Skip to main content

Home/ Linux/ Group items tagged for

Rss Feed Group items tagged

anonymous

Vim Plugins You Should Know About, Part VII: ragtag.vim (formerly allml.vim) - good cod... - 0 views

  •  
    This is the seventh post in the article series "Vim Plugins You Should Know About". This time I am going to introduce you to a plugin called "ragtag.vim". A month ago it was still known as "allml.vim" but now it has been renamed to ragtag.vim. The best parts of RagTag are mappings for editing HTML tags. It has a mapping for quickly closing open HTML tags, a mapping for quickly turning the typed word into a pair of open/close HTML tags, several mappings for inserting HTML doctype, linking to CSS stylesheets, loading JavaScript and it includes mappings for wrapping the typed text in a pair of tags for PHP, or for ASP or eRuby, and {% .. %} for Django. RagTag is written by Tim Pope. He's the master of Vim plugin programming. I have already written about two of his plugins - surround.vim and repeat.vim and more articles about his plugins are coming!
Marc Lijour

Open Source Business Conference 2011 - 2 views

  • The Computerworld Open Source Business Conference (OSBC) is the premier forum for business and technology leaders looking for an insightful discussion of how open source technology is changing the way we do business today.
  • Matt AsayProgram Chair
  •  
    The Computerworld Open Source Business Conference (OSBC) is the premier forum for business and technology leaders looking for an insightful discussion of how open source technology is changing the way we do business today. With a rich and deep agenda built around the concept of emerging business models and the best strategies for incorporating the strategies for open source software into growing your business, OSBC makes the argument that every enterprise is, or should be, a data-driven business today.  As the IT industry's only forum for discussing how to reap profits from using open source software, OSBC brings together a vibrant group of the industry's top practitioners, venture capitalists, lawyers and thought leaders for two days of in-depth presentations and lively discussions and panels. By being the leading conference for educating top tier executives on the value of the open source market place, OSBC provides the latest in cutting-edge open source thinking. OSBC offers the change to connect with the developers, users and companies behind the most significant open source Big Data technologies, teaching attendees the strategies to making your business more effectively data-driven.
Cindy Olivia

Canon Pixma TS6020 Drivers Download | Printer Drivers Download Sofware OS Window Mac Linux - 0 views

  •  
    Canon Pixma TS6020 Printer Drivers Download for Scanner and Driver Printer Software for Mac Os X, Linux, Windows 7, Windows 8, Windows 10, Windows XP and Canon PIXMA TS6020 Photo All-In-One Printer Driver.Canon Pixma TS6020 Drivers Download. Canon Printer Drivers Pixma TS6020 Download for Scanner and Driver Printer Software for Mac Os X, Linux, Windows 7, Windows 8, Windows 10, Windows XP and Canon PIXMA TS6020 Photo All-In-One Printer Drive, Canon PIXMA TS6020 Printer Driver Download for Scanner and Driver Printer Software for Mac Os X, Linux, Windows 7, Windows 8, Windows 10, Windows XP. Canon PIXMA TS6020 Photo All-In-One Printer Driver, Canon TS6020 Driver For Mac, Canon TS6020 Wireless Setup, Canon TS6020 Manual, Canon MP Navigator Download, Canon TS6020 Printer Not Responding, Canon TS6020 Airprint, Canon TS6020 Wireless Printer Setup Mac Related Search to Canon PIXMA TS6020 Drivers Download canon TS6020 software canon pixma TS6020 manual canon TS6020 scanning canon pixma TS6020 driver download http:/
Djiezes Kraaijst

