Short bio: Computer Scientist, FOSS supporter (read more)
Tux Machines (TM)-specific
The KDE Users and Administrators Conference has finished after two successful days of talks, discussion and partying.
The collective fear that consumer identities may be stolen can mean opportunity, but many advocates question whether some new services are taking advantage of growing fears. "Making money on identity theft is a growth industry and it's just not pretty."
Last month, Elinor Mills, a writer for CNET News, a technology news Web site, set out to explore the power of search engines. When the article appeared the company reacted in a way suited to a 16th-century monarchy. But two months prior, it was Mr. Schmidt who had explained his company's ambitions so boldly: "When we talk about organizing all of the world's information, we mean all."
Don't get me started on spam. But the other day, scanning the dregs of my spam filter, there was this one that stood out from the hundreds. It raised images of stressed-out and distraught military families stunned by the message that their bank accounts had been breached.
The Game Boy Micro is so small...
You already know that the Game Boy Micro is small when you hear people tell you that it's just barely bigger than the cartridge that fits into it, but you don't really get a sense for just how small it is until you get your hands on it. Your thumb just about dwarfs it.
There are many faces of Linux, a term which has come to mean many things. One problem with all this nomenclature is that it is very confusing. How do you know when someone says Linux what they are talking about?
The US Justice Department said the charges target an operation that sent out tens of millions of unsolicited e-mails with sexually explicit embedded images and links to pornographic websites.
It is the end for the proprietary platform in the enterprise, according to Red Hat general manager Max McLaren. "Our market is currently the Unix to Linux migration, so we still have a long, long way to go before we are completely sated and have to go after any other market."
RATHER THAN rely on reporters coming to see AMD after keynote speeches, the smaller chip company - known as Cheapzilla - had human bots in on the sessions.
The author and customers of a spyware program face charges and stiff penalities for violation of computer privacy laws.
When popular BitTorrent tracker sites were targeted last December, some wondered if the tracker logs and other data would fall into the hands of the Motion Picture Association of America. The answer was yes!
A man faces 20 years prison and $250,000 in fines for defrauding perspective car buyers thru online auction house Ebay.com.
Following yesterday's rousing KDE e.V. meeting, aKademy 2005 officially kicked off today with dual presentation tracks filled with content designed for users and system administrators.
Once a distro goes into beta 3, most of the major choices are in place. In looking at the 3rd testing versions of distributions, one can get a fairly good idea of what a distro might be like once it's released. The only experience I've had with a BSD clone or derivative was with my PC-BSD review some months ago. That install was as simple as 1, 2, 3... or click, click, click. I'd heard the horror stories about other BSD installs, yet downloaded 6.0 beta 3 with hope. Was this going to be a brain-burning, hair-pulling, data-losing proposition? What happened with my attempted FreeBSD 6.0 Beta 3 install?
Every once in a while, there will be an announcement somewhere about a Mandriva deployment, usually in Europe, most likely in France. I have begun to wonder if this nation-centric approach to distributing Linux distros might not be the best approach for Linux as a whole.