Skip to main content

Home/ Linux/ Group items tagged the

Rss Feed Group items tagged

Djiezes Kraaijst

Legal Pad - Fortune on CNNMoney.com - 0 views

  • A no-fly zone to protect Linux from patent trolls
  • initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products.
  • call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group’s attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a “defensive publication.”
  • ...5 more annotations...
  • In effect, the defensive-publications initiative mounts a preemptive attack upon those who would try to patent purported software inventions that are not truly novel — i.e., innovations that are already known and in use, though no one may have ever previously bothered to document them, let alone obtain a patent on them, a process usually requiring the hiring of attorneys as well as payment of significant filing fees.
  • The Linux Defenders program is largely the brainchild of Bergelt, who took over as Open Invention Network’s CEO this past February. The program also reflects a new, more proactive role Bergelt envisions for OIN than the group has played in the past.
  • The Linux Defenders program will actually have three components. The first will be a peer-to-patent component that, like New York Law School’s existing program, will reach out to the open-source community in search of evidence of “prior art” — proof of preexisting knowledge or use of certain inventions — that can be used to challenge applications for patents that have been filed but not yet granted.
  • The second component will be a natural extension of the first, to be known as “Post-Grant Peer to Patent,” which will enlist similar community assistance in the search for prior art relevant to patents that have already actually issued. In this case, the goal would be — assuming such prior art is found — to initiate an administrative reexamination proceeding before the U.S. PTO to get the patent invalidated
  • The third component is the defensive-publications initiative.
  •  
    On Tuesday a consortium of technology companies, including IBM (IBM), will launch a new initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products. The most novel feature of the new program, to be known as Linux Defenders, will be its call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group's attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a "defensive publication."
Marc Lijour

Open Source Business Conference 2011 - 2 views

  • The Computerworld Open Source Business Conference (OSBC) is the premier forum for business and technology leaders looking for an insightful discussion of how open source technology is changing the way we do business today.
  • Matt AsayProgram Chair
  •  
    The Computerworld Open Source Business Conference (OSBC) is the premier forum for business and technology leaders looking for an insightful discussion of how open source technology is changing the way we do business today. With a rich and deep agenda built around the concept of emerging business models and the best strategies for incorporating the strategies for open source software into growing your business, OSBC makes the argument that every enterprise is, or should be, a data-driven business today.  As the IT industry's only forum for discussing how to reap profits from using open source software, OSBC brings together a vibrant group of the industry's top practitioners, venture capitalists, lawyers and thought leaders for two days of in-depth presentations and lively discussions and panels. By being the leading conference for educating top tier executives on the value of the open source market place, OSBC provides the latest in cutting-edge open source thinking. OSBC offers the change to connect with the developers, users and companies behind the most significant open source Big Data technologies, teaching attendees the strategies to making your business more effectively data-driven.
Marc Lijour

