Search This Blog

Wednesday, October 27, 2010

Hackers Use Open Source Too; Ubuntu moves away from GNOME

Ubuntu moves away from GNOME | Cloud Drives Server Prices ... Up?

Network World Linux and Open Source

Forward this to a Friend >>>


Hackers Use Open Source Too
Alan Shimel: Two well-known jailbreaking tools are going open source. Read More


RESOURCE COMPLIMENTS OF: Intel

Rapid Innovation with Open Source
Intel's Open Source involvement is enabling end-customers to achieve the maximum benefits from Intel architecture. Click to continue

WHITE PAPER: Emerson Network Power

Keys to Successful Data Center Resource Management
A lack of centralized, meaningful operating data has created a dilemma for data center management: optimize for efficiency or availability, but not both. Learn how real-time visibility into rack-, row- and facility-level operating conditions can help you to determine the real capacity limits of your data center. Read Now.

Ubuntu moves away from GNOME
Joe Brockmeier: The big news at the Ubuntu Developer Summit? Moving to Unity as the default interface for Ubuntu Desktop with Natty Narwhal (11.04), rather than GNOME Shell. Read More

Cloud Drives Server Prices ... Up?
Scott Crenshaw: Conventional wisdom says that clouds are built on inexpensive commodity servers. So I find it interesting that the leading server vendors have been investing in high-end server platforms targeting large cloud deployments. Read More

Makers, Users and Buyers of Open Source Software
Stephen Walli: The FUD of lawsuits continues unabated. Understanding your relationship to a project lets you ask the right questions. Read More

How many balls can you juggle?
Stephen Spector: For those of you who have never had the pleasure of releasing an open source software product I thought I would let you in on a secret - IT IS VERY PAINFUL. Read More


WHITE PAPER: Vyatta

Network Virtualization Planning Guide
While hypervisors can offer basic layer of switching functionality, they do nothing to provide the additional layer of security and traffic management that is required to properly manage and protect a virtual infrastructure. Read now!

The Joy and Pains of Releasing Open Source Software
Stephen Spector: How many balls can you juggle? Being in charge of a FOSS project will test you. Read More

Breaking the code in wacky product codenames
Michael Adams: Codenames for new IT products can be so odd. How they were chosen is often just as weird. Read More

Android vendors concede tablet market to Apple
Joe Brockmeier: I'm about ready to throw in the towel on Android tablets out of sheer frustration. Read More

One Year Later Metasploit Moves to an Open Core
Alan Shimel: It was just a year ago that Rapid7 makers of a vulnerability management tool acquired the Metasploit open source penetration testing project. Read More


WHITE PAPER: Tripwire

The Benefits of Continuous Compliance
This paper covers key strategies for PCI DSS compliance and examines reasonable risk management, automating compliance, and compliance challenges in a virtualized environment. Read Now.

Motorola adds Android, iPhone support to mobile management
Motorola announced management support for Android smartphones and iPhones in its latest software management tool, known as Mobility Services Platform 3 Control Edition. Read More

Google's Android Market hits 100,000 apps
Jon Brodkin: Android still trails iPhone store's 250,000 apps but the Android Market has apparently just surpassed the 100,000 applications mark. Read More

Google Gingerbread man's arrival fuels Android update anticipation
The arrival of a giant Gingerbread man statue on Google's Mountain View campus signals that the next version of the Android operating system is probably just around the corner. Read More

Visit the Open Source Subnet home page for more news
Visit the Open Source Subnet home page for daily news items, blogs, discussions and podcasts of interest to enterprise open source users. Follow Open Source Subnet on Twitter @OSSubnet. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The world's coolest data centers
Data centers need to be secure, temperature controlled, spacious, redundant, reliable – nothing sexy. But that doesn't mean they can't be. Here are a few that rise above the crowd and take advantage of the possibilities.

10 spooky Halloween iPhone apps
iPhone app developers have been working overtime this year to help you transform your favorite device into a high-tech scarephone. Have they succeeded? We'll let you be the judge of these 10 spoooooooky iPhone apps.

MOST-READ STORIES

  1. Steve Jobs' business card from 1979
  2. Google CEO Schmidt: Google implants aren't ready yet
  3. Open source report: Ubuntu moves away from GNOME
  4. Kinetic long-term privacy issues daunting?
  5. How to protect against Firesheep attacks
  6. Firesheep's a huge hit with amateur hackers
  7. Firefox add-on Firesheep brings hacking to the masses
  8. Hey, you with the open Wi-Fi: You're an idiot
  9. 25 new IT companies to watch
  10. .Com deemed the riskiest TLD, wrests title from Cameroon

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: