Recent Changes - Search:
NTLUG

Linux is free.
Life is good.

Linux Training
10am on Meeting Days!

1825 Monetary Lane Suite #104 Carrollton, TX

Do a presentation at NTLUG.

What is the Linux Installation Project?

Real companies using Linux!

Not just for business anymore.

Providing ready to run platforms on Linux

Show Descriptions... (Show All) (Single Column)







  • Red Hat: 2015:1021-01: java-1.5.0-ibm: Important Advisory
    LinuxSecurity.com: Updated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Important security [More...]


  • Red Hat: 2015:1020-01: java-1.7.1-ibm: Critical Advisory
    LinuxSecurity.com: Updated java-1.7.1-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 6 and 7 Supplementary. Red Hat Product Security has rated this update as having Critical security [More...]







  • Russia Eyes Linux-Based Smartphone OS for Mobile Market
    Russia may soon adopt the Linux- and Mer-based SailFishOS as the basis for a home-grown mobile and smartphone operating system. Linux—or a form of it, at least—and other open source programs soon could be playing a bigger role in the mobile and tablet market in Russia. And it has concerns over spying by the NSA to thank.


  • How to setup Raspberry Pi as Backup Server for Linux and Windows Desktops
    The Raspberry Pi is a series of small single-board computers. They are rather cheap and are well suited for running a backup server or voip server. This tutorial describes the complete installation of the Raspberry PI from downloading and installing Raspian, the installation and configuration of Samba and how to backup Windows and Linux Desktops on the Raspberry Pi.


  • Ubuntu & the Windows Subscription Gambit
    This would allow Microsoft to offer its operating system at no cost to OEMs — eliminating the Windows tax. Purchasers of new machines would receive a free year’s subscription to Windows, complete with Windows Cloud Storage and MS Office sub-Basic. Eleven months into use, nag screens appear at boot: “Your Windows subscription will expire in 30 days. Click here to renew.”



  • How to convert users to Linux
    I have converted many users, including my wife, to Linux in the past 10 years and and I am still going strong. If you do it right, Linux will do a better job for your users than Mac OS X or Windows … if you do it right.


  • Dr Hjkl on the Command Line
    The first time I used vi was in a college programming course. It was the default editor on the computer lab's UNIX systems we used to compile our assignments. I remember when our professor first introduced vi and explained that you used the hjkl keys to move your cursor around instead of the arrow keys.




  • How to mount an LVM partition on Linux
    LVM is a logical volume management tool which allows you to manage disk space using the notion of logical volumes and volume groups. The biggest benefit of using LVM over classic partitions is the flexibility in allocating storage for users and applications without being constrained by the size of individual physical disks.


  • How I Got Here: Marcus Ranum
    Dennis Fisher talks with security pioneer Marcus Ranum about writing an early Internet firewall at DEC, the security gold-rush era of the 1990s and early 2000s, why he never patented most of the ideas he has come up with and how he found peace of mind.


  • NSA Planned to Hijack Google App Store
    The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals.



  • How open source disrupted the CMS market
    Open source is increasingly changing the software industry. We can see open source products gaining market share in almost every category today, and this development is continuing at a fast pace.read more



  • Measuring performance the open source way
    Jim Whitehurst recently wrote about the performance management approach we use at Red Hat†for the Harvard Business Review. In his article, Whitehurst details one aspect of the performance management process that differentiates Red Hat from other companies—its flexibility.read more



  • How Design Philosophy Influences GNOME and KDE
    Linux desktop users have two main sets of utilities: KDE's and GNOME's. The GNOME utilities are found in GNOME, MATE, Cinnamon and Unity. Neither KDE nor GNOME has any objective advantage over the other, but the user experiences are so different that they could almost be two different operating systems.


  • Ubuntu 15.10 will be released in October
    In today's open source roundup: Ubuntu 15.10 will be released on October 22. Plus: Chrome for Android is now mostly open source. And infighting may be hurting the Linux community.


  • Rig a smarthome and more hacks with TouchBoard
    There was a time when a reporter was called a hack. This term referred to their ability to hack away on a typewriter to create a story on a short deadline. Somewhere in the 1950’s MIT’s Railroad Club adopted the term when they saw a cool use of technology. Railroads help to build the world and spread commerce across the globe. This was a proud term, a name for an action that you could be pleased to have been associated with. Then, somewhere that hack name because used for criminal internet activity.read more


Error: It's not possible to reach RSS file http://www.newsforge.com/index.rss ...


  • Our Faith In Horses
    We love horses like no other animal. Because, like no other animal that we think we can control, we can’t control them. We’re given proof of this time and again.


  • In Defense Of Doing Wrong
    This is the most facile statement you hear from people [when they talk about privacy]: “I’ve done nothing wrong; I’ve got nothing to hide.” It is “the lyrical dream of the transparent glass house.”


  • The Return Of 'Made In The USA'
    Beyond surveys, which only measure attitudes at a single point in time, is there rigorous evidence that people really care where things are made? The answer of marketing and communication scholars: unequivocally, yes.



  • In Fresno, A Community-Policing Ethos Builds Ties Between Officers And Residents
    Not long ago, the Hispanic residents of this gang-ridden neighborhood in Southwest Fresno would not have voluntarily spoken to a police officer, much less attended a police-sponsored block party and taken photos with the chief. But over the past decade, a sustained policing initiative marked by community meetings, Christmas gifts and dozens of neighborhood events has fundamentally altered police-resident relations.





  • David Letterman Finale Draws Almost 14 Million Viewers In Ratings
    David Letterman closed out his 33 years in late-night television on Wednesday with one of the highest-rated shows of his career. “The Late Show” brought in 13.7 million viewers, Mr. Letterman’s biggest audience since February 1994. It also beat every network show in prime time on Wednesday.







  • Flavor Flav Arrested In Vegas, Suspected Of Impaired Driving
    Flavor Flav was arrested in Las Vegas early Thursday on allegations of driving under the influence, speeding, possessing less than an ounce of marijuana and having an open container of alcohol in the 2005 black BMW he was driving, authorities said.



  • Why Chrome Uses So Much Freaking RAM
    Chrome may be the best browser around, but it eats up your PC’s RAM like turkey on Thanksgiving. If you’ve ever looked at your task manager, you’ve probably flipped out at the sheer number of Chrome processes and the memory they hog. Here’s why Chrome uses so much RAM, and how to curb its gluttony.





  • Six People Are Locked In A Dome On A Volcano, Pretending To Live On Mars
    On the north slope of the Mauna Loa volcano on Hawaii sits a small geodesic dome funded by the University of Hawaii, Cornell and NASA since 2013. For the last six and a half months, this dome has been home to six crew members, part of the third, and penultimate, round of isolation missions planned there.


  • Say 'Hebbo!' To Tarvuism
    In the way back year of 2008 someone made up a joke religion called Tarvuism. What is it? We have no idea. All we know is that it's so easy to join.







  • Cruise Control
    Your one-stop shop for health and safety data on cruise ships.



  • We're All Using These Emoji Wrong
    Turns out I don’t have the first clue what the hell I’m doing. But then, neither do you. We’re all doing emoji wrong. Horribly, horribly wrong.











  • Why We Should Let The Pantheon Crack
    John Ochsendorf wants to tear down Rome’s iconic Pantheon. He wants to pull apart its 2,000-year-old walls until its gorgeous dome collapses. Destroying it, he believes, is the best way to preserve it.


  • HIV Non-Disclosure Laws Do More Harm Than Good
    The United Nations aims to diagnose 90 percent of all†HIV†infections worldwide by 2020, deliver antiretroviral therapy to 90 percent of those who test positive, and suppress the virus in 90 percent of those treated. If these goals are met, the†AIDS†epidemic could be over by 2030.†Regrettably, our legal system has not kept pace with these advances.



  • The Best Segments From Letterman's Final Episode
    Legendary host David Letterman taped his last episode of "The Late Show" last night, capping off 33 years as the gold standard in late night television. Here are the best parts of his star-studded final show.


  • How To Know If Your Expensive Wine Is Fake
    Maureen Downey has become a top wine fraud investigator, helping to rid the wine industry of counterfeit and stolen wine. Downey met Bloomberg at Wingtip in San Francisco, where she showed us how to tell if that $200,000 bottle in your cellar is a fake.


  • The US Wants To Regulate Surveillance Software Like Weapons
    Today, the United States is moving towards making sure surveillance software doesn’t fall into the wrong hands. But according to security experts, the proposed rules are too broad and are likely to interfere with research, therefore making computer systems less secure in the long run.


  • 1776: The Revolt Against Austerity
    What made the Declaration of Independence so offensive to British politicians then, and what makes it highly relevant to Europeans and Americans today, is that America’s founders offered a blueprint for a different kind of state response to fiscal crisis.



