Home Search
red hat - search results
If you're not happy with the results, please do another search
Linux Test Project November Release Announcement
Marty Ridgeway writes "LTP-20041105 changelog below- Added extensive syscall testsuite (Ballista)- Added new tests to EPoll testsuite- Applied long path name patch from Michael...
Getting the most from OpenOffice.org Writer fields
Author: Jean Hollis Weber
Fields are extremely useful features of Writer. This article describes how to use fields to solve common business and technical writing...
Create a data dashboard with PHP and a browser
Author: Rob Reilly
How many times have you needed a quick and dirty method of displaying data, in a "dashboard" format, that everybody could easily...
CLI Magic: A OneFinger salute
Author: Joe Barr
Put down your coffee cups before reading this. CLI Magic this week is about a GUI program. Hey, I know...
Gelato Pushes Itanium from Beijing to Pittsburgh
Laurie Talkington writes "From Beijing to Pittsburgh: Gelato Champions Itanium.
Representatives from more than 25 Gelato Federation member institutions and corporations met on October 11-13,...
Linux in Government: Stanislaus County Does Linux
If you call the Stanislaus County administrative offices and ask for Richard Robinson, be sure to specify that you want to speak with the...
Midgard 1.6.1 “Sverix” released
Piotr Pokora writes "Lodz, November 5th 2004 -- The Midgard Project has released stable release
version 1.6.1 of the Midgard Open Source Content Management Framework....
Perl 6 Grammars and Regular Expressions
Anonymous Reader writes "Perl 6 is finally coming within reach. This article gives you a tour of the grammars and regular expressions of the...
Linux spread continues in the Caribbean
Author: Robin 'Roblimo' Miller
The Netherlands Antilles is a group of five-and-a-half islands that are self-governing even though they are still part of the Kingdom...
Microsoft denies spoofing is a security flaw
Microsoft is rejecting claims from security researchers that a recently discovered spoofing technique on Internet Explorer is a vulnerability in its product.
Link: news.zdnet.co.uk
Category:
Security