Plus, Andrew Lock offers a small business marketing lesson on solution selling and an interview with business success coach, Marc Accetta on the value of edutainment.
RSA panel of experts says the U.S. is under daily cyber attacks by China, Russia, and their proxies. What can we do to protect our key systems and privacy?
It's possible to treat a text file as a data table, and use the standard approaches to dealing with tables, which is a major advantage in that you can use SQL to filter the text in the file. Doug Steele shows you how.
Discover an easy way to set up system-wide global API hooks using AppInit_DLLs registry key for DLL injection and Mhook library for API hooking. To illustrate this technique we will show how to easily hide calc.exe from the list of running processes.
For developers who have to live with an enterprise that has legacy and component architecture-based applications, here is a way to introduce SOA in a manner that is not too disruptive. SOA can be leveraged to preserve business logic investments made within component architecture-based systems while incorporating a better and more standards-based infrastructure.
<b>The Register:</b> "The BBC has tried to draw a line under its decision to bar open source implementations of RTMP (real-time messaging protocol) streaming in the iPlayer, after The Register revealed the Corporation's quiet switcheroo last week."
<b>Xen Virtualization on Linux and Solaris:</b> "Install Xen 4.0 and Libvirt like on F12 ( [1] ). Via my experience xend will hang for 5-7 min at startup and xen managed bridging will fail as well. This behavior stays the same under either 2.6.31.13 or 2.6.32.13 pvops kernel"
Your notebook computer budget's tight, but that doesn't mean you want a piece of…well, you know. Critics across the Web weigh in to help you buy the best notebook PC for less than $800.
From usual suspects like Apache, Google and Sun and some lesser-known players, January 2010 brought a steady stream of code releases for Java and open source developers' toolboxes.
It's no surprise that the concept of a proxy has made its way into the database arena. The MySQL Proxy sits between your application and your MySQL database. Future articles will discuss the myriad of uses for this technology.
With the introduction of SQL Server 2008 came Resource Governor. With this new feature, you can control resource allocations based on rules. Greg Larsen explains how to setup resource governor, how to use it and the limitations associated with this new resource allocation tool.
From usual suspects like Apache, Google and Sun and some lesser-known players, January 2010 brought a steady stream of code releases for Java and open source developers' toolboxes.
<b>Datamation:</b> "Though both GroundWork and Eucalyptus have open source versions of their products and the pair are now soliciting users to participate in a beta program, the cloud monitoring solution itself is not entirely open source."