Linux Is on the Rise For Business - PCWorld Business Center - 1 views

  • according to a report released Tuesday by the Linux Foundation in partnership with Yeoman Technology Group. With data from an invited pool of more than 1900 respondents, the survey found that 76 percent of the world's largest organizations plan to add more Linux servers over the next 12 months. By contrast, only 41 percent plan to add Windows servers, while 44 percent say they will be decreasing or maintaining the same number of Windows machines over the next year.
  • Large companies are planning to increase their reliance on Linux over the next five years
  • Looking out over five years, the difference is even more marked: A full 79 percent plan to add Linux servers over that time, while only 21 percent will add new Windows servers.
  • ...11 more annotations...
  • To understand Linux trends among the world's largest companies and government organizations, Yeoman and The Linux Foundation focused in particular on responses from a subset of close to 400 respondents representing organizations with annual revenues of $500 million or more or greater than 500 employees.
  • Sixty-six percent of the planned Linux deployments mentioned by respondents are for brand-new applications or services, while 37 percent are migrations from Windows, the survey found.
  • "We are seeing more migration at Microsoft's expense than the industry analysis might lead you to believe," McPherson noted.
  • Since Linux is free, sales-linked estimates tend to underestimate its adoption considerably.
  • this survey involves some sample bias
  • the data isn't tied to server sales the way so much industry data is
  • a full 60 percent of respondents said they're planning to use Linux for more mission-critical workloads than they have in the past
  • Lack of vendor lock-in and openness of the code were other frequently cited drivers
  • long-term viability of the platform
  • choice of software and hardware
  • n cloud contexts, meanwhile, Linux led far and away, with 70 percent naming it as their primary platform, compared with 18 percent citing Windows and 11 citing Unix
  •  
    according to a report released Tuesday by the Linux Foundation in partnership with Yeoman Technology Group. With data from an invited pool of more than 1900 respondents, the survey found that 76 percent of the world's largest organizations plan to add more Linux servers over the next 12 months. By contrast, only 41 percent plan to add Windows servers, while 44 percent say they will be decreasing or maintaining the same number of Windows machines over the next year.
anonymous

OOM Killer - linux-mm.org Wiki - 0 views

  •  
    The functions, code excerpts and comments discussed below here are from mm/oom_kill.c unless otherwise noted. It is the job of the linux 'oom killer' to sacrifice one or more processes in order to free up memory for the system when all else fails. It will also kill any process sharing the same mm_struct as the selected process, for obvious reasons. Any particular process leader may be immunized against the oom killer if the value of its /proc//oomadj is set to the constant OOM_DISABLE (currently defined as -17). The function which does the actual scoring of a process in the effort to find the best candidate for elimination is called badness(), which results from the following call chain: _alloc_pages -> out_of_memory() -> select_bad_process() -> badness() The comments to badness() pretty well speak for themselves:
maxwux

Writing udev rules - 0 views

  • KERNELS - match against the kernel name for the device, or the kernel name for any of the parent devices SUBSYSTEMS - match against the subsystem of the device, or the subsystem of any of the parent devices DRIVERS - match against the name of the driver backing the device, or the name of the driver backing any of the parent devices ATTRS - match a sysfs attribute of the device, or a sysfs attribute of any of the parent devices
  • Rename a device node from the default name to something else Provide an alternative/persistent name for a device node by creating a symbolic link to the default device node Name a device node based on the output of a program Change permissions and ownership of a device node Launch a script when a device node is created or deleted (typically when a device is attached or unplugged) Rename network interfaces
  • KERNEL - match against the kernel name for the device SUBSYSTEM - match against the subsystem of the device DRIVER - match against the name of the driver backing the device
  • ...1 more annotation...
  • NAME - the name that shall be used for the device node SYMLINK - a list of symbolic links which act as alternative names for the device node
hpmaxi -

