"Making significant architectural changes" the official answer.more »
Sys admin tools Smart tools for sys adminsNov 24, 2009
This month we check out some new tools and take a closer look at some classic system administration utilities.more »
Bootchart Improving boot performance with BootchartJun 30, 2009
Bootchart analyzes the boot process and tells you where the system is wasting time.more »
Top Ten Tops We pick the top ten Top toolsNov 30, 2008
The famous Unix admin utility known as Top has many imitators. We take a look at some of the top Top tools.more »
After a few beta versions and months of news blackout, Nvidia has now released a robust version of its proprietary graphics card driver for Linux. Driver version 177.80 is to include 25 enhancements, among them the highly awaited support for GeForce GTX series cards.more »
Optimizing Servers Tips for optimizing Apache, Postfix, Oracle, MySQL, and SambaJul 15, 2008
Your homepage was just linked by Slashdot, a new email campaign goes out tonight, and you need the database to deliver survey results. We’ll show you how to help your servers survive the strain.more »
Upstart Quick booting with Upstart, a replacement for the legacy Sys V InitJul 11, 2008
The slow Linux boot has troubled users for years. Now the Upstart project offers a fresh approach to the problem of booting Linux.more »
GCC 4.3 GNU Compiler Collection 4.3May 22, 2008
The latest GCC 4.3 is set to take the programming world by storm with new optimizations, experimental support for the next-generation C++ 200x standard, an optional parallelized C++ STL, and a new Java compiler courtesy of the Eclipse project.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.