October 2006 | Archive by Month | SearchEnterpriseLinux.com | Page 2

October 2006

  • Linux desktop driver woes: Laying blame, lobbying, coping

    Driver support is a sore spot, a very sore spot, for any organization using or considering a migration to Linux desktops. It's a pain for longtime Linux users too. In fact, many Linux desktop advoc...

  • MySQL's Marten Mickos on GPLv3 and automated enterprise monitoring

    MySQL CEO Marten Mickos wants the everyday DBA to become more powerful. In this interview, he tells SearchOpenSource.com about automated monitoring technology in the new MySQL Enterprise that does ...

  • Ajax everywhere: Which framework to choose?

    Writing and debugging Ajax, a JavaScript- and XML-driven development technique, can be difficult. In this tip, an expert introduces several frameworks like Prototype and Scriptaculous, to ease prog...

  • Check out IBM POWER5, Linux and virtualization

    If you're not ready to give up Unix completely, consider using IBM's POWER5 architecture, which supports Linux and Unix.

  • Should you dump Unix for Linux?

    The need for modernization and cost reduction, or a change in leadership, may mean migration away from your existing Unix platform. If your company is the type to scale horizontally and you're unco...

  • Sybase ASE 15 diagram

    Sybase expert Mich Talebzadeh has created a diagram of Sybase ASE 15's architecture for those who need a quick reference.

  • Author dishes on SELinux enhancements to RHEL5

    The reason SELinux is complex is because Linux is a full-featured OS that requires it, said one expert. The next version of Red Hat Linux aims to simplify things with out-of-the-box policy modules ...

  • Developing OSS apps

    Open source issues and strategies expert Don Rosenberg explains why developing your own open source app can be beneficial.

  • OSSEC: The server and agent model

    Get the benefit of regular alerts and status reports from configuring open source IDS/IPS OSSEC to run as a server and agent model.

  • Converting SQL Server procedure to MySQL 5.0

    MySQL expert Scott Noyes provides code on how to convert a procedure from SQL Server 2000 to MySQL 5.0.

  • Sybase ASE: Performance benefits of DPL and DRL

    Take advantage of data page locking (DPL) and data row locking (DRL), two categories of data only locked (DOL) tables in Sybase ASE. These functions offer improved table scans, decreased logical I/...

  • Host intrusion detection with OSSEC

    Keep your corporate network secure with open source OSSEC, an intrusion detection and prevention services tool that provides host agent and file integrity agent capabilities on Windows and Linux. I...

  • Nmap and the open source debate

    Nmap -- a mature, open source network mapping and exploration tool -- could win over companies resistant to open source software, says IT consultant Michael Cobb in this tip.

  • Linux on 64-bit blades: Choosing the right servers and distributions

    Mix Linux and 64-bit blades well, and you'll get super performance, stability and flexibility, says consultant Patrick Green. Here, he offers tips on how to avoid compatibility mishaps.

  • OSS benefits for government agencies

    Open source issues and strategies expert Don Rosenberg explains the benefits of open source software to government agencies.

  • Ubuntu Linux: Server and desktop

    Exploring different Linux distributions? Check out Ubuntu, a Debian-based Linux distribution whose name is derived from a Zulu word meaning "humanity towards others."

  • Open Season: Google searches code

    Google launches Google Code Search; Fonality scoops up world's largest Asterisk-based community in trixbox.

  • Migrating from Unix-Linux in 7 steps

    Make sure you've got all your bases covered with this checklist on the process of migrating from Unix to Linux.

  • IP addressing and subnetting: What network administrators need to know

    David Davis follows up his tip on binary-to-decimal conversions with a practical, in-depth look at IP addressing and subnetting. He discusses how IP addresses work, subnet masks, classful vs. class...

  • Mozilla still looking into Firefox flaw claims

    Although two hackers confessed that the JavaScript vulnerability they found was a hoax, Mozilla still wants to be sure.