Home Search
red hat - search results
If you're not happy with the results, please do another search
Firefox sound alternative to Internet Explorer
NEW YORK - Web surfing has belonged almost exclusively to Microsoft Corp.'s Internet Explorer ever since it buried Netscape's pioneering browser.
That doesn't seem to...
Java and open source
Author: Mark Stone
Recent debates about open sourcing Java overlook the unique character of programming languages: the open source code that is written in a...
Linux Advisory Watch – November 12, 2004
Author: Preston St. Pierre
This week, advisories were released for xpdf, libtiff3, sasl, shadow, ruby,
freeam, gzip, libgd1, gnats, libgd2, Gallery, ImageMagick, zgv,...
OSR responds to Independent about iPod Licensing
Kelly McNeill writes "Earlier this week, website news source "The Independent" published an insightful editorial that effectivly answered the critics that suggested that Apple...
The myth of stability
Author: Jem Matzan
Many computer cognoscenti scoff at new software and hardware because it's "not stable yet" or because "the bugs have not been worked...
VA Linux Announces Expansion of Kernel Business
Shuji Sado writes "Aggressive Hiring of Skilled Linux Kernel Engineers and Unique
Failure / Performance Analysis Services for Enterprise Systems Will
Assure the Sustainable Growth of...
Absoft Announces new Cluster Builder’s Kit version
Devin Ash writes "Included with Cluster Licenses for Absoft Fortran Compilers. Supercomputing 2004, Pittsburgh, PA (November 9, 2004) – Absoft Corporation has announced a...
Review of ‘Moving to the Linux Business Desktop’
TBR writes "Following on from the success of Moving To Linux, author Marcel Gagné comes back with a new title in similar vein. Whereas...
Build your own search engine with ht://Dig
Author: Johnathon Williams
Most Linux users know how easily they can run a Web server on their favorite distros. Unfortunately, serving pages is one thing...
Crackers and honey: An irresistible combination for network security
Author: Mayank Sharma
Denial of service (DoS) attacks aim to take down Web servers and other Internet resources, often by swarming them with repeated requests,...