Glogg Searching in large logfiles with GloggApr 24, 2012
Programmers and Linux administrators appreciate the benefits of event logs. The Glogg tool is the perfect choice for searching even large logfiles.more »
Pacemaker Automated monitoring with Pacemaker resource agentsApr 24, 2012
When a cluster node fails, the Pacemaker high-availability tool launches the services on another node. A lesser known feature is Pacemaker’s ability to put failed services back on their feet in the cluster manager.more »
Software Distribution Tools Comparing the M23 and Spacewalk software distribution systemsApr 24, 2012
Keeping all the Linux clients in an enterprise environment up to date can be a major logistical challenge. Many harassed administrators appreciate a good software distribution system, especially if it is a free tool that doesn’t stress the IT budget.more »
MindRaider MindRaider – Mind-mapping editorApr 24, 2012
The digital notes application MindRaider lets you organize and visualize your thoughts as mind maps.more »
Automation Tips and Tricks Some automation tips from our authors and expertsApr 24, 2012
We asked some of our authors to share their favorite automation tricks.more »
NoOps: Divining the Future of the Network The Rise of the DeveloperApr 09, 2012
Mention NoOps and you’re sure to start an argument. But terminology aside, this is a coming trend to which ITs should pay attention.more »
TeamDrive 3.0 Released for Android and iOS
JetBrains Releases TeamCity 7.0
AMD Announces Radeon HD 7870 and 7850
Altair Launches New HPC Tools
GFI Releases WebMonitor 2012more »
Install Your Own Git Server Git ServerMar 25, 2012
Linus Torvalds’s Git more or less conquered the version management scene overnight. For collaboration in a team, you can easily set up your own Git server to store your repositories. We describe two approaches in this article.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.