Defragmenting Linux Optimizing data organization on diskMar 25, 2013
Defragfs optimizes files on a system, allowing videos to load faster and large archives to open in the blink of an eye.more »
Even as the tech world works to figure out just what to do with the potential of cloud computing and big data, along comes a new bit of technology fueled by open source software: software-defined networks.more »
In-Memory DBMS Main memory database systemsJun 21, 2012
Thanks to powerful hardware, in-memory databases run without accessing mass memory devices, which means they handle transactions and evaluations at high speed, introducing a paradigm shift in the database market.more »
Controlled Delay Management A new aggregate queue length algorithm for network bottlenecks.May 31, 2012
The persistent and growing problem of bufferbloat is getting serious relief thanks to a new active queue management tool known as a Controlled Delay – a tool that, thanks to heroic efforts, is now ready for Linux.more »
LXC: Linux Containers Virtualization with LXCApr 24, 2012
LXC is fully integrated into the kernel, providing a fast and easy approach to virtualizing individual programs and whole systems on Linux without the need for patches and additional modules.more »
Key features of new Oracle Kernel release include: Btrfs filesystem, improvements in performance, scalability, virtualization and others.more »
Disk Cleaners Care and feeding of disk space on LinuxAug 03, 2011
You wouldn’t believe how much of the disk space on your system is wasted, filled with duplicate files, or cruft you don’t need.more »
WANdisco, makers of Enterprise Subversion, announced its acquisition of SVNForum.org, an 20,000+ Subversion user community, today.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm