White House cyber coordinator Howard Schmidt makes news at the RSA show, announcing the declassification of the cybersecurity plan developed two years ago.
<b>ars Technica:</b> "Watching two proprietary software companies deeply opposed to computer user freedom lob accusations back and forth about who is more opposed to freedom has been surreal, to say the least."
MySQL's crosstabs contain aggregate functions on two or more fields, presented in a tabular format. In a multi-aggregate crosstab query, two different functions can be applied to the same field or the same function can be applied to multiple fields on the same (row or column) axis. Rob Gravelle shows you how to apply two different functions to the same field in order to create grouping levels in the row axis.
New zero-day flaw could enable attacks on Microsoft's SharePoint Server if a user clicks a booby-trapped link, giving new meaning to the term SharePoint collaboration.
MySQL's crosstabs contain aggregate functions on two or more fields, presented in a tabular format. In a multi-aggregate crosstab query, two different functions can be applied to the same field or the same function can be applied to multiple fields on the same (row or column) axis. Rob Gravelle shows you how to apply two different functions to the same field in order to create grouping levels in the row axis.
<b>OSNews:</b> "Other codecs often come up in these discussions. The distinction between the availability of source code and the ownership of the intellectual property in that available source code is critical."
<b>Groklaw:</b> "Do you remember the patent infringement case IP Innovation filed against Red Hat and Novell in 2007? We looked for prior art, if you recall. Well, I'm very happy to tell you that Red Hat and Novell have prevailed in the litigation:"
Panda Security discovered Confiker, Mariposa and Lineage password stealing malware samples installed on a recently purchased Vodafone HTC Magic smartphone.
The cloud, the smartphone, the tablet, the Web itself as a big giant operating system-- what's the fatal flaw in all of these? It's all about feeding content to passive "consumers". Plug me in, baby, I'm not lifting a finger ever again.