<b>Linux Planet:</b> "Web-based applications are fantastic, except for that whole "running in the browser" thing. Looking to free your browser-based apps from your Web browsing? Take a look at Mozilla Prism."
Linux at retail has been a hit-and-miss proposition for more than a decade. Canonical's new CEO explains her company's strategy for getting desktop Linux into more customers' hands.
<b>Howtoforge:</b> "This guide explains how to set up mod_chroot with Apache2 on a Fedora 12 system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications."
Plus, Andrew Lock offers a small business marketing lesson on solution selling and an interview with business success coach, Marc Accetta on the value of edutainment.
<b>Linux.com:</b> "Nokia's Vice President of MeeGo Devices, Ari Jaaksi, will kick off the afternoon at today's Linux Foundation Collaboration Summit with his keynote at 1:15 p.m. PT. He took a few minutes with us this morning to share what he'll be speaking about and how the MeeGo project is going."
<b>Dissociated Press:</b> "I love the concept, hate the execution. I've written about that before. Facebook encourages the kind of bad netiquette it's taken years to drum out of people. "Oh, I like this page and look - it has a 'forward to all my friends' button.""
Query optimization is an often overlooked part of applications. Sean Hull encourages at least some attention to query optimization up front and helps you identify some of the more common optimizations you may run across.
It's a challenge to adapt to change, but the changes in IBM DB2 9.7's Database Administrator authority bring significant database security benefits. Join Rebecca Bond as she shares some twists, some turns, and some clues regarding DB2 9.7's Database Administrator (DBADM) authority.
<b>Tech Source:</b> "Since our collection of Free and Open Source finance/accounting software for Linux has been quite popular, I would like to add 7 more to that list."
Join us for a free webcast tomorrow, October 23 @ 10:00 am PST as SANS presents the findings from their mobility policy survey.
-- Register here for Part 1: https://www.sans.org/webcasts/byod-security-lists-policies-mobility-policy-management-survey-95429
This is a great opportunity to see where companies are with respect to mobile access policies and overall mobile application management.
This first part is entitled: BYOD Wish Lists and Policies. Part 2 will be run on October 25th and is entitled: BYOD security practices.
-- Register here for Part 2: https://www.sans.org/webcasts/byod-security-practices-2-mobility-policy-management-survey-95434
It's possible to treat a text file as a data table, and use the standard approaches to dealing with tables, which is a major advantage in that you can use SQL to filter the text in the file. Doug Steele shows you how.
The storage networking switch maker watched its stock plummet Tuesday after it reported disappointing sales from the Ethernet business it acquired from Foundry for $3 billion in July 2008.
<b>The Register:</b> "The BBC has tried to draw a line under its decision to bar open source implementations of RTMP (real-time messaging protocol) streaming in the iPlayer, after The Register revealed the Corporation's quiet switcheroo last week."
<b>The H Open:</b> "Moodle , the E-learning platform, is one of the most significant and successful projects in open source. Despite its success, with hundreds of thousands of people being taught by courses written in Moodle, as a product it is not well known."
<b>Michael Geist:</b> "The U.S. government has released its annual Special 301 report in which it purports to identify those countries with inadequate intellectual property laws. Given the recent history and the way in which the list is developed, it will come as no surprise that the U.S. is again implausibly claiming that Canada is among the worst of the worst"