<b>Tech Source:</b> "Do you feel jealous of your Android-using friends? Are you sick and tired of your iPhone's locked up OS? Are you fearless enough to install Android on the iPhone?"
<b>LWN.net:</b> "The deployment of Linux on the desktop and in the server room is well served by the general-purpose distribution. In the embedded world things are very different: although Linux is used widely, the concept of the general-purpose distribution is much less in evidence."
<b>Linux Planet:</b> "OpenOffice.org isn't the only game in town for open source word processing. One of the best, and underexposed, open word processors is AbiWord."
The MySQL EXPLAIN statement provides insight into MySQL's query execution plans. This video demonstrates how you can use this powerful feature to boost your MySQL database performance.
The MySQL EXPLAIN statement provides insight into MySQL's query execution plans. This video demonstrates how you can use this powerful feature to boost your MySQL database performance.
As the transition from Yahoo's advertising system to Microsoft's adCenter approaches, users of Yahoo's tools wonder aloud whether key features they like will make the transition, too.
Two new products, Forefront Protection 2010 and Active Directory Federation Services 2.0, are designed to provide secure collaboration for users of Microsoft's SharePoint.
<b>IT World:</b> "Look around you. If you're in an office or coffee shop where people are using Windows, chances are someone's PC is now, or recently has been, part of a botnet."
Microsoft's big mobile announcement was all about 7 Series, but the company hasn't said what's going to happen longer term with Windows Mobile 6.5, which just debuted in October.
L-Soft's Listserv has been providing email list management to enterprises nearly as long as Windows has been an OS. Despite a complicated setup and configuration, for organizations looking for mailing list power and flexibility, Listserv is one for the short list.
When it comes to securing the enterprise, much of what is done has been in vogue for so long and makes sense on the surface. But probe a bit deeper, and much of what has long been held sacrosanct now makes little sense.
The social networking site has plenty of security problems of its own making to resolve and, in the interim, professional cyber thieves are exploiting other vulnerabilities.
<b>Packt:</b> "We will begin by creating the terrain for the underwater environment. In the sequel of the article, we will learn how to add vegetation, pebbles and corals. After which we will discuss how to add distant terrains, lighting effects and finally composition."
<b>Zona-M:</b> "How do you quickly create a spreadsheet where, for example, every other line has a background of a different color? Here are a couple of methods"
<b>Packt:</b> "In order to demonstrate Django's rapid development potential, we will begin by constructing a simple, but fully-featured, e-commerce store. The goal is to be up and running with a product catalog and products for sale, including a simple payment processing interface, in about half-an-hour."