In the October 2001 issue Marcel turned me on to that delectable project called ALICE. In his article, he gave notice of an age old net entertainment called MUDs. I want to thank Marcel in cooking up such fine recipes in the past, and for adding a bit of MUD seasoning to his cuisine.
MUD games and Linux fit together hand in hand. Ask a few of the local geeks in the office, such as Alan Cox or Illiad, what a MUD is. Graphical games are greatly enjoyed, but you just can't beat sitting down and role playing or hacking up your best bud through a text-based interface. Huzzah Marcel and LJ! Perhaps Monsieur François has a MUD pie recipe, no?
—Calvin “Kyndig” Ellis
The October 2001 issue of Linux Journal stated (on page 44):
Since then, universities like Berkeley and companies like VA Linux have developed efficient software packages for cluster monitoring and have made them open source. We use a node-cloning package called SystemImager from VA Linux (www.valinux.com) to do software upgrades.
I would like to make the clarification that SystemImager was actually created and developed by yours truly, Brian Finley. VA Linux did release a version of my software, as did SGI, in a similar way that Red Hat and SuSE release their versions of Linux. Current and future official releases of SystemImager are available at systemimager.org.
—Brian Finley firstname.lastname@example.org
|diff -u: What's New in Kernel Development||Sep 04, 2015|
|Android Candy: Copay—the Next-Generation Bitcoin Wallet||Sep 03, 2015|
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
- diff -u: What's New in Kernel Development
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- September 2015 Issue of Linux Journal: HOW-TOs
- Android Candy: Copay—the Next-Generation Bitcoin Wallet
- Using tshark to Watch and Inspect Network Traffic
- The True Internet of Things
- Firefox Security Exploit Targets Linux Users and Web Developers
- Build a “Virtual SuperComputer” with Process Virtualization
- Doing Astronomy with Python
- My Network Go-Bag