  • Organized Crime And The Japanese Right Wing
    "Uyoku dantai" are Japanese nationalist right-wing groups of which there are over 1,000 in Japan with about 100,000 members in total. VICE caught up with Masaya Kudo, a Right-Wing activist and leader of his own group, "Nihon-no-Kai" as he explained his philosophies and concerns regarding the Right-Wing movement today and their ties to the Yakuza.



  • The Octopus Can See With Its Skin
    Octopus skin contains a light-sensitive pigment found in eyes, suggesting that these clever cephalopods can “see” without using theirs.



  • The True Blues And The Tiger Eyes Vs. The Ku Klux Klan
    The Ku Klux Klan was quite popular in the young, formerly Confederate state of Oklahoma and was used to doing whatever they felt was righteous. The Klan was responsible for crime and violence, despite some members’ involvement with law enforcement.


  • We Stepped Into 'The Void'
    Like most people keeping an eye on virtual reality, I watched the sizzler video released by "The Void" (the fully immersive, mixed reality gaming experience) †and thought a few things in succession. Number one: That would be badass. Number two: Who the hell are these guys? And finally: I wonder if they’ve actually built any of this.




  • The Future Of Retail
    Traditional merchants and digital-first retailers are figuring out the store of the future.


  • Can China Take A Joke?
    Stand-up comedy is catching on in the country, even if people still aren’t quite sure when to laugh.




  • NSA Planned To Hijack Google App Store To Hack Smartphones
    Advocatus Diaboli writes: A newly released top secret document reveals that the NSA planned to hijack Google and Samsung app stores to plant spying software on smartphones. The report on the surveillance project, dubbed "IRRITANT HORN," shows the U.S. and its "Five Eyes" alliance: Canada, the United Kingdom, New Zealand and Australia, were looking at ways to hack smartphones and spy on users. According to The Intercept: "The top-secret document, obtained from NSA whistleblower Edward Snowden, was published Wednesday by CBC News in collaboration with The Intercept. The document outlines a series of tactics that the NSA and its counterparts in the Five Eyes were working on during workshops held in Australia and Canada between November 2011 and February 2012."
             

    Read more of this story at Slashdot.


  • Musical Organ Created From 49 Floppy Disk Drives
    ErnieKey writes: A youth club in Germany, called Toolbox Bodensee, has created an unusual musical organ. It is constructed of 49 floppy disk drives all of which combine to play quite a unique sound. It has the ability to be played manually or act as a playback device. If you have a bunch of old floppy drives and want to assemble your own organ, the 3D print files are available for free download on Thingiverse.
             

    Read more of this story at Slashdot.


  • DNA On Pizza Crust Leads To Quadruple Murder Suspect
    HughPickens.com writes: In a case straight out of CSI, CNN reports that police are searching for the man suspected in the gruesome slayings of the Savopoulos family and their housekeeper, after his DNA was purportedly found on a pizza crust at the scene of the quadruple murders. They discovered his DNA on the crust of a Domino's pizza — one of two delivered to the Savopoulos home May 14 as the family was held hostage inside — a source familiar with the investigation said. The pizza apparently was paid for with cash left in an envelope on the porch. The next morning, Savvas Savopoulos's personal assistant dropped off a package containing $40,000 in cash at the home, according to the officials and police documents.   The bodies of Savopoulos, along with his wife, Amy, their 10-year-old son Philip and the family's housekeeper, Veralicia Figueroa, were discovered the afternoon of May 14 after firefighters responded to reports of a fire. D.C. Police Chief Cathy Lanier says the killings are likely not a random crime and police have issued an arrest warrant for the 34-year-old Daron Dylon Wint, who is described as 5'7 and 155 lbs and might also go by the name "Steffon." Wint apparently used to work at American Iron Works, where Savvas Savopoulos was CEO and president. The neighborhood is home to numerous embassies and diplomatic mansions as well as the official residence of Vice President Joe Biden and his wife. "Right now you have just about every law enforcement officer across the country aware of his open warrant and are looking for him," says Lanier. "I think even his family has made pleas for him to turn himself in."
             

    Read more of this story at Slashdot.


  • Gravitational Anomalies Beneath Mountains Point To Isostasy of Earth's Crust
    StartsWithABang writes: Imagine you wanted to know what your acceleration was anywhere on Earth; imagine that simply saying "9.81 m/s^2" wasn't good enough. What would you need to account for? Sure, there are the obvious things: the Earth's rotation and its various altitudes and different points. Surely, the farther away you are from Earth's center, the less your acceleration's going to be. But what might come as a surprise is that if you went up to the peak of the highest mountains, not only would the acceleration due to gravity be its lowest, but there'd also be less mass beneath your feet than at any other location.
             

