Internet Explorer 8 Beta 2 Released

The IE team at Microsoft has released the 2nd beta Internet Explorer 8. Contrary to the first beta, which was aimed at developers, this one one is aimed at normal people like you and me. The list of new features and changes is decent, all focused around three themes (marketing alert): "We focused our work around three themes: everyday browsing (the things that real people do all the time), safety (the term most people use for what we've called 'trustworthy' in previous posts), and the platform (the focus of Beta 1, how developers around the world will build the next billion web pages and the next waves of great services)." Go get it.

Sun for Sale?

Dropping profits and stock prices have analysts speculating that Sun could be a target for either acquisition or a restructuring in which the company would sell off parts of the business and focus on a smaller set of technologies. In a July 31 report, the 451 Group analyst firm raised the possibility of Sun being acquired: 'Sun's sunken stock price creates a relative bargain considering its roughly $4 billion cash on hand, sizeable intellectual property and patent portfolio, and of course, its respected technology and products'.

The Monkey On Microsoft’s Back

"Poor Microsoft. This week, the Redmond, Wash., giant is gearing up for the next big release of its Web browser, a leap from Internet Explorer 7 to IE 8. When open-source competitor Mozilla released its last update of Firefox in June, the Web went wild: People downloaded more than 8 million copies in 24 hours. Microsoft's release might not have such a frat party feel. Even as it gears up to release IE 8, the developers behind the Firefox Web browser are experimenting with a new technology that sharpens the threat their browser software poses to Microsoft's most valuable businesses. The new technology, dubbed TraceMonkey, promises to speed up Firefox's ability to deliver complex applications." While many have abandoned Microsoft's browser offerings, Microsoft will be introducing an innovative new type of selective privacy mode called InPrivate with IE8.

Google drops Bluetooth, GTalkService APIs from Android 1.0

Google has dropped the Bluetooth and GTalkService instant messaging APIs (application program interfaces) from the set of tools for the first version of the mobile phone OS, Android 1.0, according to the Android Developers Blog. The company opted to drop the Bluetooth API because "we plain ran out of time," said Nick Pelly, one of the Android engineers responsible for the Bluetooth API, on the blog posting. But the company made clear that handsets using the Android OS will work with other Bluetooth devices such as headsets, for example. Ed note: To be clear, only the APIs are delayed, not the features. This suggests third party apps will not be able to access these frameworks.

Vista Annoyances Resolved

What makes this Vista article any different? The title provides a clue: it's as much about providing practical working solutions to resolve some of the commonly-quoted Vista annoyances as anything else. That in itself should give all Vista users a reason to read it. However it doesn't matter whether you use Vista or not, because this article does something that most of the others don't: it takes an objective and up-to-date look at the current state of Vista, with a range of facts, clear examples and informed opinions aimed squarely at debunking a lot of the myths and FUD we've been gagging on for the past year. So for those of you still considering whether to make the switch from XP, for those of you who want to abandon Vista and go back to XP, for those of you who used Vista a while ago and who are wondering whether it's worth using again now - this article puts things in perspective with the latest facts.

21 of the Best Free Linux Text Editors

Periodically, there's a review of text editors for a particular platform. Linuxlinks' latest post is pretty thorough though, covering 21 different Linux/Unix text editors. "In many users' eyes, a text editor should be lean and mean, fast to start up and shut down, without fancy splash screens or a graphical user interface. The choice of editor has long stirred up strong emotions. To provide an insight into the quality of software that is available, we have compiled a list of 21 high quality Linux text editors. There's a mix of graphical and console based applications included.

Red Hat, Fedora Servers Infiltrated By Attackers

Linux distributor Red Hat has issued a statement (Ed: via their errata) revealing that its servers were illegally infiltrated by unknown intruders. According to the company, internal audits have confirmed that the integrity of the Red Hat Network software deployment system was not compromised. The community-driven Fedora project, which is sponsored by Red Hat, also fell victim to a similar attack. More news is available around the web.

Next-Generation Computer Antivirus System Developed

"Antivirus software on your personal computer could become a thing of the past thanks to a new "cloud computing" approach to malicious software detection developed at the University of Michigan. The researchers' new approach, called CloudAV, moves antivirus functionality into the "network cloud" and off personal computers. CloudAV analyzes suspicious files using multiple antivirus and behavioral detection programs simultaneously. Traditional antivirus software that resides on a personal computer checks documents and programs as they are accessed. Because of performance constraints and program incompatibilities, only one antivirus detector is typically used at a time. The researchers see promising opportunities in applying CloudAV to cell phones and other mobile devices that aren't robust enough to carry powerful antivirus software."

Book Review: The Book of IMAP

The Book of IMAP: Building a Mail Server with Courier and Cyrus, by Peer Heinlein and Peer Hartleben, is a quality resource for any serious mail administrator. The approach taken is direct, but at the same time it's very expansive, setting this book apart from most others I have read. It's packed full of rich examples which are used to solidify the topic being covered. At several places the authors reach out to explain when the subject is addressing ambiguous or otherwise undocumented information which is to great advantage to the reader and worthy of recognition.

Linux Kernel Walkthrough – Boot Process (Screencast)

Ottawa Canada Linux Users Group recently hosted another of its Kernel Walkthrough tutorials given by Bart Trojanowski. The screencast starts with a one-hour presentation on the components involved, and then dives into the code which bootstraps the kernel on the 32bit x86 platform. The first Kernel Walkthrough by the Ottawa Canada Linux Users Group covered Linux development background, file layout and data types.

The Challenge: the Manageable Computer

Earlier this week, we ran a story on GoboLinux, and the distribution's effort to replace the Filesystem Hierarchy Standard with a more pleasant, human-readable, and logical design. A lot of people liked the idea of modernising/replacing the FHS, but just as many people were against doing so. Valid arguments were presented both ways, but in this article, I would like to focus on a common sentiment that came forward in that discussion: normal users shouldn't see the FHS, and advanced users are smart enough to figure out how the FHS works.

Kernel Space: udev Rules, But Whose?

"Once upon a time, a Linux distribution would be installed with a /dev directory fully populated with device files. Most of them represented hardware which would never be present on the installed system, but they needed to be there just in case. Toward the end of this era, it was not uncommon to find systems with around 20,000 special files in /dev, and the number continued to grow. This scheme was unwieldy at best, and the growing number of hotpluggable devices (and devices in general) threatened to make the whole structure collapse under its own weight. Something, clearly, needed to be done." The solution came in the form of udev, and udev uses rules to determine how it should handle devices. This allows distributors to tweak how they want devices to be handled. "Or maybe not. Udev maintainer Kay Sievers has recently let it be known that he would like all distributors to be using the set of udev rules shipped with the program itself." ComputerWorld dives into the situation.

Atari’s History, 1971-1981

"Atari was founded in 1972, but its crowning accomplishments in console gaming and computers were the Atari Video Computer System (or 2600) and the Atari 400/800 line of personal computers. This four-year period - from 1977 to 1981 - contains some of the most exciting developments the company ever saw in its history: the rise of the 2600, the development of some of the company's most enduringly popular games (Centipede, Asteroids) and the development and release of its first home computing platforms. This comprehensive look back, filled with quotes from the original creators and other primary sources, offers a detailed peek into the company that popularized video gaming as the '70s turned into the '80s, and created the first viable market for home consoles. For more detail, be sure to read Gamasutra's first Atari history article, which covers the period of 1971 to 1977 - the latter date being the year that the Atari VCS was first released." That's a grand total of 40 pages of detailed Atari history. Nice weekend reading for the fans.