Home Search

element os - search results

If you're not happy with the results, please do another search

Securing Web services: Foundations and specifications

Author: Jeffrey L. Vagle Web services, by definition, are particularly vulnerable to breaches in security. The flow of potentially sensitive data not only between machines, but...

Report from KDE World Summit, Day 7: The keyboards remained quite busy

Author: Tom Chance Day seven of aKademy here in Ludwigsburg (Stuttgart region), Germany, saw KDE developers finally tackle the tricky question of release schedules and...

Report from the KDE World Summit: Day six

Author: Tom Chance Wednesday at aKademy provided KDE hackers with their first day without a special focus. The KDE PIM (Personal Information Management) developers had...

XML-based documentation using AurigaDoc

Author: Scott Nesbitt One XML's many uses is creating documentation. XML is incredibly well suited to producing output in multiple formats -- everything from HTML...

Report from the KDE World Summit: Day two

Author: Tom Chance The second day of aKademy, KDE's World Summit 2004, opened the two-day developers' conference, involving a series of presentations and discussions both...

STP 3.0 opens testing to apps and eases interface, multiple system control is next

Author: Jay Lyman The Open Source Development Labs announced this week its major upgrade to version 3.0 of the Scalable Test Platform (STP) testing suite,...

Why India is struggling with localized language computing

Author: Mayank Sharma While IT is improving the quality of life in many developed nations, the use of technology is still out of reach for...

SysAdmin to SysAdmin: Making use of SNMP

Author: Brian Jones "Simple Network Management Protocol" is a relative term. To the uninitiated, raw SNMP output, along with arcane technobabble like "MIB" and "ASN.1," looks...

Securing Web services: PKI basics

Author: Jeffrey L. Vagle Developers of Web services and enterprise applications must make their software secure. While cryptography alone does not a secure system...

The Linux GUI: Of mice and menus

Author: Joe Bolin Last week I introduced some of the basic elements of the Linux desktop. Now you need to learn how to navigate and use it...