    Read more of this story at Slashdot.


  • Netgear and ZyXEL Confirm NetUSB Flaw, Are Working On Fixes
    itwbennett writes: In follow-up to a story that appeared on Slashdot yesterday about a critical vulnerability in the NetUSB service, networking device manufacturers ZyXEL Communications and Netgear have confirmed that some of their routers are affected and said they are working on fixes. ZyXEL will begin issuing firmware updates in June, while Netgear plans to start releasing patches in the third quarter of the year.
             

    Read more of this story at Slashdot.


  • YouTube Live Streams Now Support HTML5 Playback and 60fps Video
    An anonymous reader writes: YouTube today announced that it is rolling out HTML5 playback and has added 60fps live streaming to allow users to broadcast in real time. "When you start a live stream on YouTube at 60fps, we'll transcode your stream into 720p60 and 1080p60, which means silky smooth playback for gaming and other fast-action videos," YouTube said in a statement. "We'll also make your stream available in 30fps on devices where high frame rate viewing is not yet available, while we work to expand support in the coming weeks."
             

    Read more of this story at Slashdot.


  • What Was the Effect of Rand Paul's 10-Hour "Filibuster"?
    An anonymous reader writes: Sen. Rand Paul held up a vote on the Fast Track Authority for an eleven hour dissertation on the flaws of: the Patriot Act, the replacement the USA Freedom Act, bulk data collection including credit card purchases, the DEA and IRS's use of NSA intel. for "parallel construction", warrant-less GPS bugs on vehicles, as well as the important distinction of a general warrant versus a specific one. "There is a general veil of suspicion that is placed on every American now. Every American is somehow said to be under suspicion because we are collecting the records of every American," Paul said. The questions is what did the "filibuster" really accomplish? The speeches caused a delay in Senate business but it's unclear what larger effect, if any, that will have.
             

    Read more of this story at Slashdot.


  • Security Researchers Wary of Wassenaar Rules
    msm1267 writes: The Commerce Department's Bureau of Industry and Security today to implement the controversial Wassenaar Arrangement, and computer security specialists are wary of its language and vagaries. For starters, its definition of "intrusion software" that originally was meant to stem the effect of spying software such as FinFisher and Hacking Team, has also apparently snared many penetration testing tools. Also, despite the Commerce Department's insistence that vulnerability research does not fall under Wassenaar, researchers say that's up for interpretation.
             

    Read more of this story at Slashdot.


  • Australian ISP Offers Pro-bono Legal Advice To Accused Pirates
    New submitter thegarbz writes: As covered previously, after losing a legal battle against Dallas Buyers Club and Voltage Pictures the Federal Court of Australia asked ISP iiNet to hand over details of customers allegedly downloading the movie The Dallas Buyers Club. iiNet has now taken the unprecedented move to offer pro-bono legal advice to all of its customers targeted over piracy claims. "It is important to remember that the Court's findings in this case do not mean that DBC and Voltage's allegations of copyright infringement have been proven," Ben Jenkins, financial controller for iiNet wrote. Also, as part of the ruling the court will review all correspondence sent to alleged copyright infringers in hopes to prevent the practice of speculative invoicing. Unless it can be proven exactly how much and and with how many people a film was shared the maximum damages could also be limited to the lost revenue by the studio, which currently stands at $10AU ($7.90US) based on iTunes pricing.
             

    Read more of this story at Slashdot.


  • Student Photographer Threatened With Suspension For Sports Photos
    sandbagger writes: Anthony Mazur is a senior at Flower Mound High School in Texas who photographed school sports games and other events. Naturally he posted them on line. A few days ago he was summoned to the principal's office and threatened with a suspension and 'reporting to the IRS' if he didn't take those 4000 photos down. Reportedly, the principal's rationale was that the school has copyright on the images and not him.
             

    Read more of this story at Slashdot.


  • Academics Build a New Tor Client Designed To Beat the NSA
    An anonymous reader writes: In response to a slew of new research about network-level attacks against Tor, academics from the U.S. and Israel built a new Tor client called Astoria designed to beat adversaries like the NSA, GCHQ, or Chinese intelligence who can monitor a user's Tor traffic from entry to exit. Astoria differs most significantly from Tor's default client in how it selects the circuits that connect a user to the network and then to the outside Internet. The tool is an algorithm designed to more accurately predict attacks and then securely select relays that mitigate timing attack opportunities for top-tier adversaries.
             

