Home Blog Page 9490

WhiteCross moves data reporting and analysis to Linux

Author: JT Smith

From PR Newswire: WhiteCross
Systems, a leading service provider of reporting and analytical solutions,
today announced its move to Linux as its Operating System (OS), replacing
LynxOS. Now WhiteCross is able to see the OS source code and potentially
modify it to enhance performance when and where required.
There are a vast number of people carrying out development applications
for Linux, so WhiteCross benefits in receiving excellent support, minimal cost
and quality development openly available. The Linux platform also supports
more RAM per rack so that WhiteCross can provide more capacity for new and
existing customer’s data analysis.

Linux’s losing desktop war

Author: JT Smith

From an eWeek column: “Any time someone criticizes open source or Linux or makes comments that can be
interpreted as criticism, that person is setting himself or herself up as a target for an attack.

It’s good that the
open-source community is
so impassioned by its
craft; Linux, Apache and
other products never
would have succeeded
without that zeal. But the
time has come to focus
and direct that passion, or
more open-source
companies will suffer the
same fate as Eazel, the
GUI developer that closed
its doors this month.”

Category:

  • Linux

Java Community Process 2.0 program reports results

Author: JT Smith

From PR Newswire: The Program Management Office
(PMO) of the Java Community Process program today issued its first year
Java Community Process 2.0 report. The report affirms the success of JCP 2.0,
the current version of the Java Community Process program, its steady
evolution as a community process and strong results in delivering content-rich
Java technology specifications at web speed.
The Java Community Process program, the open, community-based process for
the development of Java technology specifications, reference
implementations and associated technology compatibility kits, successfully
transitioned last year to Java Community Process 2.0.

Java Community Process 2.0 program reports results

Author: JT Smith

From PR Newswire: The Program Management Office
(PMO) of the Java Community Process program today issued its first year
Java Community Process 2.0 report. The report affirms the success of JCP 2.0,
the current version of the Java Community Process program, its steady
evolution as a community process and strong results in delivering content-rich
Java(TM) technology specifications at web speed.
The Java Community Process program, the open, community-based process for
the development of Java technology specifications, reference
implementations and associated technology compatibility kits, successfully
transitioned last year to Java Community Process 2.0.

People of KDE: George Staikos

Author: JT Smith

KDE.org has another interview in its line of features on the “people of KDE.” Featured today is George Staikos, a Canadian student who does “a lot of cryptography work” in KDE.

Category:

  • Open Source

‘Hacker’ helps Excite@Home toughen defenses

Author: JT Smith

CNET: “The company shored up its online defenses after a hacker pointed out a vulnerability in April that
allowed access to the company’s internal network and exposed nearly 3 million support records to
the public.

The company praised the hacker–known by the alias “Adrien Lamo”–for coming forward after
he poked around their network. Despite the open-source movement underscoring the historic definition of hackers as curious–if
unconventional–researchers, companies have been frequently leery of associating with anyone
who considers themselves one.”

Category:

  • Linux

Amazon.com’s free music downloads take off

Author: JT Smith

PCWorld: “While the debate rages about the best models for music and e-book sales, Amazon is forging ahead with its
hybrid approach: free music, and books and software for a fee. Jeff Blackburn, head of Amazon’s digital
division, brushes aside any discussion of whether and how music customers will pay for downloads as
largely irrelevant to the task he faces. In his quest to build the ultimate digital mall, he’s ready to use any
platform–whether Adobe’s e-book format or Microsoft’s, for example–and business model that will work.
“We have a pretty pragmatic view of it,” he says.”

IPv6 and 3G: A dying dynasty

Author: JT Smith

Kelly McNeill of OSOpinion writes: “There was once a time when people dreamed of always-on IP services on their mobile phones and streaming video direct to their palmtops. But alas, reality bites and the glorious services that have been hyped by such companies as Hewlett-Packard and Vodafone seem likely never to appear. And with 3G, it may be the last chance for IPv6 to gain a foot in the door of the Internet..”

CBS says: Get ready for mo’ better Microsoft; we say, mo’ o’ the same

Author: JT Smith

CBSMarketwatch: “Office sales could provide a significant boost to Microsoft’s revenue when combined
with the new software licensing rules Microsoft is foisting on customers. Starting October 1, the world’s largest software
maker will end the practice of selling software upgrades to business customers — the least expensive and most popular way
companies buy Microsoft software.

Instead, Microsoft is offering either a subscription to its software, or a pricing scheme the company calls “software
assurance”, in which customers must buy a three-year license to all the official software changes the company makes to one of
its software brands.”

Securing & Optimizing Linux: The Ultimate Solution

Author: JT Smith

Ted Nackad writes: “

OpenNA, Inc. (www.openna.com), announced
today the availability of “Securing & Optimizing Linux: The Ultimate Solution“,
the latest version and the successor to “Securing and Optimizing
Linux: Red Hat Edition
“.

The latest release includes the new 2.4 kernel with IPTABLES NetFilter, Sendmail,
Qmail, IMAP, PostgreSQL, MySQL, OpenLDAP, Apache, with SSL support and many
more topics like chroot jail environment for the majority of all important services
under Linux OS. The new edition takes into account the feedback we received
on the original book and is a complete rewrite from scratch.

Mastering security with Linux and getting the maximum out of your system have
never been easier. The latest edition of this popular book about Linux security
and optimization has been written and achieved with tightening security to an
incomparable level in mind. One of its main features is the easy path from beginning
to end in a smooth manner, step by step for beginners as well as for experts.

Many web sites are open to all sorts of “Web Hacking”. According to the Computer
Security Institute and the FBI’s joint survey, 90% of 643 computer security
practitioners from government agencies, private corporations, and universities
detected cyber attacks last year. Over $265,589,940 in financial losses
was reported by 273 organizations.

Cracking cost dearly besides being aggravating and frustrating. Sharing hands
on experience and the know how of years of research and study will make developers,
managers, and system administrators sleep better.

For all who read the introductory book, this is the thesis for success.