<b>Computerworld UK:</b> "Both Google and the Chinese government appear to be leaking word that the search firm may soon shutter its operations there as negotiations between the two break down."
<b>Federal Computer Week: </b>"The challenges to government's adoption and participation in open-source communities is often thought to be a simpe culture clash, but in reality it goes deeper than that, accordning to NASA's newly-appointed chief technology officer."
What does an eye doctor with a penchant for inventions have to do with Microsoft's Zune, and will the company ante up with him in a patent dispute or fight to the finish?
<b>Groklaw:</b> "SCO has filed its "renewed" motion for judgment "as a matter of law", with its supporting memorandum. They ask the judge to rule over the heads of the jury and decide that the jury "simply got it wrong" when it ruled that SCO didn't get the copyrights in 1995 from Novell. In the alternative, they'd like a new trial."
Tiny wall wart computers are everywhere, providing useful services, ease of use, and using little power. Paul Ferrill reviews the CloudPlug, a cross-platform, expandable backup server for both local and offsite storage.
Sophisticated cyber attacks are becoming a nearly routine event, causing IT managers a never-ending series of security headaches. A new report details the threats.
Sophisticated cyber attacks are becoming a nearly routine event, causing IT managers a never-ending series of security headaches. A new report details the threats.
<b>O'Reilly GMT:</b> "We often hear people saying that Perl is dead. I assume that you don't agree, but what do you say to people who try to tell you that?"
<b>Tech Republic:</b> "Vincent Danen has some tips for using the smartmontools package to obtain important information about the health of your hard drives that could provide early warning signs of problems."
New study from Palo Alto Networks offers the latest warning about using social technologies in the enterprise, and finds a surprisingly high rate of adoption in regulated industries.
This chapter provides an overview of some of the most important system namespaces and gives more detailed examples that demonstrate regular expressions, XML, cryptography, reflection, threading, parallel programming, and Direct3D.
This chapter provides an overview of some of the most important system namespaces and gives more detailed examples that demonstrate regular expressions, XML, cryptography, reflection, threading, parallel programming, and Direct3D.
This chapter provides an overview of some of the most important system namespaces and gives more detailed examples that demonstrate regular expressions, XML, cryptography, reflection, threading, parallel programming, and Direct3D.
Previously known as Windows Genuine Advantage, Windows Activation Technologies' update adds detection of 70 activation hacks for Windows 7, aims to cut down on piracy and counterfeiting.
With growth flat from the previous year, 2009 ended on a high note for e-commerce, but the gains aren't spread evenly among the smaller and larger players.
Previously known as Windows Genuine Advantage, Windows Activation Technologies' update adds detection of 70 activation hacks for Windows 7, aims to cut down on piracy and counterfeiting.