Archiving Email Techniques for archiving emailJun 29, 2010
Email archiving involves more than just backing up your email directories. It is also a question of classifying the email and making it easier for users to find their way around overfilled email folders.more »
The Linbit firm out of Vienna will take over care of the Heartbeat 2 cluster manager.more »
Backup specialist SEP is providing additional parts of its data security software under GPL, including disclosing the SEP file backup format.more »
The open source backup software Bacula has surpassed the 1 million mark in Sourceforge's download statistics.more »
The FreeNAS project had discussed whether the free storage systems should use BSD or Linux in the future. The result is that both variants will now be available.more »
The French-U.S. firm Arkeia Software is taking over Kadena Systems, the California backup provider specializing in eliminating redundancies.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
Security Lessons Make off-site backups or you will lose your dataJul 31, 2009
Who needs attackers when you have system administrators? Learn why copying your data doesn't mean you've backed it up.more »
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.