Legal Pad - Fortune on CNNMoney.com - 0 views

  • A no-fly zone to protect Linux from patent trolls
  • initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products.
  • call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group’s attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a “defensive publication.”
  • ...5 more annotations...
  • In effect, the defensive-publications initiative mounts a preemptive attack upon those who would try to patent purported software inventions that are not truly novel — i.e., innovations that are already known and in use, though no one may have ever previously bothered to document them, let alone obtain a patent on them, a process usually requiring the hiring of attorneys as well as payment of significant filing fees.
  • The Linux Defenders program is largely the brainchild of Bergelt, who took over as Open Invention Network’s CEO this past February. The program also reflects a new, more proactive role Bergelt envisions for OIN than the group has played in the past.
  • The Linux Defenders program will actually have three components. The first will be a peer-to-patent component that, like New York Law School’s existing program, will reach out to the open-source community in search of evidence of “prior art” — proof of preexisting knowledge or use of certain inventions — that can be used to challenge applications for patents that have been filed but not yet granted.
  • The second component will be a natural extension of the first, to be known as “Post-Grant Peer to Patent,” which will enlist similar community assistance in the search for prior art relevant to patents that have already actually issued. In this case, the goal would be — assuming such prior art is found — to initiate an administrative reexamination proceeding before the U.S. PTO to get the patent invalidated
  • The third component is the defensive-publications initiative.
  •  
    On Tuesday a consortium of technology companies, including IBM (IBM), will launch a new initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products. The most novel feature of the new program, to be known as Linux Defenders, will be its call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group's attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a "defensive publication."
Tim Mullins

GnoMenu for Gnome in Ubuntu Linux 9.10 Vista like Menu for Linux - 0 views

  •  
    Screencast Review of GnoMenu for Gnome in Ubuntu Linux 9.10 which is a easy to use Microsoft Windows Vista like Menu for Linux with search built into it.
Marc Lijour

Red Hat, Inc. - Red Hat Reports Third Quarter Results - 0 views

  • Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced financial results for its fiscal year 2011 third quarter ended November 30, 2010. Total revenue for the quarter was $235.6 million, an increase of 21% from the year ago quarter. Subscription revenue for the quarter was $198.8 million, up 21% year-over-year.
  •  
    RALEIGH, N.C.--(BUSINESS WIRE)-- Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced financial results for its fiscal year 2011 third quarter ended November 30, 2010. Total revenue for the quarter was $235.6 million, an increase of 21% from the year ago quarter. Subscription revenue for the quarter was $198.8 million, up 21% year-over-year.
anonymous

OOM Killer - linux-mm.org Wiki - 0 views

  •  
    The functions, code excerpts and comments discussed below here are from mm/oom_kill.c unless otherwise noted. It is the job of the linux 'oom killer' to sacrifice one or more processes in order to free up memory for the system when all else fails. It will also kill any process sharing the same mm_struct as the selected process, for obvious reasons. Any particular process leader may be immunized against the oom killer if the value of its /proc//oomadj is set to the constant OOM_DISABLE (currently defined as -17). The function which does the actual scoring of a process in the effort to find the best candidate for elimination is called badness(), which results from the following call chain: _alloc_pages -> out_of_memory() -> select_bad_process() -> badness() The comments to badness() pretty well speak for themselves:
anonymous

How to Run Android Applications on Ubuntu - Step-by-step tutorial with screenshots - So... - 0 views

  •  
    How to Run Android Applications on Ubuntu Adjust text size: June 25th, 2009, 18:04 GMT | By Marius Nestor When Google announced and released Android, back in October 2008, everyone knew that it would become the best operating system for mobile devices. Not only is Android open source, but it also comes with a Software Development Kit, which offers the necessary APIs and utilities for developers to easily build powerful applications for Android-powered mobile devices. The following tutorial was created especially for those of you who want to test the Android platform and install various applications, on the popular Ubuntu operating system. OK, so let's get started... shall we? Grab the Android SDK from Softpedia and save the file on your home folder.
hpmaxi -

