When it comes to Apple Computer's new Mac Mini, beauty is in the eye of the person holding the wallet, says C|Net. My Take: I updated my blog with an... unrealistic hope for an even cheaper Mac Mini.
This week, Microsoft will release its first upgrade to its .NET Compact Framework, bringing mobile developers more performance, more UI support and a raft of new access technologies to make it easier for devs to integrate mobile devices with a wide array of XML, SQL and COM resources on legacy apps and databases.
A recent AMI-Partners Inc. report which stated "user challenges and a dearth of applications continue to hinder the growth of Linux servers and on the desktop" prompted one Novell executive to counter that point-of-view. Read more here.
"As an entrepreneur many times over, he hopes he's really getting it right this time." So states half of Mitch Kapor's terse biography on the Open Source Applications Foundation staff page. Read the interview here.
Although IBM's open-source support is no money-maker, it does serve as a deft weapon to undermine Microsoft's markets. Bob Sutor is the VP of IBM Standards. Go here to see his other comments and his extensive list of links to articles on the subject from all the major developer and business publications.
A Practical Guide to Basic Security in Linux Production Environments - This article is a practical step-by-step guide for securing Linux production systems. It shows how to meet basic security requirements for Linux systems that need to pass security audits. This guide also discusses some Linux security steps that cannot be found in any book at the time of this writing. If you have been assigned to come up with a corporate Linux Security Standard, then you should definitely read on.
A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned.
Blue screen, registry error, blank screen... ack! Somebody tell me: how I can retrieve my data? How do I get my system running again? THG shows you which tools to use, and how to use them to get everything running again - without data loss or the dreaded reinstall.
Part 1 of 3 articles focusing on taking a stock Ubuntu installation and turning it into a visually pleasing and overall functional desktop. This first part focuses on the installation followed by some critical system updates and the first tweaks to the visual appearance of Ubunutu's Warty Warthog distribution. Start reading this article here.
Great news for Apple, big profit and more than 1 million Macs were sold this quarter, something that didn't happen for years! With the Mac Mini introduction yesterday, the next quarter seems even more favorable for a bigger number on CPU sales.
I have been keeping a log of my Linux experiences since August of 2002. At first, I set it up as a textbase of tips. Using the wonderful program Tuxcards, I maintained a diary.
In mid-2004, reports surfaced that Microsoft would soon ship an entry-level version of Windows XP, dubbed Windows XP Starter Edition, to customers in emerging markets such as Thailand, Malaysia, Indonesia, Russia and India. Those markets, Microsoft said, needed locale-specific PCs that were easy to use, support, and sell. Read the review here.
The latest issue of The GNOME Journal has just been published. This second issue covers some technical articles, including CD/DVD creation, connecting to remote resources, and how to get help from the GNOME community. Also, will GNOME pass the Liberal Arts major test? Developer topic s are also covered, as Seth Nickell takes a look at the "Experimental Culture" surrounding GNOME development and Christian Hammond sheds light on the concept of desktop presence.
The PDA business has had many losers in the past twenty years, but not all of them merited that status. Here are the top ten PDA's or initiatives that should not have failed.
Shared libraries use version numbers to allow for upgrades to the libraries used by applications while preserving compatibility for older applications. This article reviews what's really going on under the book jacket and why there are so many symbolic links in /usr/lib on a normal Linux system.
While the computing industry has been working to tighten up the security of its products amid increasing threats from viruses and hackers, a truly trustworthy infrastructure is still a few years off, Hewlett-Packard's security head said in an interview this week.