- Linux Foundation reports Secure Boot solution
- Ubuntu 12.10
- Plasma Active 3
- Android OS Tops
- Linaro Enterprise
- Group formed for ARM architecture
- Android installed on 3 of 4 smartphones
- Community Edition of ownCloud Released
- Phusion Releases Passenger Enterprise 4
- VMware Announces Micro Cloud Foundry Changes
Welcome EditorialOct 26, 2012
I’m looking at another crop of press releases and marveling at the ever-expanding market for products that fall under the ubiquitous heading of Big Data. Big Data is everywhere. (Or is it Big Data are everywhere – to reprise that classic quandary?) Gigantic file storage appliances from vendors like Oracle and HP and software tools like Apache Hadoop continually add new building blocks to the data infrastructure. And the goal of all this? Apart from more conventional uses for scientific modeling and analysis, one of the reasons for this huge interest in accumulating data is a phenomenon known as data mining, which Wikipedia defines as a process that “attempts to discover patterns in large data sets.”more »
Security and the Open Cloud were featured at the most recent LinuxCon event.more »
Doghouse: Rio Adventure Free software favors the favelaOct 26, 2012
With Free Software, some ingenuity, and a lot of drive, a friend brings knowledge, technology, and hope to a “disadvantaged” corner of his world.more »
Kernel News New PWM SubsystemOct 26, 2012
Chronicler Zack Brown reports on the latest news, views, dilemmas, and developments within the Linux kernel community.more »
Perl – k-means Clusters Calculating clusters with AI methodsOct 26, 2012
A human observer can register clusters in a two-dimensional set of points at a glance. Artificial intelligence has a harder time getting it done; however, the relatively simple k-means method delivers usable results.more »
Ask Klaus! Klaus Knopper answers your Linux questionsSep 21, 2012
Klaus Knopper is the creator of Knoppix and co-founder of LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: email@example.com »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.