<b>We'll See:</b> "I spent last week at the Ubuntu Developer Summit in Belgium, where we kicked off the 10.10 development cycle. Due to our time-boxed release cycle, not everything discussed here will necessarily appear in Ubuntu 10.10, but this should provide a reasonable overview of the direction we're taking."
The two hardware giants detail how their new mobile effort relies on the wider open source community -- but don't expect an entirely open source final product.
<b>Datamation:</b> "Intel and Nokia are two of the largest tech companies on the planet, but when it comes to developing a new mobile operating system, they've opted to not just team up, but to enlist the legions of open source developers out there."
<b>Postfix Mail:</b> "One great alternative client is Thunderbird, Icedove if you are on Debian. Here is a step by step approach to setting up the Thunderbird client for TLS and SMTP AUTH."
<b>Distrowatch:</b> "The sidux distribution is one which has been on my to-review list for a while. It's a small project which makes a bold effort to take Debian's Unstable repository and turn it into a functioning day-to-day operating system."
Volume 2 of tips and tricks that touches on tips related to some of the new features of C# 4.0 along with other beneficial tips and tricks. In addition, it mentions some tools that are worth knowing as well.
As we come to the end of Akkana Peck's excellent series on mastering GRUB2, it's not clear what advantages it has over legacy GRUB, or even good old LILO. It seems it's gone backwards. In today's installment we learn how to translate some common and mysterious error messages, and how to manage a multi-boot system with GRUB2.
Authorization Manger makes secure server virtualization more than a pipe dream. These best practices show you the two best ways to secure Hyper-V Server and virtual machines using Authorization Manager.
For the second time in two years, Wyndham Hotels and Resorts says hackers managed to access its computer systems, stealing personal data including customer payment card data.
IBM was ranked the most trusted company for privacy among IT companies, fending off the likes of HP and eBay for the coveted top spot. But Facebook wasn't as fortunate.
<b>Really Linux:</b> "In this article, Andrea explores some of the most recent Linux job postings and determines that Linux is a very good niche to be in during these economically strange times."
The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year.
<b>Enterprise Storage Forum: </b>"While Sun Microsystems may have struggled with making money from its OpenSolaris operating system prior to Sun's acquisition by Oracle, that doesn't mean that others haven't had better success."
<b>HowtoForge: </b>"CIITIX-WiFi is a turnkey solution to your WiFi hotspot needs. Built onto the rock solid stable debian linux, setting up a secure (TTLS) WiFi hotspot is just a minute away."
<b>Packt:</b> "In this article by Delan Azabani, you'll learn how Ubuntu identifies file types, how to use Assogiate to control these processes, using Ubuntu Tweak to associate types with applications and use Bless to inspect binary files."