Glogg Searching in large logfiles with GloggApr 24, 2012
Programmers and Linux administrators appreciate the benefits of event logs. The Glogg tool is the perfect choice for searching even large logfiles.more »
Pacemaker Automated monitoring with Pacemaker resource agentsApr 24, 2012
When a cluster node fails, the Pacemaker high-availability tool launches the services on another node. A lesser known feature is Pacemaker’s ability to put failed services back on their feet in the cluster manager.more »
Software Distribution Tools Comparing the M23 and Spacewalk software distribution systemsApr 24, 2012
Keeping all the Linux clients in an enterprise environment up to date can be a major logistical challenge. Many harassed administrators appreciate a good software distribution system, especially if it is a free tool that doesn’t stress the IT budget.more »
MindRaider MindRaider – Mind-mapping editorApr 24, 2012
The digital notes application MindRaider lets you organize and visualize your thoughts as mind maps.more »
Automation Tips and Tricks Some automation tips from our authors and expertsApr 24, 2012
We asked some of our authors to share their favorite automation tricks.more »
NoOps: Divining the Future of the Network The Rise of the DeveloperApr 09, 2012
Mention NoOps and you’re sure to start an argument. But terminology aside, this is a coming trend to which ITs should pay attention.more »
TeamDrive 3.0 Released for Android and iOS
JetBrains Releases TeamCity 7.0
AMD Announces Radeon HD 7870 and 7850
Altair Launches New HPC Tools
GFI Releases WebMonitor 2012more »
Install Your Own Git Server Git ServerMar 25, 2012
Linus Torvalds’s Git more or less conquered the version management scene overnight. For collaboration in a team, you can easily set up your own Git server to store your repositories. We describe two approaches in this article.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm