Pacemaker Automated monitoring with Pacemaker resource agentsApr 24, 2012
When a cluster node fails, the Pacemaker high-availability tool launches the services on another node. A lesser known feature is Pacemaker’s ability to put failed services back on their feet in the cluster manager.more »
Automation Tips and Tricks Some automation tips from our authors and expertsApr 24, 2012
We asked some of our authors to share their favorite automation tricks.more »
Chronicler Zack Brown reports on the latest news, views, dilemmas, and developments within the Linux kernel community.more »
The Linux Magazine Academy is offering 20% off all their online trainings until January 15, 2012. Depending on the course chosen customers can save several hundred pounds.more »
Charly’s Column: OpenNetAdmin The sys admin’s daily grind: OpenNetAdminSep 23, 2011
Last month, the Havege daemon helped organize the chaos in this column. Today, Charly attempts to organize the network – a tale of suffering in three chapters.more »
Archipel Managing hypervisors with the Archipel VM orchestration toolSep 01, 2011
The innovative Archipel cross-hypervisor management tool uses the Jabber protocol to chat with servers running Xen, KVM, OpenVZ, and VMware.more »
Charly's Column: Nameserver Diagnostics The sys admin’s daily grind: digJun 27, 2011
Many administrators rely on Linux tools whose fate is already sealed, but external forces can help people let go of old habits.more »
Charly's Column: Terminator The sys admin’s daily grind: TerminatorMar 28, 2011
Friends are all about friendship – names and appearances typically don’t play any role at all. Sys admin Charly’s friend the Terminator is a convincing example.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm