Saving Power Software-based energy savingsSep 30, 2008
Save power by choosing the right system and software configuration.more »
Cloud Computing Cloud computing with Amazon's Elastic Compute CloudSep 30, 2008
Cloud computing systems like Amazon's Elastic Compute Cloud (EC2) save power and overhead by taking the peak out of your server load.more »
In the video, Linux Pro Magazine speaks to Chris Howard about the Open Source market. Howard is a leading advisor with the Burton Group, an IT marketing and consulting company for customers with more than 2000 people on staff.
The British Educational Communications and Technology Agency (Becta), the government body with the mission of "Leading next generation learning," has for the first time included Open Source enterprises on their list of official software and IT service suppliers for the nation's schools.more »
The battle in the virtualization market enters a new phase: Sun Microsystems released new versions of its virtualization software Sun xVM. And a few days ago Red Hat announced its takeover of Qumranet, makers of the virtualizer KVM. Meanwhile Microsoft and Novell are teaming up to counter with their own Microsoft Hyper-V and Suse Linux Enterprise Server offerings.more »
With a development time of at least a year, X.Org will be released today, delayed by almost six months. Developers want to free themselves from dependencies in future versions.more »
Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
Free blog software WordPress notifies of a security update in its 2.6.2 version.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm