Exploring .NET’s Isolated Storage

Windows INI files and its registry have both advantages and limitations, particularly from a developer's viewpoint. In this DevSource article, Peter Aitken explains what they are, and explains how .NET's isolated storage works: it provides a location on your drive that only a specific application can find and use. He explains when isolated storage is a developer's best friend, and when you shouldn't bother.

Extending the GPL for Application Service Providers

Funambol CEO Fabrizio Capobianco is scheduled to announce a draft version of a modified GPL today that would add a provision requiring service providers to distribute changes to code, even if they don't "distribute" the code beyond their own servers. Capobianco calls this the Honest Public License (HPL), and the additional provision could add an entirely new wrinkle to free software.

Beyond DirectX 10 – A Glance at DirectX 10.1

"DirectX 10 is likely to see a number of point revisions during its lifespan and the first of these, imaginatively titled DirectX 10.1, will be the first of these. It may surprise some of you reading this, but the features which will be added by DirectX 10.1 have already been decided upon and information made available about them, so in this article we'll be taking a look through what we can expect to see in DirectX 10.1 compliant hardware."

Hardware Virtualization Slower Than Software?

" a new white paper by VMWare that comes to the surprising conclusion that hardware-assisted x86 virtualization oftentimes fails to outperform software-assisted virtualization. My reading of the paper says that this counterintuitive result is often due to the fact that hardware-assisted virtualization relies on expensive traps to catch privileged instructions while software-assisted virtualization uses inexpensive software substitutions." Read more at Slashdot.

Take a Closer Look at the Most Secure Unix OS: OpenBSD

OpenBSD strives to be the most secure UNIX derivation. Design principles, such as code auditing, extensive use of encryption, and careful configuration choices, combine to ensure OpenBSD's secure by default philosophy holds true. This article gives you a close look at the operating system so secure that it was once banned for use in a DEF CON competition, where crackers go after each other's systems.