Skip to main content

Home/ Linux/ Group items tagged processes

Rss Feed Group items tagged

Eric Wettstein

Linux 2.4 Packet Filtering HOWTO: How Packets Traverse The Filters - 0 views

  • For ASCII-art fans, the chains are arranged like so: (Note: this is a very different arrangement from the 2.0 and 2.2 kernels!) _____ Incoming / \ Outgoing -->[Routing ]--->|FORWARD|-------> [Decision] \_____/ ^ | | v ____ ___ / \ / \ |OUTPUT| |INPUT| \____/ \___/ ^ | | ----> Local Process ---- The three circles represent the three chains mentioned above. When a packet reaches a circle in the diagram, that chain is examined to decide the fate of the packet. If the chain says to DROP the packet, it is killed there, but if the chain says to ACCEPT the packet, it continues traversing the diagram.
Djiezes Kraaijst

Ubuntu 8.04 LTS vs. Windows XP SP3: Application Performance Benchmark « Moham... - 0 views

  • Ubuntu 8.04 LTS vs. Windows XP SP3: Application Performance Benchmark
  • I’ll try to discover how a 2008 edition of Ubuntu Linux will perform against the 2001-born Windows XP fortified with 7 years of bug-fixing and 3 Service Packs.
  • To sum-up, I’d say that Windows XP SP3 is a very solid performer and it beats the default Ubuntu in anything related to multi-media processing. This only adds to the misery of Linux in this domain as it still struggles with proprietary codecs and lacks a proper HD support
  • ...1 more annotation...
  • On the other hand, Ubuntu is a big-time winner in multi-tasking which reflects how well it handles system resources. It also out-performs Windows in hard disk performance thanks to its support for EXT3 file system.
Djiezes Kraaijst

Legal Pad - Fortune on CNNMoney.com - 0 views

  • A no-fly zone to protect Linux from patent trolls
  • initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products.
  • call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group’s attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a “defensive publication.”
  • ...5 more annotations...
  • In effect, the defensive-publications initiative mounts a preemptive attack upon those who would try to patent purported software inventions that are not truly novel — i.e., innovations that are already known and in use, though no one may have ever previously bothered to document them, let alone obtain a patent on them, a process usually requiring the hiring of attorneys as well as payment of significant filing fees.
  • The Linux Defenders program is largely the brainchild of Bergelt, who took over as Open Invention Network’s CEO this past February. The program also reflects a new, more proactive role Bergelt envisions for OIN than the group has played in the past.
  • The Linux Defenders program will actually have three components. The first will be a peer-to-patent component that, like New York Law School’s existing program, will reach out to the open-source community in search of evidence of “prior art” — proof of preexisting knowledge or use of certain inventions — that can be used to challenge applications for patents that have been filed but not yet granted.
  • The second component will be a natural extension of the first, to be known as “Post-Grant Peer to Patent,” which will enlist similar community assistance in the search for prior art relevant to patents that have already actually issued. In this case, the goal would be — assuming such prior art is found — to initiate an administrative reexamination proceeding before the U.S. PTO to get the patent invalidated
  • The third component is the defensive-publications initiative.
  •  
    On Tuesday a consortium of technology companies, including IBM (IBM), will launch a new initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products. The most novel feature of the new program, to be known as Linux Defenders, will be its call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group's attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a "defensive publication."
Sandy John

Offshore Custom Application Development Outsourcing Company India - 0 views

  •  
    To achieve the benefits of a software application, no longer you need to change your processes. Cyber Futuristics has a well-defined and mature offshore application development company India which comprises the complete Software Development Business. We offers all IT Enabled Services like .NET application development, custom application development, software application development, offshore software development, E-Business Application development, Custom Software Solutions and all other software application development services related to application development.
Yi Wang

In the Beginning was the Command Line - 0 views

  • Like the Earth's biosphere, the technosphere is very thin compared to what is above and what is below.
    • Yi Wang
       
      beautiful visualization
  • fossilization process
  • temporal arbitrage.
  • ...8 more annotations...
  • Disney does mediated experiences better than anyone. If they understood what OSes are, and why people use them, they could crush Microsoft in a year or two.
  • But more importantly, it comes out of the fact that, during this century, intellectualism failed, and everyone knows it.
  • lip service
  • How badly we want it can be measured by the size of Bill Gates's fortune.
  • When TCP/IP was invented, running it was an honor reserved for Serious Computers--mainframes and high-powered minicomputers used in technical and commercial settings--and so the protocol is engineered around the assumption that every computer using it is a serious machine, capable of doing many things at once. Not to put too fine a point on it, a Unix machine.
  • Young Americans who leave their great big homogeneous country and visit some other part of the world typically go through several stages of culture shock: first, dumb wide-eyed astonishment. Then a tentative engagement with the new country's manners, cuisine, public transit systems and toilets, leading to a brief period of fatuous confidence that they are instant experts on the new country. As the visit wears on, homesickness begins to set in, and the traveler begins to appreciate, for the first time, how much he or she took for granted at home. At the same time it begins to seem obvious that many of one's own cultures and traditions are essentially arbitrary, and could have been different; driving on the right side of the road, for example. When the traveler returns home and takes stock of the experience, he or she may have learned a good deal more about America than about the country they went to visit.
  • We like plain dealings and straightforward transactions in America.
  • This would simply not be worth the effort, and so "wc" would never be written as an independent program at all. Instead users would have to wait for a word count feature to appear in a commercial software package.
Marc Lijour

An anthropologist's view of an open source community | opensource.com - 3 views

  • Diana noted that while 75% of the survey respondents in the study agreed that the contributors make up a community, she was more curious what the other 25% thought
  • "Setting up a login, setting up an SSL key, and contributing was a little daunting at first. That process could be simplified," said one interviewee.
  • High on the list of reasons were learning for the joy of learning and collaborating with interesting and smart people. Motivations for personal gain, like networking or career benefits, were low on the list.
  • ...1 more annotation...
  • Mainly I contribute just to make it work for me.
Marc Lijour

it@school - 0 views

  • Today, the Project is termed as the "Single largest simultaneous deployment of FOSS based ICT education in the world."
  • The Project functions on Free Software platform since it provides the freedom to an individual to study, copy, modify and re-distribute any content, a process which would ultimately benefit the whole society.
Content Shaping Delhi India

Getting Started with Chrome extension - Diigo help - 0 views

  • Use the “Save” option to bookmark a page. Bookmarking saves a link to the page in your online Diigo library, allowing you to easily access it later.
  • Highlighting can also be accomplished from the context pop-up. After the Chrome extension is installed, whenever you select text on a webpage, the context pop-up will appear, allowing you to accomplish text-related annotation. Highlight Pop-up Menu – After you highlight some text, position your mouse cursor over it and the highlight pop-up menu will appear. The highlight pop-up menu allows you to add notes to, share, or delete the highlight.
  • Sticky Note Click the middle icon on the annotation toolbar to add a sticky note to the page. With a sticky note, you can write your thoughts anywhere on a web page.
krowddigital

What is Cyber Security? - 1 views

  •  
    Cyber security is a combination of technology, processes, and practices to protect networks, devices and programs
krowddigital

What is Information Security (InfoSec)? - 2 views

  •  
    Information security (sometimes known as InfoSec) is the term used to describe organizations' processes and tools to secure information.
‹ Previous 21 - 33 of 33
Showing 20 items per page