Welcome!

Christopher Frenz

Subscribe to Christopher Frenz: eMailAlertsEmail Alerts
Get Christopher Frenz via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Christopher Frenz

In late May 2004, Microsoft made the announcement that it was considering entering the High-Performance Computing (HPC) Market, a market that has traditionally been dominated by custom-engineered Unix-based machines. In recent years, advances in technology have made possible the construction of lower-cost computing clusters that utilize off-the-shelf hardware such as Intel- and AMD-based processors. The operating system of choice for these lower-end clusters has been Linux. In fact, this market is representative of one of Linux's strongest footholds. Many in the Linux camp consider this move as little more than an attempt to strike out against the open source operating system. Competitive motives aside, the idea of a Windows-based supercomputer is not without merit. Without question, more and more businesses and individuals have come to depend on computers for the ... (more)

Applicability of the .NET Platform to Bioinformatics Research

A current look at the field of bioinformatics will reveal that it is a field that is largely dominated by the Linux operating system, as well as by programming languages such as Perl, Python, and Java. Windows and its associated native application development platforms are not in widespread use among present-day bioinformatics practitioners. In fact, the usage of Linux and other open source technologies will likely remain the dominant platforms upon which most novel and/or large-scale bioinformatics research is conducted. Scientific computing of all types has deep-seated roots in... (more)

Why 'LiveCD' Should Be a Part of Every Computer User's Vocabulary

Throughout the last decade, society has witnessed an explosion of network connectivity among PCs and mobile devices as well as a vast proliferation of networked applications, ranging from Web-based email to online banking. The end result of this is that network connectivity has become an almost indispensable resource for many individuals. Yet along with the convenience and flexibility of anytime, anywhere network access, society has also seen an increase in computer-related security and privacy concerns, with the most dreaded being the possibility of identity theft.  While numero... (more)

Creating Mobile Controls with the Mobile Internet Toolkit

The Mobile Internet Toolkit comes prepackaged with a variety of controls that address the most common mobile computing tasks. However, specialized tasks can arise that these generic controls are not powerful enough to address, or for which they simply fail to meet the requirements. In these cases it is beneficial to develop a custom control that is suited to fulfilling the required tasks. In this article, I will concentrate on developing and implementing such custom controls within a mobile application. The primary focus will not be on creating custom user controls and/or inheri... (more)

The Open Source Advantage in Secure Application Development

The security benefits and risks of Open Source code is one of the most debated topics in information security today. The views of proponents of the Open Source model are typified by Eric Raymond's argument that Open Source software is intrinsically more secure since its open nature lets a greater number of programmers view the source code and uncover potential security threats before they're released to the wild. Fewer people see closed source software, on the other hand, and so the odds of uncovering a potential security threat before a system cracker finds it is diminished. Op... (more)