<b>Linux Planet:</b> "Jim Zemlin details where Linux is headed in advance of a major Linux conference, as adoption moves into the broader tech landscape."
<b>Linux Magazine:</b> "Opera is finally making with the snapshots for 10.50 on Linux, but is it really as fast as they claim? Opera’s upcoming release gets a shakedown this week, and the results might surprise you."
When it comes to blade servers, x86 is the most frequent architecture of choice. Bladed or not, however, x86 servers are not the perfect tool for every task. Non-x86 blade server options, while limited, fill many of the gaps that their x86 siblings leave.
When it comes to blade servers, x86 is the most frequent architecture of choice. Bladed or not, however, x86 servers are not the perfect tool for every task. Non-x86 blade server options, while limited, fill many of the gaps that their x86 siblings leave.
<b>Packt:</b> "In this article by Delan Azabani, you'll learn how Ubuntu identifies file types, how to use Assogiate to control these processes, using Ubuntu Tweak to associate types with applications and use Bless to inspect binary files."
<b>Amarok:</b> "Team Amarok is proud to announce Amarok 2.3.0. It contains many improvements and bugfixes over Amarok 2.2.2 as well as many new features. Areas such as podcast support and saved playlists have seen huge improvements, as has the support for USB mass storage devices (including generic MP3 players)."
Authorization Manger makes secure server virtualization more than a pipe dream. These best practices show you the two best ways to secure Hyper-V Server and virtual machines using Authorization Manager.
<b>Opensource.com:</b> "Plaintiffs attempted to exploit this inexperience by arguing that open source software involved behavior that was, if not downright illegal, at least ethically dubious. They promoted the fallacy that open source distributors unfairly take the property of others and thereby unfairly profit."
<b>Begin Linux:</b> "There are several categories of zones that must be configured. You need to have forward lookup zones, which allow the nameserver to match names to IP Addresses. You’ll define these zones in the /etc/bind directory, in files with the “db” prefix."
DBAs often need to learn where features of their system can be found on other systems. Steve Callan explores mapping SQL Server replication and management features back into Oracle Database.
The chip giant might do a little better than expected thanks to its new x86 server processors, but there will be no big surprises. After 2009, that's a good thing.
<b>Jamie's Random Musings:</b> "Sometimes you just have to "bite the bullet" and do what needs to be done, rather than what you would prefer to do, or what you would really like to do. That's what happened to me with my friends' laptop over the weekend."
<b>ZDNet:</b> "As I noted in my post over on Between the Lines (”Why doesn’t IBM just buy Novell already?”), I’ve been testing OpenSUSE’s Linux for Education Project and Ubuntu 10.04 server beta 1."
IBM was ranked the most trusted company for privacy among IT companies, fending off the likes of HP and eBay for the coveted top spot. But Facebook wasn't as fortunate.
<b>Martin's Blog:</b> "as you wanted to have a mail with all my concerns about client-side-window-decorations (CSD), here is a very long mail presenting all my concerns what will not be possible any more with CSD and why I think that these particular features will be impossible."
<b>PACKT Publishing: </b>"In this article by Jose Argudo, we will explore scripty2 library. We will discuss the core aspects of scripty2 right from how to get started to Scripty2 UI and Scripty2 FX."