroelectronics, a developer of semiconductor integrated circuits and discrete devices for microelectronic applications, today announced that
STMicroelectronics has chosen TUXIA’s embedded Linux software line, TASTE (TUXIA Appliance Synthesis Technology), to provide an application
framework and operating system for STMicroelectronics’ Web terminal and thin client terminal reference designs based on its STPC® family of x86
PC-compatible System-on-Chip (SoC) microprocessors. STMicroelectronics selection of TASTE for its STPC-based Web terminals and thin clients
strengthens a long-standing partnership that is enabling a new generation of information appliances with the smallest, fastest and most stable
embedded Linux platform.”

Code Red II hits Hong Kong government

Author: JT Smith

A government bureau in Hong Kong is the lastest victim of the Code Red II worm. CNN reports that 17 intranet servers in the Hong Kong Information Services Technology Department have been infected with the Code Red II worm, and remain offline. The government’s public Internet services were not affected.

Category:

  • Linux

Quakecon epilogue

Author: JT Smith

Linux Games’ Dustin Reyes wraps up the events and activities that took place at Quakecon over the weekend. Major news includes word of four new titles from Id: Return to Castle Wolfenstein, a DOOM sequel, an as-yet-to-be-named multiplayer game, and of course, Quake 4; John Carmack clears up an issue or two.

Why we should hail IBM’s ode to Open Source

Author: JT Smith

Commentary from ZDNet: “Just as IBM launched the PC industry by embracing
openness 20 years ago, I wonder whether Big Blue will
go into the history books as playing a similarly significant
role today by taking a similar stance.

It has, after all, been unequivocal in its love for
open-source Linux, to the point of devoting $1 billion to
the technology.”

GX Technology’s acquires its third oil & gas-sniffing Linux cluster

Author: JT Smith

Posted to PR Newswire: “Linux NetworX, a provider of
powerful and easy-to-manage cluster computing solutions, announced today that
seismic imaging solutions company GX Technology has purchased an 84-processor
Evolocity(TM) computer cluster to be used in its oil and gas exploration
efforts. This is the third cluster computer system provided to GX Technology
by Linux NetworX.”

Snort 1.8.1 now available

Author: JT Smith

An anonymous reader pointed us in the direction of the latest release of Snort, the Open Source Network Intrusion Detection System: “This latest release includes SNMP alerting support, greatly improved stability, IDMEF XML alert
support, new decoder for “%u encoded” HTTP traffic, limited wildcards/regex in the rules
language, plus a new snort.org page.”
Read the announcement at LinuxSecurity.com

Category:

  • Linux