The GroundWork Open Source firm has upgraded its network monitoring suite to version 6.0. Next to an Enterprise subscription edition it also provides, as before, its free Community edition.more »
Virtualization provider VMware has purchased open source firm SpringSource for $420 million.more »
Building a Munin Plugin Creating a custom Munin pluginJun 30, 2009
Munin collects information and plots parameters of your choice automatically and with minimal configuration. But if you can't find a plugin that captures the data you want to graph, you might have to roll your own.more »
The new NConf release, despite being a minor one, provides many clear improvements.more »
The 4th Open Source Monitoring Conference 2009 on Nagios has released its Call for Papers.more »
Nagios Enterprises founder and Nagios maintainer Ethan Galstad has admitted to development bottlenecks in his project and recognizes that Nagios developers want a stronger participation in the Icinga fork project. Nevertheless, he's disappointed that Icinga didn't engage with him before they struck off on their own.more »
Open source project Nagios is being forked into the Icinga project. The Netways firm, which specializes in open source IT management services and particularly the monitoring solution Nagios, will be managing the fork.more »
Charly's Column The Sysadmin's Daily Grind: UptimedMar 31, 2009
Who has the longest uptime? Linux systems used to win hands down when it comes to maximum uptime without rebooting. Today, uptime statistics help admins with monitoring tasks and discovering tricky bugs.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.