How to Make Wealth - 0 views

  • Startups usually involve technology, so much so that the phrase "high-tech startup" is almost redundant. A startup is a small company that takes on a hard technical problem.
  • Here is a brief sketch of the economic proposition. If you're a good hacker in your mid twenties, you can get a job paying about $80,000 per year. So on average such a hacker must be able to do at least $80,000 worth of work per year for the company just to break even
  • and if you focus you can probably get three times as much done in an hour
  • ...30 more annotations...
  • I'm claiming you could be 36 times more productive than you're expected to be in a random corporate job.
  • then a smart hacker working very hard without any corporate bullshit to slow him down should be able to do work worth about $3 million a year
  • f you want to make a million dollars, you have to endure a million dollars' worth of pain.
  • Bill Gates is a smart, determined, and hardworking man, but you need more than that to make as much money as he has. You also need to be very lucky.
  • If you want to create wealth, it will help to understand what it is. Wealth is not the same thing as money. [3] Wealth is as old as human history. Far older, in fact; ants have wealth. Money is a comparatively recent invention.
  • talking about making money can make it harder to understand how to make money.
  • the craftsmen. Their hand-made objects become store-bought ones.
  • A programmer can sit down in front of a computer and create wealth. A good piece of software is, in itself, a valuable thing.
  • And so it's clearer to programmers that wealth is something that's made, rather than being distributed, like slices of a pie, by some imaginary Daddy
  • we had one programmer who was a sort of monster of productivity
  • A great programmer, on a roll, could create a million dollars worth of wealth in a couple weeks. A mediocre programmer over the same period will generate zero or even negative wealth (e.g. by introducing bugs).
  • The top 5% of programmers probably write 99% of the good software.
  • Hackers often donate their work by writing open source software that anyone can use for free. I am much the richer for the operating system FreeBSD, which I'm running on the computer I'm using now, and so is Yahoo, which runs it on all their servers.
  • You can't go to your boss and say, I'd like to start working ten times as hard, so will you please pay me ten times as much?
  • A programmer, for example, instead of chugging along maintaining and updating an existing piece of software, could write a whole new piece of software, and with it create a new source of revenue.
  • All a company is is a group of people working together to do something people want. It's doing something people want that matters, not joining the group
  • To get rich you need to get yourself in a situation with two things, measurement and leverage. You need to be in a position where your performance can be measured, or there is no way to get paid more by doing more. And you have to have leverage, in the sense that the decisions you make have a big effect.
  • If you're in a job that feels safe, you are not going to get rich, because if there is no danger there is almost certainly no leverage.
  • All you need to do is be part of a small group working on a hard problem
  • Steve Jobs once said that the success or failure of a startup depends on the first ten employees. I agree
  • What is technology? It's technique. It's the way we all do things. And when you discover a new way to do things, its value is multiplied by all the people who use it. It is the proverbial fishing rod, rather than the fish. That's the difference between a startup and a restaurant or a barber shop. You fry eggs or cut hair one customer at a time. Whereas if you solve a technical problem that a lot of people care about, you help everyone who uses your solution. That's leverage
  • If there were two features we could add to our software, both equally valuable in proportion to their difficulty, we'd always take the harder one
  • I can remember times when we were just exhausted after wrestling all day with some horrible technical problem. And I'd be delighted, because something that was hard for us would be impossible for our competitors
  • Start by picking a hard problem, and then at every decision point, take the harder choice.
  • You'd think that a company about to buy you would do a lot of research and decide for themselves how valuable your technology was.
  • Not at all. What they go by is the number of users you have
  • Wealth is what people want, and if people aren't using your software, maybe it's not just because you're bad at marketing. Maybe it's because you haven't made what they want.
  • Now we can recognize this as something hackers already know to avoid: premature optimization. Get a version 1.0 out there as soon as you can. Until you have some users to measure, you're optimizing based on guesses.
  • In that respect the Cold War teaches the same lesson as World War II and, for that matter, most wars in recent history. Don't let a ruling class of warriors and politicians squash the entrepreneurs
  • Let the nerds keep their lunch money, and you rule the world.
Content Shaping Delhi India

Getting Started with Diigolet - Diigo help - 0 views

  • Tags help you find and organize your bookmarks by letting you select all of your bookmarks with a certain tag or combination of tags. Quickly add relevant tags to a bookmark by clicking on any of the recommended tags that appear under the description field on the “Save Bookmark” pop-up. When you are satisfied with the information in the “Save Bookmark” pop-up, click the “Save Bookmark” button. Now a link to the page is stored in your Diigo library, and the information you entered is stored with it.
  • Highlight Highlighting lets you denote important information on a page, just like highlighting in a book, but with Diigo, the highlighted text will be conveniently saved to your library as well. There are some important things for me to denote on my recipe. My wife doesn’t like pineapple, my grandfather can’t have eggs or chocolate, and I don’t like coconut very much, so I highlight those items on the recipe to let me know I need to deal with them. Highlight by clicking “Highlight” on the Diigolet. Then select the text you want to highlight. The text will be visually highlighted and the text is now stored in your library. It’s that easy. Click the button again to exit highlighter mode. You can also change the color of a highlight by clicking the downward-pointing arrow next to “Highlight” and choosing a color. Colors are useful for differentiating different types of highlights. I will use a different color for each of the different people I need to consider.
  • To add a sticky note to a highlight, simply move your mouse cursor over a highlight. When the little pop-up tab with the pencil on it appears, move the cursor to it and a menu will appear. Choose “Add Sticky Notes”. Now you can type and post a sticky note just like before, but this time it will be tied to the highlighted text.
Djiezes Kraaijst

