<b>Tech Source:</b> "Since our collection of Free and Open Source finance/accounting software for Linux has been quite popular, I would like to add 7 more to that list."
The storage networking switch maker watched its stock plummet Tuesday after it reported disappointing sales from the Ethernet business it acquired from Foundry for $3 billion in July 2008.
<b>Dissociated Press:</b> "I love the concept, hate the execution. I've written about that before. Facebook encourages the kind of bad netiquette it's taken years to drum out of people. "Oh, I like this page and look - it has a 'forward to all my friends' button.""
Query optimization is an often overlooked part of applications. Sean Hull encourages at least some attention to query optimization up front and helps you identify some of the more common optimizations you may run across.
It's possible to treat a text file as a data table, and use the standard approaches to dealing with tables, which is a major advantage in that you can use SQL to filter the text in the file. Doug Steele shows you how.
Windows Server 2008 R2 includes a new Best Practices Analyzer for Active Directory Domain Services, which facilitates the implementation of best practices in your Active Directory Domain Services environment.
<b>The H Open:</b> "Moodle , the E-learning platform, is one of the most significant and successful projects in open source. Despite its success, with hundreds of thousands of people being taught by courses written in Moodle, as a product it is not well known."
<b>The Register:</b> "The BBC has tried to draw a line under its decision to bar open source implementations of RTMP (real-time messaging protocol) streaming in the iPlayer, after The Register revealed the Corporation's quiet switcheroo last week."
<b>Michael Geist:</b> "The U.S. government has released its annual Special 301 report in which it purports to identify those countries with inadequate intellectual property laws. Given the recent history and the way in which the list is developed, it will come as no surprise that the U.S. is again implausibly claiming that Canada is among the worst of the worst"
RSA panel of experts says the U.S. is under daily cyber attacks by China, Russia, and their proxies. What can we do to protect our key systems and privacy?
With the introduction of SQL Server 2008 came Resource Governor. With this new feature, you can control resource allocations based on rules. Greg Larsen explains how to setup resource governor, how to use it and the limitations associated with this new resource allocation tool.
<b>KDE.news:</b> "The Plasma Javascript Jam Session is a friendly competition that aims to reward creators of original, interesting and beautiful Plasma widgets written in Javascript with some great prizes and community recognition."
From usual suspects like Apache, Google and Sun and some lesser-known players, January 2010 brought a steady stream of code releases for Java and open source developers' toolboxes.
Discover an easy way to set up system-wide global API hooks using AppInit_DLLs registry key for DLL injection and Mhook library for API hooking. To illustrate this technique we will show how to easily hide calc.exe from the list of running processes.
<b>Linux Foundation:</b> "The Linux Foundation, on behalf of its members, would like to register its serious objections to the current BBC/OFCOM proposal, which would impose content management controls on new free-to-air high definition channel"