Home 2011

Yearly Archives: 2011

A screengrab of Magzter website

Digital Magazine Store Magzter Uses Open Source to Slash Costs

0
A mobile digital magazine newsstand goes the open source way to cut its initial investments, and allow publishers to share digital editions of their...
Is the World's Cheapest Tablet worth it?

Aakash: A Historical Mistake?

0
India created history (of sorts) recently by launching the world's cheapest tablet, Aakash. It almost looked like we'd conquered the world... till the reality...
Hmm... time to debug

GDB: Logging Function Parameters, Part 1

2
Sometimes an application's release version crashes in particular scenarios, but the debug version does not -- and to make matters worse, the call-trace gets...
C'mon it's Lisp programming time again!

Lisp: Tears of Joy, Part 6

0
Lisp has been hailed as the world's most powerful programming language -- but only the top percentile of programmers use it, because of its...
USB Devices in Linux

Device Drivers, Part 12: USB Drivers in Linux Continued

67
The 12th part of the series on Linux device drivers takes you further along the path to writing your first USB driver in Linux...
Managing open source in an agile software development process

Agile Software Development Made Faster, More Secure

1
While the value proposition that open source offers to agile software development teams is tremendous, the enterprises adopting these tools may still inadvertently get...
Storing all that!

nexenta: Bringing Enterprise Storage to the Open Source World

0
This article discusses some of the challenges and technologies related to data storage, and introduces the Nexenta Core Platform, which is an OS based...
Openfiler

Storage Management using Openfiler, Part 4

2
In the previous article in the series on Openfiler, we discussed configuring RAID. Here, we will proceed with the installation and configuration of iSCSI....
UDP time

The Socket API, Part 4: Datagrams

1
Let's try to develop server clients using UDP, the protocol behind some important services like DNS, NFS, etc. UDP, the User Datagram Protocol, is a...
Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

0
With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With...