Computerworld - The A-Z of Programming Languages: BASH/Bourne-Again Shell - 0 views

  • Interviews The A-Z of Programming Languages: BASH/Bourne-Again ShellWhen the Bourne Shell found its identity
  • in this article we chat to Chet Ramey about his experience maintaining Bash.
  • In BASH's case, the problem to be solved was a free software version of the Posix standard shell to be part of the GNU system.
  • ...3 more annotations...
  • the original Bourne Shell was very influential, the various System V shell releases preserved that heritage, and the Posix committee used those versions as the basis for the standard they developed. Certainly the basic language syntax and built-in commands are direct descendants of the Bourne Shell's. Bash's additional features and functionality build on what the Bourne shell provided. As for source code and internal implementation, there's no relationship at all
  • Bash will continue to evolve as both an interactive environment and a programming language. I'd like to add more features that allow interested users to extend the shell in novel ways. The programmable completion system is an example of that kind of extension.
  • Do you have any advice for up-and-coming programmers? Find an area that interests you and get involved with an existing community. There are free software projects in just about any area of programming. The nuts-and-bolts -- which language you use, what programming environment you use, where you do your work -- are not as important as the passion and interest you bring to the work itself.
  •  
    an interview with Chet Ramey, maintainer of the bash-shell
Yi Wang

In the Beginning was the Command Line - 0 views

  • Like the Earth's biosphere, the technosphere is very thin compared to what is above and what is below.
    • Yi Wang
       
      beautiful visualization
  • fossilization process
  • temporal arbitrage.
  • ...8 more annotations...
  • Disney does mediated experiences better than anyone. If they understood what OSes are, and why people use them, they could crush Microsoft in a year or two.
  • But more importantly, it comes out of the fact that, during this century, intellectualism failed, and everyone knows it.
  • lip service
  • How badly we want it can be measured by the size of Bill Gates's fortune.
  • When TCP/IP was invented, running it was an honor reserved for Serious Computers--mainframes and high-powered minicomputers used in technical and commercial settings--and so the protocol is engineered around the assumption that every computer using it is a serious machine, capable of doing many things at once. Not to put too fine a point on it, a Unix machine.
  • Young Americans who leave their great big homogeneous country and visit some other part of the world typically go through several stages of culture shock: first, dumb wide-eyed astonishment. Then a tentative engagement with the new country's manners, cuisine, public transit systems and toilets, leading to a brief period of fatuous confidence that they are instant experts on the new country. As the visit wears on, homesickness begins to set in, and the traveler begins to appreciate, for the first time, how much he or she took for granted at home. At the same time it begins to seem obvious that many of one's own cultures and traditions are essentially arbitrary, and could have been different; driving on the right side of the road, for example. When the traveler returns home and takes stock of the experience, he or she may have learned a good deal more about America than about the country they went to visit.
  • We like plain dealings and straightforward transactions in America.
  • This would simply not be worth the effort, and so "wc" would never be written as an independent program at all. Instead users would have to wait for a word count feature to appear in a commercial software package.
anonymous

Self-Service Linux: Mastering the Art of Problem Determination - download here - 1 views

