Home Search

environment - search results

If you're not happy with the results, please do another search

Red Hat Security Advisory 2009:1236-1: Critical: java-1.5.0-ibm security update

Article Source Red Hat Security UpdatesUpdated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras...

Open vs. Closed: the iPhone’s Future or Folly?

Article Source Andy Updegrove's BlogAugust 31, 2009, 9:00 am Steve Jobs is a genius of design and marketing, but his track...

Four More Cool Word Processors

If you've seen one online word processor--or even a handful of them--you haven't seen them all, not by a longshot. In addition to Google...

Atom-based thin clients run Linux

Article Source LinuxDevicesAugust 28, 2009, 9:05 am 10Zig Technology has announced two thin clients compatible with Linux: a RBT-602 model,...

Technology’s Reach and Security’s Grasp

Article Source Andy Updegrove's BlogAugust 28, 2009, 6:39 am Modern society harbors many bad habits. One is its penchant for enthusiastically...

Learn Linux, 101: The Linux command line

GUIs are fine, but to unlock the real power of Linux, there's no substitute for the command line. Get to know some of the...

Celebrating a Decade of Apachecons

As it approaches its 10th anniversary confab in November, the Apache Software Foundation vows to spread awareness of its key role in nurturing the...

A Guide to Linux Programming with PHP

Article Source Bright HubAugust 26, 2009, 12:39 pm This is the first article in a series for programming with PHP...

Secure Virtualization Using SELinux (sVirt)

Article Source Fedora CommunityAugust 26, 2009, 6:22 am Dan Walsh writes:Next week I will be at the Red Hat Summit talking about...

Emulation, or Virtualization: Which is Right for You?

So you need to use Windows applications, but you're not sure what the best method is. If you got through the first article in...