Home Search
red hat - search results
If you're not happy with the results, please do another search
From database to 3D, a new vision thing
"BOSTON--Researchers at Boston University are out to prove that a picture is worth a thousand databases.... The university's Scientific Computing and Visualization Group...
Mandrake Linux Community Newsletter – Issue #43
This Week's Summary: StarOffice 6.0 Officially Released; Spotlight on
MandrakeExpert; MandrakeClub Activities; Website of the Week
(plf.zarb.org); Online Survey; Ximian GNOME for Mandrake 8.2;...
Telecenters bring Free Software to the whole world
- by Tina Gasperson -In cities around the United States, there are Kinko's outlets. Patrons can make phone calls,
send and receive faxes, duplicate important...
Pogo Linux Verona workstation review
From PC World:
"Packed in a better-looking case than its beige-box Altura sibling, the Pogo Linux Verona Workstation houses a 2.2-GHz Pentium 4 CPU inside
...
Weighing the pros and cons of IBM’s mainframe Linux, Part 3
It's at LinuxWorld.com: "When I was first asked about Linux on the mainframe, I discovered that I'd never really thought about it at all,...
GNU/Linux and Free Software business demo at CUNY
NYLXS in co-operation with the City University of New York
is presenting the first GNU/Linux Free Software Business Expo at
365 Fifth Avenue New York,...
Sherwin-Williams chooses a Big Blue shade of Linux
Sherwin-Williams (NYSE: SHW) today
announced it has chosen IBM to provide the store technology infrastructure
for the company's more than 2,500 stores in the U.S., Canada...
Dual-booting Linux and Windows XP HOWTO
Author: Benjamin D. Thomas
"This HOW-TO specifically details how to create a dual boot system using Redhat Linux 7.2 and Windows XP with a NTFS...
How Linux will revolutionize the embedded market
LinuxDevices.com: "If Linux is truly going to revolutionize the embedded systems market, it's going to do so on its own terms, and the embedded...
SuSE Linux Advisory: dhcp/dhcp server
SuSE: "A remote exploitable format string vulnerability was found in the logging routines of the dynamic DNS code of dhcpd. This vulnerability allows an...