  •  
    Self-Service Linux: Mastering the Art of Problem Determination by Mark Wilding, Dan Behman Publisher: Prentice Hall PTR 2005 ISBN/ASIN: 013147751X ISBN-13: 9780131477513 Number of pages: 456 Description: The biggest factor in a company's decision to go with Linux is overcoming the support issues. This book should be an essential part of every company's Linux adoption plan to keep the total cost of ownership down and improve the ROI of their Linux strategy. It is also a book that advanced Linux professionals running their own Linux systems will be able to use to troubleshoot. This book gives the staff the basics they need to diagnose most problems that they will face and will go into the nitty-gritty on the toughest problems.    Download or read it online here: Download link    (4.4MB, PDF)
yc c

Welcome - netboot.me - 1 views

  •  
    netboot.me is a service that allows you to boot nearly any operating system or utility on any computer with a wired internet connection - without having to know ahead of time what you'll want to boot. Once you can netboot.me, you never need to update your boot disk again! In order for your computer to know where to find the netboot servers, you need to change your DHCP settings to return some extra information. The two relevant pieces of information: next-server, which should be "tftp.netboot.me", and "filename", which should be "netbootme.kpxe". How to set these settings depends on your DHCP server. For dhcpd, simply add the following to the relevant 'subnet' section of your configuration: next-server "tftp.netboot.me" filename "netbootme.kpxe" For dnsmasq, the following line in /etc/dnsmasq.conf will achieve the same effect: dhcp-boot=netbootme.kpxe,tftp.netboot.me netboot.me works through the magic of netbooting. There are a number of ways to boot a computer with netboot.me. The simplest is to download a bootable image and burn it to a CD, USB memory stick, or floppy disk. Boot off it on any networked computer, and it will automatically fetch the latest boot options from netboot.me and let you choose from dozens of installation, recovery, testing, portable desktop and other tools. You can also start netboot.me from any computer running gPXE, or from any netbootable computer with some simple tweaks to your DHCP server.
yc c

MyPaint - 6 views

  •  
    MyPaint is a fast and easy open-source graphics application for digital painters. It lets you focus on the art instead of the program. You work on your canvas with minimum distractions, bringing up the interface only when you need it. Take a look at the screenshots to see the program in action before downloading and trying it for yourself! exists for several platforms supports pressure sensitive graphics tablets extensive brush creation and configuration options unlimited canvas (you never have to resize) basic layer support MyPaint comes with a large brush collection including charcoal and ink to emulate real media, but the highly configurable brush engine allows you to experiment with your own brushes and with not-quite-natural painting. Before beginning it is a good idea to read the quick-start tutorial to see how the program is meant to be used. You can also visit the MyPaint Wiki.
anonymous

Wikipedia:Everything you always wanted to know about Bad Jokes and Other Deleted Nonsen... - 0 views

  • Linus Torvalds facts Linus Torvalds facts are a series of humorous sayings regarding Linus Torvalds. Some of them include: Linus Torvalds edited this page. Linus Torvalds can program without a keyboard Since 1969, the year Linus Torvalds was born, software quality has increased 19.000 percent. The commonest definition of the word programmer is Linus Torvalds Linus Torvalds didn't learn from the University of Helsinki the University of Helsinki learned from Linus Torvalds. Linus Torvalds finished the Linux Kernel the day before he started on it. Linus Torvalds once developed a programming language so good that it makes python look like punch cards. Linus Torvalds doesn't need to boot. Linus Torvalds first written program had artificial intelligence. Linus Torvalds doesn't receive error messages. There is no theory of probability, just a list of events that Linus Torvalds allows to occur. Linus Torvalds doesn't use a monitor. He can read the video signals from a VGA cable with his finger. Linus Torvalds can write to ntfs. Linus Torvalds can install gentoo in under a day. When Linus Torvalds writes new software, he just makes punch cards with his teeth and feeds them into a reader. Linus Torvalds source codes compile themselves. When Linus Torvalds learned to program, the computer printed HELLO, WORLD by itself. Linus was considered as being old and stable at 24, but new and bleeding edge at 26 Linus surfs the web using nothing but netcat Linus Torvalds can play 3D games in his head by interpreting the source code in real-time. Being touched by Linus can cure carpal tunnel syndrome. He does not cure RMS because he thinks it's funny to listen to RMS dictating code for the HURD. Linus Torvalds only wears glasses to make him seem more human. Linus Torvalds can fluently converse with setup wizard. They play basketball on Sundays. Linus Torvalds is the only known entity capable of uploading pure pleasure. Linus Torvalds can read your computer registry from any given point in the world, through any material. Linus Torvalds takes one look at your desktop and knows which porn sites you visited. In the last ten years.
  •  
    Like the infamous Chuck Norris Facts, only with a lot more nerd and a lot less guns.
samonjur

