Puppet Labs, provider of open source systems management solutions, announced the release of Puppet Enterprise, the first commercially supported version of Puppet.more »
Canonical, the corporate sponsors of Ubuntu, announced today its partnership with Dell to offer Ubuntu Enterprise Cloud (UEC) on Dell PowerEdge C2100 and C6100 servers that will ship with tested reference architectures, guides, and support from experts at Dell and Canonical.more »
Charly's Column: lsof Sys Admin's Daily Grind: lsofJan 31, 2011
The shorter a command, the longer the list of support parameters. This rule applies to lsof, one of Charly’s favorite commands.more »
DaviCAL CeBIT Open Source 2011 - Project Presentation DAViCalJan 31, 2011
During CeBIT 2011 open source projects such as DaviCAL, shared calendar and address book storage servers, will have the opportunity to showcase what is currently in active development.more »
Earlier this month, Canonical, the commercial sponsor of Ubuntu, launched this year’s How Do You Ubuntu? server survey to gather information from Ubuntu server users. If you haven’t taken the survey yet, you have until Tuesday, February 1, 2011.more »
"Pandora is one of Gluster's top five deployments and offers a modern data center solution that provides flexibility, seamless growth, with 'pay as you grow' scalability," says Jack O'Brien, VP of marketing at Gluster.more »
JBoss AS 6.0, a free Java EE 6 compliant application server, is now available.more »
Charly’s Column: Cluster SSH The sys admin’s daily grind: Cluster SSHDec 28, 2010
Charly doesn’t relish the idea of searching through the logfiles of a dozen proxy servers when page requests fail. Now that he has deployed Cluster SSH, he can pull the strings on many machines at the same time.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm