Abstracts - faqs.org

Abstracts

Business, general

Search abstracts:
Abstracts » Business, general

Linux pioneers find the differences are subtle

Article Abstract:

There are some differences as well as similarities between the Linux OS and Corel's Wordperfect word-processing software when both offerings operate on an IBM 486 Thinkpad. Corel, a Microsoft rival in the office automation sector, seeks to link Wordperfect with non-Microsoft options such as Linux. Wordperfect writers will notice nothing unusual when using Linux or a Microsoft OS in terms of typing or paragraph arrangement. A surprising parallel occurs when Wordperfect users deploy Kde, a non-Microsoft program. Kde offers some uncanny resemblances to Microsoft Windows, especially with its task bar and a button that calls to mind the Windows Start button. One key difference lies in the availability of fonts. Not all fonts may be offered through Linux, which unlike Macintosh and Windows machines, does not place the fonts in a central repository that is compatible with all programs.

Author: Wayner, Peter
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1998
Software Publishers, Word Processing Software Pkgs (Micro), Testing, Technology application, Word processing software, WordPerfect (Word processing software), UNIX

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Adding software can add trouble

Article Abstract:

Bit rot happens when some of an operating system's older software programs malfunction after others are upgraded. Because upgrading to Microsoft's Internet Explorer 4.0 changes many aspects of Windows 95, some users have found that older software will not work after the upgrade. Such users restored the older software's functionality by reinstalling an old version of Windows 95. Because Internet Explorer 4.0 replaced many of Windows 95's dynamic linked libraries (DLLs) with new ones, it was easy for bit rot to occur. Although programmers try to make old features compatible with new one, some lapses are bound to occur. Software makers should focus less on adding new features and more on perfecting software, or on removing incompatibilities.

Author: Wayner, Peter
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1998
Product defects and recalls, Product information, Design and construction, Internet access software, Web browser, Web browsers, Product bug fix/bug patch/maintenance upgrade, Microsoft Internet Explorer Administration Kit 4.0 (Web browser)

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Finding hidden senders in all that e-mail gobbledygook

Article Abstract:

E-mail messages can be faked in various ways, and though sophisticated approaches are difficult to foil, simple schemes can sometimes be tracked down and exposed. An example uses a message from monica@whitehouse.gov, which was not actually sent by anyone named Monica or anyone at the White House. In this illustration, Eudora was being used to receive e-mail. Eudora relies on the Standard Mail Transfer Protocol (SMTP), recording information about the pathway taken by a message. This does not tell very much about a message, but it can sometimes reveal enough to expose a spoof or a prank. In the future, better solutions, such as good cryptography, will render e-mail more trustworthy. Meanwhile, users should be aware of e-mail's weaknesses.

Author: Wayner, Peter
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1998
Safety and security measures, Electronic mail systems, E-mail, Email, Email software, Technology overview, Data security devices, Spam (Junk email), Unsolicited bulk e-mail, Data security device

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Computer software industry, Software industry
Similar abstracts:
  • Abstracts: Taking ownership of the job is more than a trendy theory of empowerment. No education or job and three to raise, a mother rises to the challenge
  • Abstracts: Internet industry. Computer software and services industry
  • Abstracts: Guess who was there first; builders of the Internet are bemused by kids who think they own it. Can the Internet cure the common cold? No, but the vast amount of on-line medical data is changing the relationship between doctor and patient
  • Abstracts: Spinoff games that outshine a film parent. A familiar terror clothed in new software. Nightmare, delusion and psychosis, for fun
  • Abstracts: House hunting with cursor and click; Web services give buyers more control, changing the rules of the real estate game
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.