<b>Developer.com:</b> "SQL-based relational database management systems (RDBMS) are beginning to be challenged by a new movement of NoSQL databases. Among those NoSQL databases is the open source CouchDB..."
The most common hardware failures typically involve hard drives and memory. We take a look at several handy utilities to help you diagnose and repair these pesky hardware problems.
Commission officials remain adamant that the current privacy regime isn't working and have harsh words for vendors like Google. They also remain coy about action they will take following Wednesday's third and final privacy workshop.
Commission officials remain adamant that the current privacy regime isn't working and have harsh words for vendors like Google. They also remain coy about action they will take following Wednesday's third and final privacy workshop.
<b>The VAR Guy:</b> "It's one small step for Dell, and one big strategic win for Canonical's Ubuntu Linux cloud strategy. Specifically, Dell on March 24 said it would support Ubuntu Enterprise Cloud (UEC) as an infrastructure solution."
<b>LWN.net: </b>"Google unveiled something that many in the open source community had been expecting (and which the Free Software Foundation asked for in March): it made the VP8 video codec available to the public under a royalty-free, open source BSD-style license."
<b>LWN.net:</b> "Mark Shuttleworth posts his thoughts about Linaro. Canonical will be working closely with the project, which has plans for six-month release cycles like Ubuntu. Linaro will also be using some Ubuntu infrastructure such as LaunchPad"
A university computer holding the social security numbers and other critical data for 15,800 students was communicating with a botnet's command-and-control center for months.
<b>Linux Planet:</b> "Tiny wall wart computers are everywhere, providing useful services, ease of use, and using little power. Paul Ferrill reviews the CloudPlug, a cross-platform, expandable backup server for both local and offsite storage"
<b>ars Technica:</b> "How will ACTA be used? Probably in the same way that the DMCA has been used: as a worldwide stick to beat through a US-centric version of copyright and IP law."
<b>Phoronix:</b> "One of AMD's low-priced offerings is the Athlon II X3 425, which is a triple-core AM3 processor that can easily overclock past 3GHz and is priced to sell at around $70 USD."
<b>Linuxconfig:</b> "Therefore, there is currently no storage solution that manages heterogeneous storage devices efficiently. In this article, we propose such a solution and we call it PROUHD (Pool of RAID Over User Heterogeneous Devices)."
According to the Anti-Phishing Working Group, one cyber gang known as Avalanche was responsible for two-thirds of all phishing attacks in the second half of 2009.
<b>Zona-M:</b> "Netlive is a slightly unusual distribution developed in Italy: a live version of Linux that makes available on demand any other live version of Linux chosen by its administrators to all the computers of its local network."
As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime.
International group of privacy authorities blasts Google for the recent launch of Buzz and other privacy missteps, and urges the company to get serious.
<b>Linux Planet:</b> "As we come to the end of Akkana Peck's excellent series on mastering GRUB2, it's not clear what advantages it has over legacy GRUB, or even good old LILO. It seems it's gone backwards. In today's installment we learn how to translate some common and mysterious error messages, and how to manage a multi-boot system with GRUB2."