From April 29 to April 30 the Open Source Data Center (OSDC) Conference will be held in Nuremberg, Germany. All talks of the two-day-conference will be available on live stream and video here on Linux Magazine.more »
Sun Microsystems is previewing its upcoming MySQL 5.4 and MySQL Cluster 7.0 database products.more »
The Infobright and Jaspersoft firms have combined their open source software into an integrated data warehousing and business intelligence solution.more »
Developer Ulrich Drepper has provided a preview of the upcoming version 2.10 of the free GNU C library glibc.more »
After weeks' long rumor mill, the word is finally out: database specialist Oracle is buying Sun Microsystems for around $7.4 billion. This just two weeks after IBM abandoned its bid to do the same thing.more »
Charly's Column The sys admin’s daily grind: phpLogConMar 29, 2009
Using SQL to sift syslog data out of a database is an admittedly universal, but also fairly convoluted approach. phpLogCon, with its web interface, gives admins an easier option.more »
Under the name Unified Computing System (UCS), Cisco hopes to cost-effectively remold the data center. The Linux operating system for this scenario will come from Red Hat.more »
SystemRescueCd, a LiveLinux CD for system repair and recovery, is now in version 1.1.5. It supports the new ext4 filesystem that is beginning to emerge in distros such as Fedora 11 and Ubuntu Jaunty.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm