Defragmenting Linux Optimizing data organization on diskMar 25, 2013
Defragfs optimizes files on a system, allowing videos to load faster and large archives to open in the blink of an eye.more »
Even as the tech world works to figure out just what to do with the potential of cloud computing and big data, along comes a new bit of technology fueled by open source software: software-defined networks.more »
In-Memory DBMS Main memory database systemsJun 21, 2012
Thanks to powerful hardware, in-memory databases run without accessing mass memory devices, which means they handle transactions and evaluations at high speed, introducing a paradigm shift in the database market.more »
Controlled Delay Management A new aggregate queue length algorithm for network bottlenecks.May 31, 2012
The persistent and growing problem of bufferbloat is getting serious relief thanks to a new active queue management tool known as a Controlled Delay – a tool that, thanks to heroic efforts, is now ready for Linux.more »
LXC: Linux Containers Virtualization with LXCApr 24, 2012
LXC is fully integrated into the kernel, providing a fast and easy approach to virtualizing individual programs and whole systems on Linux without the need for patches and additional modules.more »
Key features of new Oracle Kernel release include: Btrfs filesystem, improvements in performance, scalability, virtualization and others.more »
Disk Cleaners Care and feeding of disk space on LinuxAug 03, 2011
You wouldn’t believe how much of the disk space on your system is wasted, filled with duplicate files, or cruft you don’t need.more »
WANdisco, makers of Enterprise Subversion, announced its acquisition of SVNForum.org, an 20,000+ Subversion user community, today.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.