Home Search
environment - search results
If you're not happy with the results, please do another search
Red Hat Security Advisory 2009:1236-1: Critical: java-1.5.0-ibm security update
Article Source Red Hat Security UpdatesUpdated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras...
Open vs. Closed: the iPhone’s Future or Folly?
Article Source Andy Updegrove's BlogAugust 31, 2009, 9:00 am Steve Jobs is a genius of design and marketing, but his track...
Four More Cool Word Processors
If you've seen one online word processor--or even a handful of them--you haven't seen them all, not by a longshot. In addition to Google...
Atom-based thin clients run Linux
Article Source LinuxDevicesAugust 28, 2009, 9:05 am 10Zig Technology has announced two thin clients compatible with Linux: a RBT-602 model,...
Technology’s Reach and Security’s Grasp
Article Source Andy Updegrove's BlogAugust 28, 2009, 6:39 am Modern society harbors many bad habits. One is its penchant for enthusiastically...
Learn Linux, 101: The Linux command line
GUIs are fine, but to unlock the real power of Linux, there's no substitute for the command line. Get to know some of the...
Celebrating a Decade of Apachecons
As it approaches its 10th anniversary confab in November, the Apache Software Foundation vows to spread awareness of its key role in nurturing the...
A Guide to Linux Programming with PHP
Article Source Bright HubAugust 26, 2009, 12:39 pm This is the first article in a series for programming with PHP...
Secure Virtualization Using SELinux (sVirt)
Article Source Fedora CommunityAugust 26, 2009, 6:22 am Dan Walsh writes:Next week I will be at the Red Hat Summit talking about...
Emulation, or Virtualization: Which is Right for You?
So you need to use Windows applications, but you're not sure what the best method is. If you got through the first article in...