Everett, Cath
January 2004
Computer Weekly;1/20/2004 Supplement, p16
Trade Publication
As the popularity of the Linux operating system, devotees are concerned that its not doctored, watered-down or corrupted in any way. As Linux undergoes a metamorphosis, from a hobbyist's favourite to an increasingly commercial operating system (OS), questions are being asked about whether the factors behind its success so far can work long term. Despite the fact that the number of developers writing Linux code has skyrocketed, from a couple of hundred to upwards of 35,000, the development process has changed little, although it has evolved over time. As the Linux community has grown, so it has established a pyramidal hierarchy; if developers prove their mettle, they can be elected to the level of team leader to manage a particular development task. At the top of the tree, however, sit the Linux kernel hackers who control the development of the OS and decide what new features and functionality are allowed to go into it. Another Linux user, TradeSignals, which employs Red Hat Linux-based systems to provide real-time analysis of futures trading to brokerage firms, is likewise positive about the Linux development process. INSETS: FAMOUS LINUS TORVALDS QUOTES;THE MAJOR LINUX DISTRIBUTORS.


Related Articles

  • Developers Corner. Smith, Michael // Australian Personal Computer;Feb99, Vol. 20 Issue 2, p108 

    Focuses on computer programming specifically hacking, a mean of solving a problem by coercing a piece of software or hardware to act in a way that its designer never intended. Information on hack solution; Details on the security hole found by Motorola in the 1970s which allowed unauthorized...

  • Hackers give Microsoft users a 'helping hand'.  // Campaign (UK);3/2/2001, Issue 9, p56 

    Reports the infiltration of computer hackers into the Help page of Microsoft in Great Britain. Changes in the default system; Identification of online prerequisites; Description of information found in the browser.

  • Forwarding DLLs Add Functions to Existing Software. Dumais, John // Test & Measurement World;Oct2000, Vol. 20 Issue 12, p45 

    Relates strategies in optimizing the use of dynamic-link libraries (DLL) in programming. Getting the computer to a specific address to execute an instruction; Defining a template through the function-pointer data-type definition; Importance of header files to dynamically open a DLL and call...

  • Trust issue.  // SC Magazine: For IT Security Professionals (15476693);Oct2011, Vol. 22 Issue 10, p12 

    The article reports that major web browsers have revoked secure sockets layer (SSL) certificates issued by DigiNotar after the company disclosed a security failure that resulted in the creation and distribution of fake SSL certificates by hackers onto various websites.

  • Big Target. Wolfe, Daniel; Sposito, Sean // American Banker;10/13/2010, Vol. 175 Issue 157, p5 

    The article notes that the Krebs on Security website said that computer hackers prefer to work in early, less secure versions of the Java computer program.

  • IE Spy. Quittner, Jeremy // American Banker;3/16/2011, Vol. 176 Issue 41, p5 

    The article discusses a corrective software patch that the company Microsoft Corp. is devising for its Internet Explorer browser to prevent hackers from introducing script that allows them to pose as users and steal their information.

  • TRADESIGNALS MIGRATES TO RED HAT LINUX.  // UNIX Update;Jul2002, Vol. 13 Issue 7, p6 

    Reports on the decision of Tradesignals to use Red Hat Linux as the operating system for its core business infrastructure.

  • A matter of trust. Livingston, Brian // InfoWorld;12/9/2002, Vol. 24 Issue 49, p24 

    Discusses the security warning of Microsoft Corp. about computer hacking. Application of Microsoft Data Access Components; Computer systems that are not at risk; Profit margin of desktop Windows.

  • PROTECT YOUR PROCESSOR. Thompson, Jon // APC (Bauer Media Group);Dec2011, Vol. 31 Issue 12, p70 

    The article explains how Microsoft Corp.'s Authenticode protects one's microprocessor. It is said that it could take more than just advanced antivirus software to match the state of the art in malicious programming, as the arms race between developers and hackers is now gathering pace....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics