Showing headlines posted by dave
« Previous ( 1 ... 257 258 259 260 261 262 263 264 265 266 267 ... 595 ) Next »Lack of trained admins affects Linux take-up: HP exec
The lack of skilled administrators is to some extent a hurdle in the way of companies adopting Linux on the desktop, HP's Linux chief technology officer, Bdale Garbee, said yesterday.
Linux in Government: Will Schwarzenegger Terminate Windows?
If he can see the predators hiding in the political jungle, he may.
O, SUSE, and a great big pile of money
Overstock.com has a saying: "It's All About the O." But for Vice President of Technology Shawn Schwegman and his IT staff, it's all about the SUSE.
Dave Whitinger: Inventing Linux News Reporting
Dave's return to the limelight started with his new site, LXer.com. After some preliminary catching up, he finally agreed to do an intervew with me. Out of the Linux spot light, he has created web sites such as Dave's Garden, the largest database of plant listings and images in the world. He admits his passion for Linux, though. Fortunately we have him back.
Report from KDE World Summit, Day 8: End of the marathon
Day eight of aKademy marked the end of the coding marathon. As though restless with their desktop, KDE hackers turned their attention to a tutorial in live cracking, an impromptu demonstration of command line tools, and a brief rootkit panic. Despite the shift in focus, I found some time to talk to some members of the documentation team about their plans.
Email Sender ID: It's like Kerberos all over again
We received a lot of interesting feedback in comments and email as a result of the story we ran last week on Email Sender ID: the hype and the reality." Many of those who contacted us are intimately acquainted with the subject matter, having had personal, first-hand involvement in the process to date. One of those was Yakov Shafronovich, who co-chaired the Anti-Spam Research Group during 2003, when the group was considering this very issue, prior to passing it on to the IETF. That led to an exchange of email messages during which I got a much clearer look at how Microsoft is once again embracing, extending, and attempting to encumber open source technology. Doggone it, it looks like Kerberos all over again.
Securing Web services: Foundations and specifications
Web services, by definition, are particularly vulnerable to breaches in security. The flow of potentially sensitive data not only between machines, but between enterprises and across untrusted networks, presents the need for special attention to areas such as message confidentiality, message integrity, authentication, and authorization. Additionally, since Web services are well suited to business-to-business communications and cooperation, there should be some way to enforce trust relationships between business partners. Finally, Web services are used not only by humans, but by other Web services as well. The high degree of automation required for interaction between Web services requires well-designed software architectures, preferably built upon well-designed standards.
« Previous ( 1 ... 257 258 259 260 261 262 263 264 265 266 267 ... 595 ) Next »