Cloud Backup with Duplicity Data SafeNov 04, 2013
If you’re looking for a secure and portable backup technique, try combining the trusty command-line utility Duplicity with an available cloud account.more »
luckyBackup Backing up data with luckyBackupSep 21, 2012
Fully automatic and space-saving backups – that’s what luckyBackup promises. This tool combines Rsync with other techniques into one comfortable application for backing up data.more »
Perl: Clonezilla Backups Using Clonezilla and Perl scripts for backupsJun 21, 2012
Clonezilla makes backing up and restoring your system an easy affair that only involves a few key strokes. A homegrown solution reduces the time and effort to the act of slotting in a CD, on which you previously burned a Perl script.more »
Charly’s Column: S3QL The sys admin’s daily grind: S3QLNov 02, 2011
Sys admin Charly has been an enthusiastic amateur photographer for many years. Recently, he started worrying about something happening to his rapidly expanding photo collection. Can the cloud save the day?more »
OpSource introduces new managed disaster recovery service for the cloud.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
"Pandora is one of Gluster's top five deployments and offers a modern data center solution that provides flexibility, seamless growth, with 'pay as you grow' scalability," says Jack O'Brien, VP of marketing at Gluster.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.