Home Search
unix - search results
If you're not happy with the results, please do another search
New Hardware Disk Mirroring Device for SATA Drives
Data Protection Solutions by Arco writes "Data Protection Solutions Now Shipping EzRAID Continuous Backup RAID 1(Disk Mirroring) Device For SATA DrivesThe new EzRaid Dual...
Scratching that itch: Sander Jansen
Author: Joe Barr
By day, 27-year-old Sander Jansen -- originally from Holland -- works for ESI Group in Alabama, a company that produces sophisticated software...
Win4Lin announces virtual desktop server product
Sharon Smith writes "New Product Provides ability to consolidate and serve multiple Windows Desktops from Linux Servers merging the best of Virtual Desktop and...
OpenSolaris one year on: Success or failure?
In June 2005, Sun Microsystems released core elements of its flagship Solaris operating system as open source software, making public more than five million...
Creating virtual private networks with tsocks and VTun
Author: Marc Abramowitz
Virtual private networks (VPN) let remote users connect back to corporate networks over encrypted links. Many VPNs are built with proprietary technology...
froglogic Releases Qt/GUI/Web Test Tool Squish 3.0
Reginald Stadlbauer writes "Hamburg, Germany - 2006-06-12 froglogic GmbH today announced the
availability of Squish 3.0.
Squish is the leading GUI test tool for Qt-based applications
making...
Building a heterogeneous home network for Linux and Mac OS X
Author: Kris Shaffer
You can find plenty of information online about building heterogeneous networks involving Windows, but relatively little about connecting Macs with Linux PCs...
Go beyond what the desktop normally does with Tcl
Anonymous Reader writes "Most computer users interact with their workstations primarily through some form of graphical user interface (GUI). In the world of Microsoft...
Using Debconf to configure a system
Author: Bruce Byfield
DebConf is best known as an annual gathering of Debian developers. But the Debian project likes the name so much that it...
Can the malware industry be trusted?
Author: Joe Barr
Commentary: Internet security is big business. Microsoft Windows and Office vulnerabilities have made major contributions to making it -- and keeping...