Andrew Lock shows how to serve your customers by challenging industry norms, innovate with existing products and combine information with promotion to with your customers.
New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official.
<b>WEBM Project:</b> "Though video is also now core to the web experience, there is unfortunately no open and free video format that is on par with the leading commercial choices. To that end, we are excited to introduce WebM, a broadly-backed community effort to develop a world-class media format for the open web."
<b>Ian's Thoughts:</b> "I regularly sit in the #ubuntu channel on the Freenode network helping folks with Ubuntu issues. One of the things I see people often doing is attempting to install software from source before researching easier installation methods."
<b>Phoronix:</b> "...it turns out that Canonical may actually deploy Btrfs this year. Not only to provide an installation option within the installer for Btrfs, but to make it the default file-system."
If you work in a corporate IT shop, then Windows 7 is mostly likely in your future, and it may come sooner rather than later, according to a panel of financial and technology analysts queried by InternetNews.com.
<b>Ghabuntu:</b> "On Linux, the Gimp has its own collection of plugins and scripts, but to satisfy the folks who look down upon Linux and Gimp, I will present not one but two ways to do the work of Photoshop plugins in Linux."
<b>Unity Linux:</b> "The developers at Unity Linux have been working hard on expanding our package repositories. At this point, there are well over 8600 packages for each of the i586 and x86_64 architectures."
<b>Linux Pro Magazine:</b> ""People with disabilities deserve to have control of their own technological destinies." With this statement, the Free Software Foundation (FSF) announces that it is turning its attention to accessibility."
<b>Cyberciti:</b> "How do I make sure only authorized person access my backups stored on the tape drives (DAT, DLT, LTO-4 etc) under Linux or UNIX operating systems? How do I backup /array22/vol4/home/ to /dev/rmt/5mn or /dev/st0 in encrypted mode?"
<b>eSecurityPlanet:</b> "An audit by the Justice Department's Office of the Inspector General reveals that while the FBI and Justice Department have made "various efforts" to fight identity theft crimes in recent years, these initiatives have "faded as priorities" mainly because the agencies have failed to develop a coordinated plan to deal with what's become an epidemic of cybercrimes."
<b>Linux Magazine: </b>"digiKam is an immensely powerful photo application, so learning all its features requires time and effort. But this capable photo management application also offers a few easy to use features which you can use to instantly improve your shots."
A corrupt table in MS Access means lost time and data. It can lead to a loss of revenue or even employment. Learn how you might be able to recover most of the data when the worst happens.
Microsoft SQL Server 2008 R2 introduces a number of interesting new features for both DBAs and developers alike. Read on to learn our top 10 favorites.