    Read more of this story at Slashdot.


  • Ask Slashdot: Career Advice For an Aging Perl Developer?
    New submitter ukrifleman writes: I've been doing UK based perl, JS, light PHP and JQUERY dev plus Centos/Debian sys admin on a freelance basis for over a decade now. Mostly maintaining older stuff but I also undertook a big, 3 year bespoke project (all written in legacy non OO perl). The trouble is, that contract has now finished and all the legacy work has dried out and I've only got about 2 months of income left! I need to get a full time job. To most dev firms I'm going to look like a bit of a dinosaur, 40 odd years old, knows little of OO coding OR modern languages and aproaches to projects. I can write other languages and, with a bit of practice I'll pick them up pretty quickly. I really don't know where to start. What's hot, what's worth learning, I'm self-taught so have no CS degree, just 15 years of dev and sys admin experience. I've got a bit of team and project management experience too it's quite a worry going up against young whipper snappers that know all the buzz words and modern tech! Am I better off trying to get a junior job to start so I can catch up with some tech? Would I be better off trawling the thousands of job sites or finding a bonafide IT specialist recruitment firm? Should I take the brutally honest approach to my CV/interviews or just wing it and hope I don't bite off more than I can chew? What kind of learning curve could I expect if I took on a new language I have no experience with? Are there any qualififcations that I NEED to have before firms would be willing to take me on? I've been sitting here at this desk for 10 years typing away and only now do I realise that I've stagnated to the point where I may well be obsolete!
             

    Read more of this story at Slashdot.



  • Stanford Researcher Finds Little To Love In Would-Be Hacker Marketplace
    An anonymous reader writes: What if there were an Uber for hackers? Well, there is. It's called Hacker's List, and it made the front page of the New York Times this year. Anyone can post or bid on an 'ethical' hacking project. According to new Stanford research, however, the site is a wreck. 'Most requests are unsophisticated and unlawful, very few deals are actually struck, and most completed projects appear to be criminal.' And it gets worse. 'Many users on Hacker's List are trivially identifiable,' with an email address or Facebook account. The research dataset includes thousands of individuals soliciting federal crimes.
             

    Read more of this story at Slashdot.


  • CareFirst Admits More Than a Million Customer Accounts Were Exposed In Security Breach
    An anonymous reader writes with news, as reported by The Stack, that regional health insurer CareFirst BlueCross BlueShield, has confirmed a breach which took place last summer, and may have leaked personal details of as many as 1.1 million of the company's customers: "The Washington D.C.-based firm announced yesterday that the hack had taken place in June last year. CareFirst said that the breach had been a 'sophisticated cyberattack' and that those behind the crime had accessed and potentially stolen sensitive customer data including names, dates of birth, email addresses and ID numbers. All affected members will receive letters of apology, offering two years of free credit monitoring and identity threat protection as compensation, CareFirst said in a statement posted on its website." Free credit monitoring is pretty weak sauce for anyone who actually ends up faced with identity fraud.
             

    Read more of this story at Slashdot.



  • Celebrating 20 years of juicy Java. Just don’t mention Android
    A remarkable past, and a clouded future
    Oracle is celebrating 20 years of Java, which was officially announced at the SunWorld conference in San Francisco on May 23 1995. Java 1.0a2 was made available to download. In addition, Netscape’s Marc Andreessen came on stage to announce that Java would be integrated into the Navigator web browser.…




  • Factory reset FAILS in 500 MEEELLION Android phones
    Cambridge boffins recovered crypto keys, plus Google and Facebook tokens
    Cambridge University boffins Laurent Simon and Ross Anderson say half a billion Android phones could have data recovered and Google accounts compromised thanks to flaws in the default wiping feature.…





  • Big sales growth nothing to do with NSA fears - Huawei top brass
    Chinese kit-maker has stolen Europe from the yanks
    Chinese kit-maker Huawei isn't apportioning swelling sales outside the Middle Kingdom to NSA snooping fears, more that double digit growth in Europe is related to brand recognition a decade after it up shop there.…





  • EXT4 filesystem can EAT ALL YOUR DATA
    RAID bug can corrupt the filesystem, patches incoming, caution advised
    Flaws have been found in the EXT4 filesystem that can cause data loss when running Linux 4.0 and higher.…


