What are the programs you can't live without on your system? Tipmonkies has a quick rundown on some applications, and welcomes input from others as to their list.
Random numbers are utilized in many different areas, ranging from cryptography (in general) to source port and process ID randomization in some operating systems. So what is exactly a random number generator?
There are many 'really alternative' operating systems currently in existence. Most of them are purely for research, personal enjoyment or as a coding sandbox. Some of them, however, want to achieve wider acceptance. Is that goal obtainable, in the current OS climate?
The Firefox browser has been ported to the new Intel-based Mac OS X platform with the assistance of Apple. Firefox developer and Mozilla Foundation employee Josh Aas said the Mozilla team built on Apple's preliminary development work in bringing the browser across to the platform, which is scheduled for rollout to consumers by mid-next year.
The variety of open source offerings - from application servers and databases to security and content management - illustrate the community's commitment to meet business needs. We're ready to take the next step. But, first, there are a few things we'd like to see from you, the open source community, before free software takes on a higher profile in big IT departments.
NeoWin reports that Longhorn Beta 1, after missing the internal date of June 30th, now is scheduled to be released late July. Most Longhorn product groups have already delivered their beta 1 code.
RPM maintainer Jeff Johnson publilshed a reply to Claudio Matsuoka's Top 10 Problems in RPM article, adding more interesting points to the discussion. If you value politeness, skip this discussion.
While none of this appears to be revolutionary now, the fact remains that Lycoris was the first to perfect the "desktop Linux" formula. Mandrakesoft, SUSE, Caldera and even please-use-windows Red Hat helped Linux greatly on its journey toward the consumer desktop, but it was Lycoris who perfected the formula for the first time."
Web services standards and the emergence of service-oriented architectures are showing us the direction the Internet needs to move in, according to the Microsoft chairman.
GUIdebook has an interesting set of screenshots and information about Photoshop. It lists screenshots of various windows and dialogs of all the versions released in the past, for Mac and Windows. Definitely worth a look.
Protecting against laptop and data theft would appear to be relatively easy, but, in a business sense, is rarely so. This article provides some basic steps for employees to follow in order to protect laptops.
Why waste your time figuring out an algorithm for storing things in a file? And why spend time debugging the code? Let the Boost library do it for you. Saving your data to your own custom-made file formats is easy with the help of the Boost serialization templates. Jeff Cogswell shows you how to save the data and read it back in with ease.
There are myriad ways that a network can be compromised, and an administrator needs to be aware of them all (and anticipate new ways coming around the corner). This chapter will not to show how to attack something, but show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
More on the University of Texas grid project's mission to integrate numerous, diverse resources into a comprehensive campus cyber-infrastructure for research and education. This article examines the idea of harvesting unused cycles from compute resources to provide this aggregate power for compute-intensive work.
With all of the attention on dual core processors lately, it has been real easy to overlook the one application that might benefit more from multiple cores than any other; Linux. OK, so technically Linux isn't an application, but the kernel has supported SMP for nine years almost to the date. But does any of this translate to great desktop performance for dual core processors?
The Pegasos I G3 to Pegasos II G4 Upgrade Program is now active. Original purchasers of Pegasos I motherboards can now trade-in for the Pegasos II with G4 processor for a low price of €200 - or opt to keep their original system for €300.