Home Search

red hat - search results

If you're not happy with the results, please do another search

Linux Test Project November Release Announcement

Marty Ridgeway writes "LTP-20041105 changelog below- Added extensive syscall testsuite (Ballista)- Added new tests to EPoll testsuite- Applied long path name patch from Michael...

Getting the most from OpenOffice.org Writer fields

Author: Jean Hollis Weber Fields are extremely useful features of Writer. This article describes how to use fields to solve common business and technical writing...

Create a data dashboard with PHP and a browser

Author: Rob Reilly How many times have you needed a quick and dirty method of displaying data, in a "dashboard" format, that everybody could easily...

CLI Magic: A OneFinger salute

Author: Joe Barr Put down your coffee cups before reading this. CLI Magic this week is about a GUI program. Hey, I know...

Gelato Pushes Itanium from Beijing to Pittsburgh

Laurie Talkington writes "From Beijing to Pittsburgh: Gelato Champions Itanium. Representatives from more than 25 Gelato Federation member institutions and corporations met on October 11-13,...

Linux in Government: Stanislaus County Does Linux

If you call the Stanislaus County administrative offices and ask for Richard Robinson, be sure to specify that you want to speak with the...

Midgard 1.6.1 “Sverix” released

Piotr Pokora writes "Lodz, November 5th 2004 -- The Midgard Project has released stable release version 1.6.1 of the Midgard Open Source Content Management Framework....

Perl 6 Grammars and Regular Expressions

Anonymous Reader writes "Perl 6 is finally coming within reach. This article gives you a tour of the grammars and regular expressions of the...

Linux spread continues in the Caribbean

Author: Robin 'Roblimo' Miller The Netherlands Antilles is a group of five-and-a-half islands that are self-governing even though they are still part of the Kingdom...

Microsoft denies spoofing is a security flaw

Microsoft is rejecting claims from security researchers that a recently discovered spoofing technique on Internet Explorer is a vulnerability in its product. Link: news.zdnet.co.uk Category: Security