  • Snowden latest: NSA planned sneak attacks on Android app stores
    Agencies also hid major flaws in UC Browser
    The latest package of documents from whistleblower Edward Snowden details how the intelligence services planned to host man-in-the-middle attacks to install tracking and control software onto Android smartphones.…





  • Singapore to trial 10Gbps home broadband
    Take that Google cable, and weep Australia
    Singapore's dominant telco, Singtel, has announced a pilot deployment of 10Gbps broadband to a select group next quarter, and says that it expects the blistering fast Internet service to be generally available by the later part of this year.…




  • New Windows 10 Build 10122 aims to fix file association hijacking
    Smoother and more stable, but Start menu and tablet issues remain
    Microsoft has released a new build of Windows 10, named 10122, which includes an effort to fix file association hijacking, where a newly installed application becomes the default for opening documents with a particular extension, such as PDF, docx, jpg or MP3.…


  • 404 Boss not found — Bye bye ICANN CEO Chehade
    Surprise decision will likely see him leave before critical transition
    ICANN CEO Fadi Chehade has surprised the internet community by announcing he will step down from the job after just three years in the post.…




  • Governance the key if you don't want mobile workers escaping your control
    On the move but not on the loose
    Mobile computing is great. No longer are we chained to our desks when using technology and doing proper work. Not only are laptops getting smaller, lighter and cheaper, it is also possible to do real, productive stuff even more freely using phones and tablets.…





  • Backpage child sex trafficking lawsuit nixed thanks to 'internet freedoms'
    Judge: Communications Decency Act trumps indecent ads
    A judge has dismissed a lawsuit brought against a classified ads site used by pimps to facilitate underage prostitution, arguing that the “internet freedom” of website operators trumped the rights of three girls who were trafficked and raped.…









  • Choose Deutsche Telekom for all your bargain spying needs
    Cable company helped NSA spy on Vienna for a decade, says Austrian MP
    An Austrian newspaper has published what it claims is evidence that Deutsche Telekom spied on Vienna for German spooks for the miserly sum of just €6,500 a year.…


  • King's Bounty (1990): Enter the kleptomaniac dragon
    Employ a mighty army, locate a symbolic staff
    Antique Code Show So as Witcher 3: The Wild Hunt stakes its claim as RPG of the millennium, I figured it’s time to look back on a turn-based fantasy questing classic of yesteryear, which definitely doesn’t feature any stuffed unicorn sex.…





  • NASA plots interplanetary cubesat swarms
    Lots of small, cheap probes can tell us more than one big, expensive, probe
    NASA has revealed it is working on CubeSat Application for Planetary Entry Missions (CAPE), a plan to use small satellites to explore the solar system.…


  • Hacker launches ransomware rescue kit
    Steady, breathe: The wrong click could turn servers to brick
    Security bod Jada Cyrus has compiled a ransomware rescue kit to help victims decrypt locked files and avoid paying off crooks.…


  • Intel wants containers to be alone again, naturally
    VT-x virtualisation extensions pressed into service improving container security
    Intel's taken its turn trying to advance containerisation technology by announcing a new approach to container security.…


  • Mobiles at school could be MAKING YOUR KID MORE DUMBER
    Instant messaging and Candy Crush Saga in class creates learning not-spots
    Restricting smart watch and mobile phone use can be a low-cost policy to reduce educational inequalities. This is the conclusion of a report by Louis-Philippe Beland and Richard Murphy working at the London School of Economics Centre for Economic Performance (pdf) and Louisiana State University.…


  • Delphix offers a mask for your data
    Acquisition protects customer info from dev teams
    Data virtualisation outfit Delphix is looking to the acquisition of Axis Technology Software to let enterprise developers work with real data, while protecting the personal information that data represents.…




  • HP looks set to ditch 3Com-spawn H3C Tech
    Tsinghua Unigroup to scoop remnants of once-mighty Ethernet pioneer
    H3C, a networking business that started life as a joint venture between 3Com and Huawei but is now owned by HP, is to become a majority-owned subsidiary of the state-controlled Tsinghua Unigroup.…


  • Extreme Networks restructures again, promises SDN pivot
    Global workforce to be cut by 18 per cent in search of savings
    The indifferent revenue growth and ongoing losses announced earlier this month are having the usual effect on vendor Extreme Networks: it's announced a restructure.…


Page last modified on November 02, 2011, at 04:59 PM