Language Selection

English French German Italian Portuguese Spanish

Misc

Thirteen Blog Clichés

Filed under
Misc

coding horror: I started out in early 2004. As a result, I've developed some rather strong opinions about what makes blogs work so well, and what makes blogs sometimes not work so well. I'd like to share some of the latter with you today, in a piece I call Thirteen Blog Clichés.

Dear Linux Journal: News Flash- Women Are People

Filed under
Misc

Carla Schroder: This just keeps getting worse. Please tell me how anyone could think this is a good idea: "Me and my husband’s gonna be bringing you tech tips just about every month now….I don’t know nothing about Linux. Chester, he’s the smart one…”

Information sharing at the NSA (video)

Filed under
Misc

linux.com: The topic of information sharing among US intelligence agencies, the FBI, and other federal agencies has attracted attention since 9/11. At Defcon XV, I had the opportunity to ask Tony Sager, chief of the National Security Agency's Vulnerability Analysis and Operations Group, about information sharing within the agency.

"Fake Steve Jobs" is Daniel Lyons, in case anyone wants to sue

Filed under
Misc

groklaw: The New York Times has the news that Fake Steve Jobs, the anonymous blogger pretending to be Apple's Steve Jobs, is actually Daniel Lyons of Forbes. Why am I not surprised?

Black Hat USA 2007: That's a wrap

Filed under
Misc

linux.com: Black Hat USA 2007 was fast-paced, fun, and informative. It demonstrated that security is big business. The halls were lined with vendors, some new, some old, and the smell of money was everywhere. Still, I'm left thinking this year's show had a different tone to it than last year's.

The Coming Software Patent Apocalypse

Filed under
Misc

coding horror: Every practicing programmer should read the Wikipedia article on software patents, if you haven't already. Many software companies are of the opinion that copyrights and trade secrets provide adequate protection against unauthorized copying of their innovations. However, the cost of developing a suitable portfolio of patents may be out of reach of many small software companies. If this sounds like a classic Mutually Assured Destruction arms race, that's because it is.

KDE hacker authors Qt book

Filed under
Misc

linuxdevices: Core KDE developer Daniel Molkentin has written a book about Trolltech's cross-platform application development toolkit. Published by NoStarch Press, and entitled, "The Book of Qt 4."

How “Wintel thinking” reduces productivity

Filed under
Misc

Paul Murphy: For many jobs there’s a PC way and a Unix way. For example, I write these blogs using vi under either CDE (Solaris 10) or Gnome (Solaris 9) and just embed references and format information as I go along. The result is extremely portable because the text is independent of the format.

Most Important Laptops…Ever!

Filed under
Misc

CyberNetNews: Modern laptops continue to get more powerful and smaller in size, but we can’t forget about the predecessors that led to the notebooks that we have today. PCWorld put together an article outlining the top-10 most important laptops of all time where they outline the significance of each one. So what laptops made the list?

Get the iPhone’s Features Without an iPhone

Filed under
Misc

sheehantu: Apple made headlines this weekend with its launch of the iPhone. I applaud Apple for pioneering a new design and user-interface, however feature-wise the iPhone is similar to a Motorola RAZR that debuted two years ago. For those of you who want to get the software on an iPhone without purchasing an iPhone, check out this list:

Syndicate content

More in Tux Machines

Why the Open Source Stars Must Align

Open source projects like OpenStack, Docker, OPNFV and OpenDaylight are more supported and better funded than ever before. They mark a broader trend of large, active and well-resourced open source projects that are among the leaders in Big Data, cloud computing, operating systems and development practices. Open source has come a long way in 30 years – and its success marks a new era for the overall OSS community. But success does not come without potential pitfalls. One of the greatest obstacles to project success isn’t the proprietary competition – it’s the lack of communication between large open source projects like OpenStack and Docker. Read more

Myth Busting the Open-Source Cloud Part 1

On the contrary, open-source cloud computing products are designed from the outset with security in mind. For example, there are features such as identity management to monitor who has access to content, and data encryption to safeguard information while it’s at rest or in transit. Furthermore, open-source cloud software is peer-reviewed by community participants, leading to continuous improvements in the quality of security features and mechanisms. This community also monitors and rapidly discloses vulnerabilities and issues, and provides security updates to address them. Read more

What does an adult look like in an open source community?

You're no longer "just an adult." You're now trusted and looked to for opinions on how the community should grow. You're a community elder. You embody the history. You keep the history. You work together with other adults and elders to guide and make the community stronger. And to a certain extent, the community once again looks after you, just as it did in the first phase. Read more