Search

Results 1-20 of 2137 for Richard Adhikari.

Shenanigans Alleged on Road to OOXML Vote

After a long and bitter battle, Microsoft's Office Open XML appears to have finally been accepted as a standard for open documents by the International Organization for Standardization. Or has it? The ISO is not going to make an official announcement until Wednesday. However, ECMA International, a p...

MacBook Air, Vista Box PWNd – Ubuntu Stands Alone

After three days of attacks by leading hackers, a laptop running Ubuntu remained untouched while two others, running Mac OS X and Windows Vista Service Pack 1, succumbed. The attacks were launched at the CanSecWest PWN 2 OWN contest in Vancouver, Canada. This was sponsored by security firm TippingPo...

AT&T Mobilizes Television on Two New Handsets

AT&T will launch AT&T Mobile TV on Qualcomm's MediaFLO in May. The service will be available on two new handsets available exclusively at AT&T, the LG Vu and the Samsung Access. AT&T Mobile TV will offer full-length TV content and sporting events from CBS Mobile, Comedy Central, ESPN...

Google Plays Openness Card to Slip Broadband Between TV Channels

Having induced the Federal Communications Commission to open up the C block of wireless spectrum at the recent wireless auction, Google is now seeking access to another set of airwaves in pursuit of openness. This time, it wants to open up the unlicensed parts of the TV broadcast spectrum, the so-ca...

Database Engine Flaw Makes Word Attachments Dangerous

Don't open that Word file attached to your e-mail; it might contain malware. And don't click on that e-mail or Web site links from strangers. Heck, don't even open Word e-mail attachments from trusted sources unless you're expecting them. Attackers are embedding malware in Word documents that causes...

Virtual Appliances: A Safety Zone in the Virtual Environment

As corporations increasingly virtualize their environmenst, they are finding that traditional physical security and network applications are not adequate for their needs. "Most network security solutions are based on custom-made ASICs running customized software, and don't provide adequate security ...

Microsoft Fashionably Late to Virtualization Party

Battling furiously to catch up to market leader VMware in the hypervisor market, Microsoft has unveiled what it calls a "feature-complete" version of its Hyper-V product. A hypervisor is a virtualization platform that lets multiple operating systems run on one host computer at the same time. Hyper-V...

Android, Schmandroid: Linux on the iPhone

Since its launch, renegade developers have been working to make the iPhone a Linux workstation, porting tools to the device. And why not? It has enough RAM and hard disk space to make the work worthwhile. "My iPhone has 16 GB of disk space, 128 MB of RAM, a 600-plus MHz processor and a much better d...

Intel, Microsoft: The Future of Computing Is Parallel

Laying the groundwork for their continued business health, Intel and Microsoft have coughed up $20 million to fund research into desktop and mobile parallel computing for consumers and businesses. The money, to be paid out over the next five years, will be split evenly between new research centers a...

The Virtualization Challenge, Part 5: Virtualization and Security

The concept of virtualization is so relatively new that there's a lot of uncertainty as to just how and where to implement security. "The debate goes back and forth; like any technology, you can argue that virtualization makes things more secure or less secure," Kevin Epstein, vice president of prod...

Intel Maps Out Course to Eight-Core Nehalem

Intel this week laid out its lineup of new products, which take dead aim at some of the latest hot buttons in computing. One is the Dunnington CPU, with six cores, which will be introduced in the second half of this year, and will support FlexMigration, a technology that allows live virtual machine ...

China Blacks Out YouTube After Tibetan Riot Videos Appear

As Tibetans -- led by Buddhist monks -- rioted in the capital city of Lhasa, burning Chinese-owned businesses and attacking Chinese, Beijing clamped down on YouTube and other media outlets depicting the violence. The trouble began a week ago, when Buddhist monks demonstrated peacefully March 10 on t...

Acer Enters Blue Period With Stylish High-End Notebook

Just 10 months after launching its Gemstone line in May 2007, Acer has introduced refinements to that line's design, unveiling two new notebooks in the Aspire Gemstone Blue line, the 6950 and the 8950. Both are equipped with a Blu-ray Disc drive, full high-definition LCD screens and native 16:9 reso...

YouTube Gives Developers Video Takeout Option

YouTube has opened up its application programming interfaces to the world. This will let developers build what amounts to their own mini-YouTubes on their Web sites, blogs or Wikis. "We now support upload, other write operations and internationalized standard feeds," wrote Stephanie Liu of the YouTu...

The Virtualization Challenge, Part 4: Implementing the Environment

Before you implement a virtualized environment, you have to plan. A lot. Not only must you map out what you need to and can virtualize, but you must also step back and take virtualization as part of an enterprise-wide strategy. "It's a commonly held belief that, because you're virtualizing, all your...

AI Program Thinks Like a 4-Year-Old

Researchers at the Rensselaer Polytechnic Institute have created a reasoning virtual 4-year-old child. The "child," named "Eddie," can reason about his own beliefs to draw conclusions in a manner that matches human children of that age. To test Eddie's reasoning powers, the group created a demo in S...

Capturing the Elusive URL: There’s Gotta Be a Better Way

Everywhere you look today, you're hit right between the eyes with an URL. They pop up in TV ads, in ads on the big screen, on billboards, posters, soup cans, cereal boxes, on the sides of buses -- just about anywhere. If you see one that's interesting, and have pen and paper to hand, you may jot it ...

Bridging the Linux Gap for Windows Admins

Xandros, which makes intuitive Linux solutions and tools to manage mixed environments, announced two new products that will make it easier for Windows systems administrators to manage Linux platforms in their IT environment. One is the Xandros BridgeWays Management Console for Red Hat Enterprise Lin...

Microsoft Gives Web Devs New Tools in IE8 Beta

Microsoft has released Internet Explorer 8 beta 1, four months ahead of schedule. The browser is aimed at developers, the software giant said, but anyone can download the beta from its sites. It was originally scheduled to be released in June. Microsoft announced the release at its annual Mix 08 con...

Microsoft Invites Researchers to Tinker With ‘Singularity’ OS

Five years after it began work on Singularity, an operating system research project focused on constructing dependable systems, Microsoft has released a research development kit to the academic and research community. The terms of the license make Singularity free software, not open source software....

Which most influences your decision to accept a LinkedIn invite from a stranger?
Loading ... Loading ...

LinuxInsider Channels