How to Make Wealth - 0 views

  • Startups usually involve technology, so much so that the phrase "high-tech startup" is almost redundant. A startup is a small company that takes on a hard technical problem.
  • Here is a brief sketch of the economic proposition. If you're a good hacker in your mid twenties, you can get a job paying about $80,000 per year. So on average such a hacker must be able to do at least $80,000 worth of work per year for the company just to break even
  • and if you focus you can probably get three times as much done in an hour
  • ...30 more annotations...
  • I'm claiming you could be 36 times more productive than you're expected to be in a random corporate job.
  • then a smart hacker working very hard without any corporate bullshit to slow him down should be able to do work worth about $3 million a year
  • f you want to make a million dollars, you have to endure a million dollars' worth of pain.
  • Bill Gates is a smart, determined, and hardworking man, but you need more than that to make as much money as he has. You also need to be very lucky.
  • If you want to create wealth, it will help to understand what it is. Wealth is not the same thing as money. [3] Wealth is as old as human history. Far older, in fact; ants have wealth. Money is a comparatively recent invention.
  • talking about making money can make it harder to understand how to make money.
  • the craftsmen. Their hand-made objects become store-bought ones.
  • A programmer can sit down in front of a computer and create wealth. A good piece of software is, in itself, a valuable thing.
  • And so it's clearer to programmers that wealth is something that's made, rather than being distributed, like slices of a pie, by some imaginary Daddy
  • we had one programmer who was a sort of monster of productivity
  • A great programmer, on a roll, could create a million dollars worth of wealth in a couple weeks. A mediocre programmer over the same period will generate zero or even negative wealth (e.g. by introducing bugs).
  • The top 5% of programmers probably write 99% of the good software.
  • Hackers often donate their work by writing open source software that anyone can use for free. I am much the richer for the operating system FreeBSD, which I'm running on the computer I'm using now, and so is Yahoo, which runs it on all their servers.
  • You can't go to your boss and say, I'd like to start working ten times as hard, so will you please pay me ten times as much?
  • A programmer, for example, instead of chugging along maintaining and updating an existing piece of software, could write a whole new piece of software, and with it create a new source of revenue.
  • All a company is is a group of people working together to do something people want. It's doing something people want that matters, not joining the group
  • To get rich you need to get yourself in a situation with two things, measurement and leverage. You need to be in a position where your performance can be measured, or there is no way to get paid more by doing more. And you have to have leverage, in the sense that the decisions you make have a big effect.
  • If you're in a job that feels safe, you are not going to get rich, because if there is no danger there is almost certainly no leverage.
  • All you need to do is be part of a small group working on a hard problem
  • Steve Jobs once said that the success or failure of a startup depends on the first ten employees. I agree
  • What is technology? It's technique. It's the way we all do things. And when you discover a new way to do things, its value is multiplied by all the people who use it. It is the proverbial fishing rod, rather than the fish. That's the difference between a startup and a restaurant or a barber shop. You fry eggs or cut hair one customer at a time. Whereas if you solve a technical problem that a lot of people care about, you help everyone who uses your solution. That's leverage
  • If there were two features we could add to our software, both equally valuable in proportion to their difficulty, we'd always take the harder one
  • I can remember times when we were just exhausted after wrestling all day with some horrible technical problem. And I'd be delighted, because something that was hard for us would be impossible for our competitors
  • Start by picking a hard problem, and then at every decision point, take the harder choice.
  • You'd think that a company about to buy you would do a lot of research and decide for themselves how valuable your technology was.
  • Not at all. What they go by is the number of users you have
  • Wealth is what people want, and if people aren't using your software, maybe it's not just because you're bad at marketing. Maybe it's because you haven't made what they want.
  • Now we can recognize this as something hackers already know to avoid: premature optimization. Get a version 1.0 out there as soon as you can. Until you have some users to measure, you're optimizing based on guesses.
  • In that respect the Cold War teaches the same lesson as World War II and, for that matter, most wars in recent history. Don't let a ruling class of warriors and politicians squash the entrepreneurs
  • Let the nerds keep their lunch money, and you rule the world.
Tim M

