Readers sound off.
Missing Antiques

The cover of your April 2002 issue has the words “Antiquing Your Desktop”. Huh? Wherzat? Admittedly, I only scoured the index and flipped through each page, not yet having had time to read the thing cover to cover (okay, Playboy arrived at the same time). But I have had my interest seriously piqued by what appears to be a non-existent article. Please, Oh Great Ones, shed some light!

—Andrew Bell

Andrew, the antiquing your desktop referred to Marcel Gagné's article “Interoperate with Me”, where he “revisits a few familiar desktop environments from the past”. I apologize if our sorry little play on words had you looking for something on furniture restoration. I hope you find Marcel's article equally interesting.


Just an Addict

I'd like to say that I found Robert Adam's article “The m4 Macro Package” (in the April 2002 issue of LJ) to be very interesting and immediately useful. I read it on the train ride to work and put m4 to good use that very day! Thanks for keeping me hooked on LJ with articles like these.

—Fred Daoud

False Hopes

The article “The CodeWeavers CrossOver Plugin” in the April 2002 issue was very exciting to read. However, the hope instilled by the article was false because of one requirement the article failed to mention: an x86 processor. It was very disappointing to discover that requirement only after checking the web page.

I would have thought the writers and editors of Linux Journal would have been aware of the existence of instruction set architectures other than x86. There are actually quite a number of different hardware architectures on which Linux runs very well. For my part, I have chosen to use an architecture superior to x86 out of simple disgust for segment registers, prefix bytes, the A20M pin, a register model based on the 8008, etc.

—Robert M. Riches Jr.


Please note the correction to the web address on page 89 of the February 2002 issue, from www.mesa.org to www.mesa3d.org, regarding the Mesa 3-D Graphics Library.



One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix