Jason Brooks

About

As Editor in Chief of eWEEK Labs, Jason Brooks manages the Labs team and is responsible for eWEEK's print edition. Brooks joined eWEEK in 1999, and has covered wireless networking, office productivity suites, mobile devices, Windows, virtualization, and desktops and notebooks. Jason's coverage is currently focused on Linux and Unix operating systems, open-source software and licensing, cloud computing and Software as a Service.

KDE 3.3 Boasts Improved Kontact App

KDE and GNOME, the open-source software projects that together form the face of most Linux installations, have undergone revisions that boost their usability and enterprise readiness—advances that build the case for Linux as a viable alternative to Windows on mainstream corporate desktops. Click here to read the full review of KDE 3.3.

GNOME 2.8 Gains Polish

KDE and GNOME, the open-source software projects that together form the face of most Linux installations, have undergone revisions that boost their usability and enterprise readiness—advances that build the case for Linux as a viable alternative to Windows on mainstream corporate desktops. Click here to read the full review of GNOME 2.8.

GNOME, KDE Aim at Windows

KDE and GNOME, the open-source software projects that together form the face of most Linux installations, have undergone revisions that boost their usability and enterprise readiness—advances that build the case for Linux as a viable alternative to Windows on mainstream corporate desktops. Some of the biggest changes in KDE 3.3 and GNOME 2.8 lie in […]

Solaris 10 Shines in Early Testing

The increasing prominence of freely licensed Linux has prompted many to view operating systems in general as a commodity. With Solaris 10, Sun Microsystems hopes to demonstrate that a companys choice of operating system does matter and that the level of innovation Sun has built into Solaris 10 can deliver benefits across a companys infrastructure. […]

SuSE Linux Enterprise Server Steps Up

Novell Inc.s SuSE Linux Enterprise Server 9, which began shipping last month, is the first version of SuSEs enterprise-oriented distribution that has shipped since Novell acquired SuSE Linux AG earlier this year. Click here to read the full review of SuSE Linux Enterprise Server 9. 2 Novell Inc.s SuSE Linux Enterprise Server 9, which began […]

Trusted Solaris 8

Trusted Solaris has been around for a few years longer than SELinux. And, as a complete product rather than a do-it-yourself add-on, it boasts a greater integration level of trusted features than SELinux does. Also, unlike SELinux, which is currently best-suited for server deployments, the access controls in Trusted Solaris extend to the desktop environment. […]

SELinux

SELinux is a set of kernel patches and utilities that boosts the security of the Linux system on which its enabled by providing for the enforcement of mandatory access control policies. Click here to read the full review of SELinux. 2 SELinux is a set of kernel patches and utilities that boosts the security of […]

Common Criteria Finds Common Ground

Functionally, a trusted operating system is defined primarily by its support of mandatory access controls. However, at many of the sites where trusted operating systems are deployed, its important that these operating systems also are defined by their certifications. The job of certifying trusted operating systems is generally left to the Common Criteria Project, an […]

In Operating Systems We Trust

eWEEK Labs tested two trusted operating system products: the National Security Agencys SELinux, which makes Linux into a trusted operating system, and Sun Microsystems Inc.s Trusted Solaris 8. Both have access controls that are much more fine-grained than those in mainstream operating systems, limiting the damage that can be done by an attacker who takes […]

Trusted Systems Move to Mainstream

When it comes to operating systems, its a matter of trust—or mistrust, as the case may be. Its often suggested that Microsoft Corp.s security woes stem in part from the companys tardiness in updating the security assumptions it had developed when solitary, disconnected desktop PCs had little reason to fear network-borne attacks. However, the problem […]