Glogg Searching in large logfiles with GloggApr 24, 2012
Programmers and Linux administrators appreciate the benefits of event logs. The Glogg tool is the perfect choice for searching even large logfiles.more »
Pacemaker Automated monitoring with Pacemaker resource agentsApr 24, 2012
When a cluster node fails, the Pacemaker high-availability tool launches the services on another node. A lesser known feature is Pacemaker’s ability to put failed services back on their feet in the cluster manager.more »
Software Distribution Tools Comparing the M23 and Spacewalk software distribution systemsApr 24, 2012
Keeping all the Linux clients in an enterprise environment up to date can be a major logistical challenge. Many harassed administrators appreciate a good software distribution system, especially if it is a free tool that doesn’t stress the IT budget.more »
MindRaider MindRaider – Mind-mapping editorApr 24, 2012
The digital notes application MindRaider lets you organize and visualize your thoughts as mind maps.more »
Automation Tips and Tricks Some automation tips from our authors and expertsApr 24, 2012
We asked some of our authors to share their favorite automation tricks.more »
NoOps: Divining the Future of the Network The Rise of the DeveloperApr 09, 2012
Mention NoOps and you’re sure to start an argument. But terminology aside, this is a coming trend to which ITs should pay attention.more »
TeamDrive 3.0 Released for Android and iOS
JetBrains Releases TeamCity 7.0
AMD Announces Radeon HD 7870 and 7850
Altair Launches New HPC Tools
GFI Releases WebMonitor 2012more »
Install Your Own Git Server Git ServerMar 25, 2012
Linus Torvalds’s Git more or less conquered the version management scene overnight. For collaboration in a team, you can easily set up your own Git server to store your repositories. We describe two approaches in this article.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.