Even as the tech world works to figure out just what to do with the potential of cloud computing and big data, along comes a new bit of technology fueled by open source software: software-defined networks.more »
SpringSource Releases New Tool Suites
Codethink Releases Baserock 1.1
PostgreSQL 9.2 Released
ROSA Announces Enterprise Distributionmore »
Amahi Releases Ubuntu Edition
New Version of UndoDB Released
Black Duck Announces Code Quality Audit
digiKam Releases Version 2.7more »
Security Lessons: Virtual Hosts Serving websites as unique users off a single serverJul 24, 2012
Creating secure websites with their own privileges on a single server.more »
Nested Virtualization A private cloud with high availability and storage on the laptopJun 21, 2012
Nesting of hypervisors, known as a nested virtualization, makes it possible to set up a complete virtualization scenario with a data center, storage, and high-availability functions on a laptop. In this article, we show you how, with Linux iSCSI and free VMware trial versions.more »
NoOps Divining the future of the networkMay 29, 2012
Mention NoOps, and you’re sure to start an argument. But terminology aside, this is a coming trend to which ITs should pay attention.more »
System Diagnosis Tools Tune in to your system with these popular diagnostic toolsApr 24, 2012
To check on the health of a Linux system, administrators can turn to vmstat, iostat, netstat, and ifstat. Or, you can just use the versatile dstat, which combines the features of several tools in a single package.more »
Monitoring Logfiles Monitoring logs with Logcheck and LogsurferApr 24, 2012
Logfiles contain records of what happens on a Linux system and the services it runs. Tools like Logcheck and Logsurfer filter out the most important events for the administrator, and they can even trigger an appropriate reaction automatically.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.