In a keynote address, Jim Whitehurst explains why open source has become more valuable as an enabler of innovation in the enterprise than a means to cheaper software.
A corrupt table in MS Access means lost time and data. It can lead to a loss of revenue or even employment. Learn how you might be able to recover most of the data when the worst happens.
With an established pedigree in the consumer market, RoboForm is making the move to the enterprise with some good and bad results. eSecurityPlanet's thorough review says Siber Systems has delivered enough to warrant business consideration.
<b>Enterprise Storage Forum:</b> "Choosing the right solid state drive (SSD) for your enterprise storage networking environment is a critical decision — and equally critical is making sure you have the right controller to get the most out of the pricey drives."
Adobe Acrobat and Reader PDF applications are vulnerable to a new attack that relies on social engineering to trick users into clicking on something they shouldn't.
With an established pedigree in the consumer market, RoboForm is making the move to the enterprise with some good and bad results. eSecurityPlanet's thorough review says Siber Systems has delivered enough to warrant business consideration.
<b>Ian's Thoughts:</b> "I regularly sit in the #ubuntu channel on the Freenode network helping folks with Ubuntu issues. One of the things I see people often doing is attempting to install software from source before researching easier installation methods."
<b>ZDNet UK:</b> "After all, it has become almost de rigueur in geek circles, especially amongst the non-Windows using Mac and Linux crowd, to blame every security mishap on Microsoft."
Rebecca Bond discusses a few of the options available in IBM DB2's new CLPPLUS command line processor that you can use to connect to databases and to define, edit, and run statements, scripts, and commands.
<b>VoIP Planet:</b> "The Ubuntu Linux distribution isn't the only open source project with a long-term-support release on the horizon. The Asterisk open source VoIP PBX (define) project is moving ahead with its own long-term support (LTS) plans with its 1.8 release."
"Mariposa" gained access to information in more than 13 million PCs worldwide, making it one of the most destructive botnets in history, though authorities say that the operators weren't sophisticated hackers.
Learn a technique to fetch column data for MySQL crosstabs by emulating views. By replacing tables with a subquery subset, the resulting view will contain a limited dataset that has been filtered for that column field.
<b>Unity Linux:</b> "The developers at Unity Linux have been working hard on expanding our package repositories. At this point, there are well over 8600 packages for each of the i586 and x86_64 architectures."
Learn a technique to fetch column data for MySQL crosstabs by emulating views. By replacing tables with a subquery subset, the resulting view will contain a limited dataset that has been filtered for that column field.
<b>Datamation:</b> "Think you can scare Linux vendors into submission with a patent challenge? Think again. Linux vendors Novell and Red Hat have won a patent verdict in a Texas jury trial."
<b>Phoronix:</b> "...it turns out that Canonical may actually deploy Btrfs this year. Not only to provide an installation option within the installer for Btrfs, but to make it the default file-system."