Although spam filtering and blocking is helpful for the end user, it doesn't stop the production of spam. KnujOn strikes spam at the source.more »
Synctool, a configuration managemment tool that synchronizes computer clusters, is available in a new 4.0 version. The software underwent some internal rework and picks up new features.more »
Template Builder as of now is a permanent part of Oracle's JeOS mini-Linux and produces images, known as templates, for Oracle VM.more »
Perl: Tracking Online Orders Perl keeps track of online ordersJun 30, 2009
A distributed database based on the distributed Git version control system relies on a Perl script to help users track Internet orders. When the goods arrive, purchasers update their stock counts, wherever they may be at the time.more »
Market research firm IDC just finished a study of open source enterprise applications with decision makers in 515 European organizations. The result: open source is undergoing market expansion in business applications.more »
GLPI Managing resource information in GLPIMay 31, 2009
Anyone working in information technology knows how hard it is to keep track of inventory, maintenance history, and user support requests. GLPI puts the details in reach.more »
With version 6 of the web content and document managment suite Jahia has set the Swiss enterprise bearing the same name onto a higher level in terms of standard and reputability.more »
Cfengine 3 Managing the network with CfengineMar 31, 2009
Automate admin tasks with the powerful Cfengine framework.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.