Welcome!

From a Linux Mobile Platform Expert

Ibrahim Haddad

Subscribe to Ibrahim Haddad: eMailAlertsEmail Alerts
Get Ibrahim Haddad via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Ibrahim Haddad

The open source development model has unique characteristics that make it in some instances a superior model for developing software compared to the traditional software engineering cascade model. As with other practices, the open source development model had its advantages and inconveniences. Will adopting the open source development model improve the way your corporate developers work and produce software? What are the best practices from the open source development model that we can use in a corporate environment? The open source software development model has a different process and set of values than traditional proprietary software development model. The traditional software development process consists of six activities illustrated in Figure 1: collecting and analyzing requirements, designing a solution approach, developing the code, testing, deploying, and ma... (more)

Interview with Mark G. Sobell

For this issue, I'm going to talk with long-time Linux author Mark Sobell. Mark's first Linux book came out in 1996, when Linux was in its infancy. In this interview Mark discusses Red Hat's Fedora Core 2 version of Linux and his experiences writing Linux books. LWM: I know you've written a lot of books. When did you write your first one? MGS: My first book, A Practical Guide to the UNIX System, was published in 1982. At that time it was one of three or four books on UNIX. Since then, I've written a number of books on System V and BSD UNIX, databases, Solaris, and three books on L... (more)

"Secure Coding in C and C++" A Linux.SYS-CON.com Interview With Robert Seacord

Robert C. Seacord, a senior vulnerability analyst at the CERT/Coordination Center at Carnegie Mellon University, has just published the book Secure Coding in C and C++ (Addison-Wesley, 2005). I sat down with him to discuss software security in the Linux environment and elsewhere. LWM: There's an ongoing debate over whether Linux is more secure than Windows. Some people argue that since Linux's source code is freely available, it makes it easy for hackers to implement hacks and break into Linux systems, whereas this becomes more difficult with proprietary operating systems. What'... (more)

D@TA Protection and the Linux Environment

Organizations that gather and store critical information have to protect it. While there are tried and true techniques for data protection, there are also new and innovative ones. These new practices and tools greatly enhance an organization's ability to protect mission-critical data. Linux and Open Source users are specially challenged when trying to take advantage of much of this new technology. We asked technology analyst Tom Petrocelli about what is new and interesting in data protection. Tom is president of Technology Alignment Partners (www.techalignment.com) and author of... (more)

Adopting an Open Source Approach to Software Development, Distribution, and Licensing

(SYS-CON Media) - Since the beginning of the software industry, nearly every software company in the world has followed the same business model: its own employees develop the software, which is closely held intellectual property, the software is delivered to clients in binary form, and users run the licensed software on their own computers. Today, this model has been challenged by a new paradigm: open source. Developed and maintained by volunteers across the world, distributed to users at no cost, and available as source code, open source software is radically different from its ... (more)