<b>Handle With Linux:</b> "Measuring at just 2 x 2 x 2.2 inches this is the smallest Desktop PC. And it's running Linux, one more point for Linux coolness."
<b>MacNewsWorld:</b> "Will Gizmodo's Jason Chen land in the cooler for his part in leaking Apple's next-gen iPhone to the world? Or did Silicon Valley's High Tech Task Force violate legal protections established to shield journalists when they raided the editor's home?"
The 'Excel Analyst's Guide to Access' is especially good for Excel users who need an introductory but aggressive tutorial into the world of Microsoft Access. Read on to find out why he decided to keep this particular book in his own personal library.
<b>Tech Drive-In:</b> "Light the world with Firefox video is a nice depiction of Firefox through the years. But how many of you actually knew that there are a number of Firefox based browsers which are as good or oven better than Firefox? Here is a list of 5 Firefox based browsers you should know."
Following a high-profile security breach, search giant Google begins to phase out in-house use of Microsoft Windows operating systems, according to a report.
A free Web marketing resource shows you how to make the most of Google Analytics, plus stock video footage you can actually afford and a free emarketing tool to find keywords.
<b>Softpedia:</b> "Nvidia announced a few days ago, on its forum, a new version of its proprietary driver for the Nvidia graphics cards. Nvidia 195.36.24 adds support for new GPUs, and fixes a few issues. But the most important thing is that Nvidia 195.36.24 has support for X Server 1.8."
New virtualization technology offerings and marketing promotions help Microsoft and partner Citrix kick off a 100-city tour to convince customers that flexibility in virtualization is the winning strategy.
<b>DeveloperWorks: </b>"A recent addition to Linux's impressive selection of file systems is Ceph, a distributed file system that incorporates replication and fault tolerance while maintaining POSIX compatibility."
Many critical business applications now execute in an environment separate from that of the enterprise database server. The database administrator often finds monitoring and performance tuning of these "distributed" applications to be especially difficult. This article looks at common performance issues of distributed applications and presents advice to assist the IBM DB2 database administrator in mitigating performance problems.
Looking to protect your e-mail from hackers, especially when you're on the road? For starters, don't use Yahoo. Here are some guidelines to keep your communication secure.
<b>Developer.com:</b> "For many users of Mozilla's open source Firefox Web browser, Firefox is simply a tool for looking at Web content. For others, Firefox is an enabling tool to actually help develop content and code for the Web."
Data breaches small and large continue to plague consumers and businesses at a record pace and lawmakers at all levels of government are now considering more proactive legislation to help thwart identity theft.
SQL Server Service Broker (SSBS), introduced with SQL Server 2005 and enhanced in SQL Server 2008, allows you to write queuing/message based applications within the database itself. This article discusses SSBS' important features and how to use it in different scenarios.
Using profiles for password management is an effective way to restrict unsolicited database usage. Every DBA should verify the password restrictions and setup an appropriate number of profiles for the groups or types of users within the database.
<b>ChromeCode:</b> "A while back I announced the creation of a schedule for GIMP 2.8 development. I've made sure to keep this schedule up to date, and after a bunch of initial adjustments such as postponing some feature and adding others, the schedule has now stabilized a bit."
Tip of the Trade: If you find yourself using the same commands over and over between Vim session, it's time to consider permanently saving your macros.