Hardware Detection Dynamic device management with Udev, HAL, and D-BusOct 01, 2008
Udev, HAL, and D-Bus provide automated hardware configuration, even if you plug in on the fly. We'll help you easily access new devices.more »
The U.S. chip producer Atheros has decided to forward the development of Linux drivers for the 802.11a/b/g-WLAN chip by making the Hardware Abstraction Layer code (HAL), available under an open source license.more »
A bug in the series 2.6.27-rc Linux kernel can permanently damage Intel's e1000e Gigabit Ethernet card. Linux distributor Mandriva offers a few suggestions -- and not only to its own customers.more »
The openSUSE project warns owners of systems containing the Intel e1000e gigabit Ethernet card against using the actual Beta 1 of openSUSE 11.1 instead of the Linux kernel version. The Linux version can permanently damage the card.more »
In a New York press conference, Google and T-Mobile partnered with hardware vendor HTC to announce the release of the first mobile phone for Google's Android platform.more »
At the IFA consumer electronics show in Berlin, Germany, (August 29-September 3), Chinese hardware vendor HiVision showcased a Linux laptop that is to cost a mere $98.more »
Dell plans to put more netbooks on the market soon, starting with the Inspiron 910.more »
Starting shortly, Dell will be supplying its Linux computers with Ubuntu 8.04.more »
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.