This is a little old but I thought iI would go ahead and throw something on my site. .
Novell has published additional details about its agreements with Microsoft concerning Windows and Linux interoperability and patents. It seems the company is receiving an up-front payment of $348 million from Microsoft, for SLES subscription "certificates" and for patent cross-licensing. Spread the word: digg this story In Novell's Form 8-K submission to the SEC (Security and Exchanges Commission), Entry into a Material Definitive Agreement, the company states that "Under the Business Collaboration Agreement, which expires January 1, 2012, Novell and Microsoft will market a combined offering. The combined offering will consist of SUSE Linux Enterprise Server (SLES) and a subscription for SLES support along with Microsoft Windows Server, Microsoft Virtual Server and Microsoft Viridian that will be offered to customers desiring to deploy Linux and Windows in a virtualized setting."
What exactly does this mean? Hard to say at this point. Is this strange? Not as strange as one might initially think. If you recall, Microsoft did something very similar with Apple a few years back.
The Full Story Here
More for my geek friends. This is old news but if you haven't heard.
Microsoft and Zend Technologies Announce Technical Collaboration to Improve Interoperability of PHP on the Windows Server Platform / 10 / 2006 / Announcements / Zend News / Company / Zend.com
REDMOND, Wash., and CUPERTINO, Calif. â€” Oct. 31, 2006 â€” Microsoft Corp. and Zend Technologies Inc. today announced a technical collaboration to enhance the experience of running the PHP scripting language on Windows ServerÂ® 2003. The parties expect to extend the collaboration to the next version of Windows Server, code-named â€œLonghorn.â€ The resulting technology enhancements and ongoing interaction with the PHP community is expected to enable customers to take advantage of the Windows Server platform. The cooperative effort seeks to provide customers with richer functionality and better integration, resulting in improved performance and increased reliability.
Continue reading Microsoft and Zend
I had mentioned these guys in an earlier posting and just thought I would let anyone know who might have used it, TheOpenCD Project just released version 2.0 with updated programs as well as some new ones, well worth the download for Windows users.
It was Poway Day today in our little part of sunny California. Please check out all the pictures.
I thought this was kind of cool so I figured I would share it with everyone. The San Diego Blood Bank, in conjunction with local credit unions, had an â€œ11 Days Of Remembranceâ€ from September 1st to the 11th in honor of the heroes from 9/11. Basically you went down and donated blood. Now I had never done this before but I went through with it. Anyways, just about everyone at the credit union I am working at decided to contribute in one way or another so we decided to take the opportunity for a photo op and put the picture up on our website.
Well, apparently the San Diego Blood Bank got wind of it and got a copy of the picture and placed it on their site as well. So, like I said I thought it was kind of cool to get that type of acknowledgement so I grabbed a screen shot of it to keep. Check it out since the website will probably be changed to something else by the time you read this.
I get asked a lot what programs should a person absolutely have on their computer. The answer varies a lot depending on what you are going to be doing with the computer and exactly what type of computer you have. But let me address the most general â€œneed to haveâ€ application for the most typical users.
For the most part, my friends and family use some form of Microsoft Windows computer. First step is to make sure you are up-to-date with all the Patches. You can accomplish this simply by going to Microsoftâ€™s Update site . This is a MUST first step. If you are running Windows XP make sure you install Service Pack 2.
OK once your system is up-to-date, youâ€™ll need a Firewall (unless you installed XP Service Pack 2 which enables its firewall), Anti Virus, some software to kill Spyware, and youâ€™ll most likely want some sort of Office Suite. Now there are commercial versions of all this software, however I am going to point you to Freeware and Open Source solutions instead. [side note] Itâ€™s important to understand that there is a distinct difference between Freeware and Open Source [/side]
I guess before we proceed, I should make sure you have at least some understanding of what you are getting when you use freeware/open source and make sure you are comfortable with this as your solution. Personally, I have no problem recommending these solutions but I do not guarantee their performance. OK real quick, freeware is defined as â€œCopyrighted software given away for free by the author. Although it is available for free, the author retains the copyright, which means that you cannot do anything with it that is not expressly allowed by the author. Usually, the author allows people to use the software, but not sell it.â€ Where as Open Source is â€œa program in which the source code is available to the general public for use and/or modification from its original design free of charge, i.e., open. Open source code is typically created as a collaborative effort in which programmers improve upon the code and share the changes within the community. Open source sprouted in the technological community as a response to proprietary software owned by corporations.â€
Continue reading Protection and Productivity You Can Afford
Had a strange error message on one of the sites I manage. It said "Fatal error: Call to undefined function: pn_dbmsgerror()". This is a Post Nuke CMS system and the error occurred after a reboot to the physical server and we made some space on a partition that had filled up.
Turned out the problem was a corrupted table in the Post Nuke database. The table _referer got twisted and didn't know what it wanted to do with itself. This table is only used for tracking where people come from who visit your site, so since I had a back up of the database, I just nuked the table and copied over the table from the back up database. That got everything up and running again perfectly.
This is a great article that shows you how to really harness some of the power of VIM. I snagged it from Builder.com.
It was a multiple part article so this is going to be kind of long but really filled with a lot of great information.
If you're a developer working on a UNIX/Linux platform, you've already encountered vi. Vi users fall into one of two categories: those who hate it and continually curse its finger-twisting key combinations and hard-to-remember commands, and those who love the flexibility and power it offers. For a long time, I was in the former category. However, continuous usage has led to a gradual appreciation for the speed and power under the cryptic interface, and I've since learnt a bunch of shortcuts and key combinations that ease the task of writing code in the editor. This article discusses my personal top ten features. Before proceeding, ensure that you have a copy of ViM (that's Vi iMproved) installed and working on your system. You can download both binaries and sources from vim.org.
Continue reading Vi for programmers
Do you need to change your web host or switch your database server? This is probably the only time when you really think of backing up your MySQL data. If you've got a website with a database or your custom database running for your applications, it is imperative that you make regular backups of the database. In this article, I will outline two easy ways of backing up and restoring databases in MySQL.
The easiest way to backup your database would be to telnet to the your database server machine and use the mysqldump command to dump your whole database to a backup file. If you do not have telnet or shell access to your server, don't worry about it; I shall outline a method of doing so using the PHPMyAdmin web interface, which you can setup on any web server which executes PHP scripts.
Playing with mysqldump
If you have either a shell or telnet access to your database server, you can backup the database using mysqldump. By default, the output of the command will dump the contents of the database in SQL statements to your console. This output can then be piped or redirected to any location you want. If you plan to backup your database, you can pipe the output to a sql file, which will contain the SQL statements to recreate and populate the database tables when you wish to restore your database. There are more adventurous ways to use the output of mysqldump.
A Simple Database Backup:
You can use mysqldump to create a simple backup of your database using the following syntax.
mysqldump -u [username] -p [password] [databasename]> [backupfile.sql]
[username] - this is your database username
[password] - this is the password for your database
[databasename] - the name of your database
[backupfile.sql] - the file to which the backup should be written.
The resultant dump file will contain all the SQL statements needed to create the table and populate the table in a new database server. To backup your database 'Customers' with the username 'sadmin' and password 'pass21' to a file custback.sql, you would issue the command:
mysqldump -u sadmin -p pass21 Customers> custback.sql
Continue reading Backing Up and Restoring Your MySQL Database
Just a good step by step on how to configure Apache to use a .htaccess file. I rarely ever use this method except in testing so I always forget.
First, get your web administrator to enable your use of .htaccess files. This requires a stanza in ServerRoot/conf/access.conf like this:
where /home/webber is replaced by your home directory. Without this, the usual default is AllowOverride None, which means that .htaccess files are ignored. The above stanza allows .htaccess control in all subdirectories of the specified Directory.
Set up a reasonably secure directory for the password (and optionally the group) files. This directory should not be in the web document tree! If it is, someone who can learn or guess the URL of the password file can fetch it and try to crack the passwords. (This refers to visitors from elsewhere on the Internet. There is no simple way to prevent users with accounts on the web server host itself from snooping in the password file, so we will have to settle for security by obscurity and trust them not to try too hard.)
Let us name this directory http-etc by analogy to the Unix /etc directory where the system passwd and group files reside. Place it in your home directory (not in public_html) so that it is outside URL space. Give it permission 701 = rwx-----x meaning you the owner can do anything, and the web server, running as the ordinary user apache, can access the directory but cannot list it (so it must know the file names in advance).1
Continue reading Configuring Apache to use a .htaccess file
I don't remember where I got this article from but it is full of some good information
TAR is the Unix Tape ARchive utility. It can be used to either store data on a streaming tape device like a DAT drive, or store files in what is commonly called a tarball file- somewhat like a pkzip file, only compression is optional.
In these examples, I will use the following file structure: a top level directory called DIR1 containing the files picture.jpg, document.doc and database.db.
[Creating a tarball]
If we were in the directory DIR1 and wanted to backup all the files to a tarball called backup.tar, we could issue this command:
$ tar cvf backup.tar .
tar: backup.tar is the archive; not dumped
c=create (an archive)
v=verbose (just because)
f=filename (the name of our tarball)
.=current directory (what's going to be backed up)
Also worth mentioning is that by default tar is recursive- meaning it will back up all files and subdirectories recursively unless you otherwise specify with the n flag (non-recursive)
[Displaying the Contents of a Tarball]
The current directory will now contain a file called backup.tar. To display the contents of the tarball file, we could issue this command:
$ tar tvf backup.tar
drwxr-xr-x root/gci 0 Jun 29 10:10 ./
-rw-r--r-- root/gci 1 Jun 29 10:10 picture.jpg
-rw-r--r-- root/gci 1 Jun 29 10:10 document.doc
-rw-r--r-- root/gci 1 Jun 29 10:10 databse.db
Continue reading Backup files with tar
Dario F. Gomes
This site I'm working on relies heavily on user input through forms, and all that data needs to be checked before being sent a database. I knew PHP3's regular expression functions should solve my problem, but I didn't know how to form the regular expressions in the first place. What I needed were some sample strings--obviously the first places I looked were the PHP3 manual and the POSIX 1002.3 specification, but they don't help much in the way of exemplifying.
Adding to that, I had a really hard time finding good literature on the Web about the subject. I eventually got to know how to do it, mostly through experimenting, and seeing there wasn't much to it, I decided to write down this straight-out introduction to the syntax and a step-by-step on building regular expressions to validate money and e-mail address strings. I just hope it manages to clear the fog around the subject for all you fellow programmers.
Continue reading Learning to Use Regular Expressions by Example