<b>The Blog of Helios: </b>"What follows is a story about Alice I wrote in 2006, published in the now-offline Lobby4Linux.com website. I am reprinting this for those who may not have read it and to spend some personal time in remembering Alice."
EMC and HP are just two of many storage vendors with announcements at this week's VMworld show. Will there be big news from the VMware-Cisco-EMC alliance?
<b>IBM Developerworks:</b> "This article focuses on the Red Hat Package Manager (RPM) developed by Red Hat, as well as the Yellowdog Updater Modified (YUM) originally developed to manage Red Hat Linux systems at Duke University's Physics department."
<b>Tech Source:</b> "9. People of Lava Want to Put a Big Android in Your Living Room Android is not just for smartphones anymore -- in fact, a Swedish company has just unveiled the first Android-based TV."
Have you ever struggled to communicate architectural information with stakeholders? Do you recognize that presenting data and information is a core competency of an architect? Consider putting these proven principles and patterns to use in your next presentation.
The Java collections framework contains classes you use to maintain collections of other objects. These collection classes have different performance and ordering properties. See how the HashMap and HashSet Classes allow objects to be added to a collection, removed from a collection, or found in roughly constant time. Discover how to use these classes and what to do to achieve good performance from them.
Have you ever struggled to communicate architectural information with stakeholders? Do you recognize that presenting data and information is a core competency of an architect? Consider putting these proven principles and patterns to use in your next presentation.
<b>Linux.com:</b> "Since then, we've received more than 100 submissions and today, after some grueling decision-making, we are announcing the T-shirt design contest finalists! "
<b>The H Open:</b> "Lightweight desktops have a multitude of uses, on netbooks, for mobile devices, for older hardware, for users with limited requirements of their systems, for connecting to applications in the cloud, and for bare knuckled programmers who prefer to work closer to the metal."
Tens of thousands of Arkansas National Guard soldiers became the latest victims of a security breach at a military base after an unencrypted external hard drive was discovered missing last month.
<b>Really Linux:</b> "Unfortunately, I then stumble on the ever so frequent prophetic Linux article. One declares, "This is the year of Linux on the desktop." Another declares, "The desktop is dead." And another declares, "This is the year of the death of Linux on the desktop.""
<b>Xen Virtualization on Linux and Solaris:</b> "Finally Mark Johnson submitted to xen-devel mailing list patch for ZFS 24 support at Xen 4.0. Patch mentioned bellow was successfully tested at Xen 4.0 Dom0 with pvops kernel 2.6.32.11 on top of Fedora 12"
<b>swpat.org:</b> "201001_acta.pdf is a leaked copy of the full "January 18th 2010 consolidated text" of the Anti-Counterfeiting Trade Agreement (ACTA). Below is a full transcript."