<b>Ian's Thoughts:</b> "I regularly sit in the #ubuntu channel on the Freenode network helping folks with Ubuntu issues. One of the things I see people often doing is attempting to install software from source before researching easier installation methods."
Rebecca Bond discusses a few of the options available in IBM DB2's new CLPPLUS command line processor that you can use to connect to databases and to define, edit, and run statements, scripts, and commands.
<b>Enterprise Storage Forum:</b> "Choosing the right solid state drive (SSD) for your enterprise storage networking environment is a critical decision — and equally critical is making sure you have the right controller to get the most out of the pricey drives."
<b>Unity Linux:</b> "The developers at Unity Linux have been working hard on expanding our package repositories. At this point, there are well over 8600 packages for each of the i586 and x86_64 architectures."
<b>Phoronix:</b> "...it turns out that Canonical may actually deploy Btrfs this year. Not only to provide an installation option within the installer for Btrfs, but to make it the default file-system."
Can any one tool corral contacts from your various sources? Plus, a FedEx failure, a $5 resource and Noah St John helps small business entrepreneurs take out the 'head trash.'
Can any one tool corral contacts from your various sources? Plus, a FedEx failure, a $5 resource and Noah St John helps small business entrepreneurs take out the 'head trash.'
Understanding the total cost of ownership as it applies to technology will help you make better buying decisions for your company and save you time, money and aggravation. Analyst Laurie McCabe explains what you need to know about TCO.
<b>WEBM Project:</b> "Though video is also now core to the web experience, there is unfortunately no open and free video format that is on par with the leading commercial choices. To that end, we are excited to introduce WebM, a broadly-backed community effort to develop a world-class media format for the open web."
<b>Phoronix:</b> "Back in March we talked about the possible X.Org projects this year during Google's Summer of Code, for which X.Org is a veteran participant (in the past items like the ATI R300 Gallium3D driver and generic GPU video decoding have been tackled), but the list of accepted projects for this summer have now been announced."
New study from PandaLabs pins the escalating severity of attacks carried out by relatively unskilled hackers on a thriving black market offering ready-made tools.
States are passing more and more data security laws, the US Senate and the House have bills meandering through Congress, securing personal information and encrypting that data is no longer optional.
<b>Standards Blog:</b> "Frank stepped out of the dark, moonless night of the Nevada desert and into the bright light of the bar, restaurant and motel that was the Little A'Le'Inn."
<b>Cyberciti:</b> "How do I make sure only authorized person access my backups stored on the tape drives (DAT, DLT, LTO-4 etc) under Linux or UNIX operating systems? How do I backup /array22/vol4/home/ to /dev/rmt/5mn or /dev/st0 in encrypted mode?"
Rebecca Bond returns from an IDUG Conference with some short, compact knowledge bits that return big results. These quick tips and fixes make great additions to any database administrator's toolbox.
<b>Boycott Novell:</b> "Summary: War is peace and Microsoft is the new “open”; Details on the latest attack of Microsoft against GNU/Linux, using proxies"
<b>InfoWorld:</b> "Source code availability is a central factor in establishing trust in the open source community, as knowledge that the source is available can often allay fears about the future of a particular open source project or product. And yet, this trust can often be overstated."