Home Blog Page 10397

Feds can’t catch Web ‘pirates’

Author: JT Smith

Inter@ctive Week reports on a federal council established more than a year ago to coordinate governmental law enforcement efforts against “intellectual property theft.” The council “has been hobbled by turf battles, threatening to keep the government hamstrung just as online piracy blossoms, industry critics said.”

17,900 lines of Java code (oh, and a book, too)

Author: JT Smith

Sebastopol, CA — 17,900 lines of densely commented, professionally
written
Java code; coverage of 20 distinct Java APIs (including servlets, JSP,
XML, Swing, and Java 2D); and 164 complete, practical examples make up
the new second edition of bestselling Java author David Flanagan’s
“Java Examples in a Nutshell” (O’Reilly, $29.95).Designed for those who learn best by example, “Java Examples in a
Nutshell” is packed with real-world programs that not only serve as
great learning tools, but can also be modified for individual use.
“Java Examples in a Nutshell” stands-alone as a terrific compilation of
hands-on examples, but it is also an excellent tutorial companion to
“Java in a Nutshell.” Add to that pairing “Java Foundation Classes in a
Nutshell” and “Java Enterprise in a Nutshell” and you have a complete
Java reference library.

“This book was a lot of fun to write,” says Flanagan. “The first
edition came out when Java 1.1 was released at more than double the
size of Java 1.0. While I was busy writing additional examples for the
second edition of “Java in a Nutshell”, the engineers at Sun were busy
turning Java into something that could no longer fit into a nutshell.
We were able to include some examples in “Java in a Nutshell”, but we
had to cut many more than we could include. The decision to create a
book devoted entirely to examples was a good one. Given the freedom to
write an entire book of examples, I was able to go into more depth than
I ever would have before, and write all the examples I really wanted to
write. I found myself really enjoying the exploration and
experimentation that went into developing these examples.”

“Java Examples in a Nutshell” doesn’t hold the readers’ hand or supply
detailed explanations of Java syntax or method calls; it simply
delivers well-commented working examples for exploring the wide range
of what’s possible with Java. Each chapter concludes with programming
exercises that suggest avenues for building further knowledge.

“Java Examples in a Nutshell” includes:

Examples that demonstrate basic Java functionality and the
essential Java APIs, including I/O, threads, networking,
security, reflection, serialization, and security;

Programs that use the graphical user interface and graphics
features of Java, highlighting the Swing, Java 2D, printing,
data
transfer, JavaBeans, and applet APIs;

Examples that illustrate key enterprise APIs in Java,
including remote method invocation (RMI), database
connectivity (JDBC), servlets, JavaServer Pages (JSP), and XML;

An example index that lets users look up a programming concept
or Java class and find any examples in the book that
demonstrate that concept or use that class.

Chapter 19, XML, is available free online at:
http://www.oreilly.com/catalog/jenut2/chapter/ch19.html.

Scour embarks on new business strategy

Author: JT Smith

The Standard has a story on Scour, a file-trading service like Napster, and its efforts to reposition itself.
“The Michael Ovitz-backed company had to
lay off most of its staff last month after a
copyright infringement lawsuit scared off
investors. Now, Scour has inked a deal
with United Devices, a Softbank-funded
distributed-computing startup, which will
pay Scour to help distribute United
Devices’ free software to the 4 million
people who trade media files with Scour
Exchange.”

Linux firewall survey: Open Source product roundup

Author: JT Smith

Linux World has the first in a series about Linux firewalls: “Security has always been a critical issue for
computer networking, and firewalls are an
essential ingredient for network security. In this
series, I will show you how Linux offers you
freedom of choice in this area. There are many
firewall solutions for Linux. Most are open source applications, but some excellent commercial
products have been ported to Linux. I’ll also show you how the Linux kernel can be used to build a
highly integrated hardware firewall.”

Category:

  • Linux

Review: Accelerated-X laptop display in Linux – duplicate

Author: JT Smith

32bitsonline has an article about Accelerated-X laptop displays in Linux. “The last Xi Graphics product I reviewed was their MaXimum CDE (Common
Desktop Environment) Developers Edition. It seemed that the ‘standard’ UNIX
GUI was bolted onto a Linux distribution of nebulous lineage and shoved out the
door to fend for itself among the heavyweights from Redhat, TurboLinux and
SUSE. The result was less than satisfying.

Thankfully, this has changed. As far as I can tell, the Xi Graphics folks are no
longer in the Linux Distribution business. It pays to stay with what you know –
and there is no one in the display server business that is as fast to market with
new drivers for the Linux and BSD crowd than Xi Graphics.”

Rijndael proposed as U.S. crypto standard

Author: JT Smith

eWeek has a followup story on Rijndael being proposed as the U.S. government encryption standard.

Category:

  • Linux

Are PCs toast? Internet appliances arrive

Author: JT Smith

From an IDG News Service story on Internet appliciances: “The new Internet Computer is the antithesis of the two MSN machines.
Its OS is Linux, running invisibly in the background. Netscape 4.73 is its
browser. Both load from a CD-ROM. The NIC is the most computerlike of the
three appliances, with a small vertical case, two stand-alone speakers, a tabletop
mouse (with mouse pad), and a full-size computer keyboard that lacks the
shortcut buttons included on the MSN Companions.”

Script kiddies must stop, or be stopped

Author: JT Smith

A column at ZDNet examines script kiddies and their potential damage to poor, little corporate America. “It’s so easy to hack now that it’s almost certain that every corporate Web site will be compromised within the next couple of years.” Also, The Associated Press reports that the FBI is pushing for cyber ethics classes in schools.

Category:

  • Linux

Why the world needs reverse engineers

Author: JT Smith

From a column at ZDNet: “(Reverse engineering) sounds backwards. It sounds devious. But it is about analysis: taking things apart, potentially breaking them, to find out how they work; opening up the hood, seeing what parts are inside and how they are connected. And, although it sounds somewhat less noble than ‘engineering,’ the world needs reverse engineers and needs them badly.”

AbriaSoft announces the release of the Abria App Pack

Author: JT Smith

AbriaSoft, the first distribution of MySQL based database
solutions for the Internet, announced
today its release of the Abria App Pack, an application package
containing popular Open Source applications that are commonly used in
conjuncture with MySQL database, from Internet Wire.