Home Search

red hat - search results

If you're not happy with the results, please do another search

Firefox sound alternative to Internet Explorer

NEW YORK - Web surfing has belonged almost exclusively to Microsoft Corp.'s Internet Explorer ever since it buried Netscape's pioneering browser. That doesn't seem to...

Java and open source

Author: Mark Stone Recent debates about open sourcing Java overlook the unique character of programming languages: the open source code that is written in a...

Linux Advisory Watch – November 12, 2004

Author: Preston St. Pierre This week, advisories were released for xpdf, libtiff3, sasl, shadow, ruby, freeam, gzip, libgd1, gnats, libgd2, Gallery, ImageMagick, zgv,...

OSR responds to Independent about iPod Licensing

Kelly McNeill writes "Earlier this week, website news source "The Independent" published an insightful editorial that effectivly answered the critics that suggested that Apple...

The myth of stability

Author: Jem Matzan Many computer cognoscenti scoff at new software and hardware because it's "not stable yet" or because "the bugs have not been worked...

VA Linux Announces Expansion of Kernel Business

Shuji Sado writes "Aggressive Hiring of Skilled Linux Kernel Engineers and Unique Failure / Performance Analysis Services for Enterprise Systems Will Assure the Sustainable Growth of...

Absoft Announces new Cluster Builder’s Kit version

Devin Ash writes "Included with Cluster Licenses for Absoft Fortran Compilers. Supercomputing 2004, Pittsburgh, PA (November 9, 2004) – Absoft Corporation has announced a...

Review of ‘Moving to the Linux Business Desktop’

TBR writes "Following on from the success of Moving To Linux, author Marcel Gagné comes back with a new title in similar vein. Whereas...

Build your own search engine with ht://Dig

Author: Johnathon Williams Most Linux users know how easily they can run a Web server on their favorite distros. Unfortunately, serving pages is one thing...

Crackers and honey: An irresistible combination for network security

Author: Mayank Sharma Denial of service (DoS) attacks aim to take down Web servers and other Internet resources, often by swarming them with repeated requests,...