Installing Linux Mint 9 64bit Dual Boot with Windows 7 Tutorial - 0 views

  •  
    How-to Tutorial for Installing Linux Mint 9 GNOME 64bit Edition to Dual Boot with Microsoft Windows 7. I give tips and tricks for running Linux Mint 9 for the first time user. I also show how Windows 7 still works fine after installing Linux on top of it. These instructions apply to all Ubuntu..
Marc Lijour

Red Hat: 'Yes, we undercut Oracle with hidden Linux patches' * Channel Register - 5 views

  • "We made the change, quite honestly, because we are absolutely making a set of steps that make it more difficult for competitors that wish to provide support services on top of Red Hat Enterprise Linux," Red Hat chief technology officer Brian Stevens tells The Register, before naming those competitors. "Today, there are two competitors that I'm aware of that go to our customers directly, offering to support RHEL directly for them...Oracle and Novell."
  • "The work that we've done should not impede companies from building their own versions of Linux and supporting those for their customers," he says. "All the code we deliver through RHEL is out there. In most cases, the changes that go into RHEL. We already distribute into the upstream kernel. We have an upstream-first policy, where we're developing openly and then later integrating into our tree and then delivering it. So it shouldn't at all impede the community or anybody that's in the business of competing on that."
  •  
    "We made the change, quite honestly, because we are absolutely making a set of steps that make it more difficult for competitors that wish to provide support services on top of Red Hat Enterprise Linux," Red Hat chief technology officer Brian Stevens tells The Register, before naming those competitors. "Today, there are two competitors that I'm aware of that go to our customers directly, offering to support RHEL directly for them...Oracle and Novell."
Syntacticsinc SEO

IT Solutions That Really Work - 1 views

I am planning to build up and improve my website for my business and I was thinking of choosing the best IT company that can meet my requirements for my website and optimize it to make it easier fo...

web designing

started by Syntacticsinc SEO on 24 Sep 11 no follow-up yet
anonymous

Raspberry Links (from Rafa) - 1 views

started by anonymous on 15 Jan 13 no follow-up yet
maxwux

Writing udev rules - 0 views

  • KERNELS - match against the kernel name for the device, or the kernel name for any of the parent devices SUBSYSTEMS - match against the subsystem of the device, or the subsystem of any of the parent devices DRIVERS - match against the name of the driver backing the device, or the name of the driver backing any of the parent devices ATTRS - match a sysfs attribute of the device, or a sysfs attribute of any of the parent devices
  • Rename a device node from the default name to something else Provide an alternative/persistent name for a device node by creating a symbolic link to the default device node Name a device node based on the output of a program Change permissions and ownership of a device node Launch a script when a device node is created or deleted (typically when a device is attached or unplugged) Rename network interfaces
  • KERNEL - match against the kernel name for the device SUBSYSTEM - match against the subsystem of the device DRIVER - match against the name of the driver backing the device
  • ...1 more annotation...
  • NAME - the name that shall be used for the device node SYMLINK - a list of symbolic links which act as alternative names for the device node
bryan yu

A nice webui (avalanche-rt) for rTorrent - 6 views

  •  
    I have yet to find satisfaction since I used to find webui for rtorrent. However, I recently found a nice web interface for rTorrent that was not only clean and beautiful but also contains many features. If you are interested, hurry to the following website to download it now!
mo_khamlichi

RightClickMenu alternative Mockup for Ubuntu | Unixmen - 0 views

  •  
    Right click menu on icons - in nautilus - becomes longer and longer. In example, for a folder, there are more than 20 entries. It could be difficult - especially for new users who are not accustomed with shortcuts - to realize simple actions like delete or copy a file/folder. In order to enhance interaction with icons, a right click alternative could be implemented
Scott Beamer

Pinguy OS - 4 views

  •  
    Pinguy OS an out-of-the-box working operating system for everyone, not just geeks This OS is for people that have never used Linux before or for people that just want an out-of-the-box working OS without doing all the tweaks and enhancements that everyone seems to do when installing a fresh copy of Ubuntu or other Linux based Distro's.
1 - 20 of 480 Next › Last »
Showing 20 items per page