Keywodrs is very important for every website. - 0 views

  •  
    Simply how much targeted traffic are you currently shedding mainly because an individual never have identified several unexpected yet potent keywords and phrases? Choosing the clear keywords and phrases to your internet pages is easy. And also obtaining connected, high-demand and also low-supply keywords and phrases which can be potent to your web site just isn't too much once you begin making use of Wordtracker. Yet think about people keywords and phrases which can be actually unexpected? Think about keywords and phrases you'll by no means consider, yet which may have the particular prospective to operate a vehicle thousands of fresh visitors to your internet site?Pleasant to be able to Wordtracker Search term Study AccountsBeing a Wordtracker client, you are going to right away acquire totally free usage of the most notable 1, 000 keywords and phrases used throughout the key engines like google : equally short-term and also long-term.And also for a few internet marketers, which is adequate.Nonetheless it just isn't adequate should you have identified the actual prospective regarding working together with one of the most searched-for or perhaps freshly growing keywords and phrases on the web.Significant web marketers and also SEARCH ENGINE MARKETING specialists which are seeking development final results consider Wordtracker's Search term Study Record alternatives: from your Top, 000, entirely for the Leading 20 thousand phrases.Just how these kinds of accounts supply development final resultsCheck our own Search term Study Accounts throughout. Try to find hugely well-known, or perhaps freshly growing phrases and words that might be utilized to make huge amounts regarding fresh targeted traffic.How can this kind of perform? You're not trying to find well-known keywords and phrases that may deliver folks inside from the "front door" of your distinct web site. You are interested in undiscovered jewels that will deliver a large amount regarding targeted traffic inside
anonymous

12 More of the Best Free Linux Books - Part 1 - LinuxLinks News - 0 views

  •  
    "12 More of the Best Free Linux Books Many computer users have an insatiable appetite to deepen their understanding of computer operating systems and computer software. Linux users are no different in that respect. At the same time as developing a huge range of open source software, the Linux community fortunately has also written a vast range of documentation in the form of books, guides, tutorials, HOWTOs, man pages, and other help to aid the learning process. Some of this documentation is intended specifically for a newcomer to Linux, or those that are seeking to move away from a proprietary world and embrace freedom. There are literally thousands of Linux books which are available to purchase from any good (online) book shop. However, the focus of this article is to highlight champion Linux books which make an invaluable contribution to learning about Linux, and which are also available to download without charge. We have tried to select a fairly diverse selection of books in this article so that there should be something of interest here for any type of user whatever their level of computing knowledge. This article should be read in conjunction with our previous article on free Linux books, entitled 20 of the Best Free Linux Books."
mikeitt

5 Methods to Find Out Which Group a User Belongs to in Linux | 2daygeek.com - 0 views

  • All system users are listed in the /etc/passwd file, the groups are listed in the /etc/group file, and the actual password is stored in the /etc/shadow file.
    • mikeitt
       
      All system users are listed in the /etc/passwd file, the groups are listed in the /etc/group file, and the actual password is stored in the /etc/shadow file.
    • mikeitt
       
      All system users are listed in the /etc/passwd file, the groups are listed in the /etc/group file, and the actual password is stored in the /etc/shadow file.
1 - 20 of 605 Next › Last »
Showing 20 items per page