<b>Technology & Life Integration:</b> "It always grates me when the discussion gets down to how rotten Windows is because of all the viruses etc. when it seems obvious, at least to Windows users, that most of that crap is written by Linux devotees."
<b>Click:</b> "I turned on my laptop running the Ubuntu 10.04 Lucid beta (I think we're still technically on "beta 2") and found more than 100 updates ready for me."
<b>The Volokh Conspiracy:</b> "Under this new decision, if the government wants get your e-mails, the Fourth Amendment lets the government go to your ISP, wait the seconds it normally takes for the e-mail to be delivered, and then run off copies of your messages."
OS Roundup: Was it exclusion or exclusivity that fueled Apple's journey to being the world's biggest technology company? Or perhaps it's Apple's understanding and ability that when the producer names the tune, the consumer must dance.
OS Roundup: Was it exclusion or exclusivity that fueled Apple's journey to being the world's biggest technology company? Or perhaps it's Apple's understanding and ability that when the producer names the tune, the consumer must dance.
<b>O'Reilly Broadcast:</b> "I knew in advance that venting my frustrations with Ubuntu in the form of an article yesterday would stir up a hornet's nest."
<b>Phoronix:</b> "We are still working on the first part of our Windows 7 vs. Ubuntu 10.04 LTS benchmarks that are set to be published early next week, but so far there is one easy conclusion to draw from the completed tests: Intel's Linux graphics driver is still no match to the Intel Windows driver."
A Microsoft-sponsored survey found IT security organizations aren't spending enough protecting trade secrets and other key bits of confidential corporate information.
<b>Linux Magazine: </b>"Whether you want it or not, your Web activities are tracked and analyzed in many different ways. There are a few handy Firefox extensions that can beef up your favorite browser's privacy features."
While many ISVs see the difference between cloud and on-premise solutions as being black and white -- they're exclusively offering one or the other -- it's worth keeping in mind that there can be a middle ground.
Can your vulnerability management program adapt to local application attack vectors? Nowadays, keeping pace with worms and viruses means getting creative about policies.
In the world of wireless network management you need to thread the needle between vendor lock-in and potentially poor coverage from third-party solutions.
A free marketing tool to help you track your goals, a site to let you know if someone's stolen your Web images and a place where everything costs you $5.
A free marketing tool to help you track your goals, a site to let you know if someone's stolen your Web images and a place where everything costs you $5.
Can a netbook be a small business computer? Our guide helps you choose a netbook PC that can handle everyday business tasks at a very affordable price.