With Moblin2 Intel is taking another shot at developing a distro that runs on mobile Internet devices and netbooks. The first alpha of the small distro boots up fast.more »
Data security independence from hardware is the promise from backup specialist Arkeia for its upcoming Network Backup version 8.0. But it's not the only enhancement from the company with its French roots.more »
Sun Microsystems has acquired Belgian company Q-Layer, which specializes in cloud computing.more »
Rocks Clustering Creating virtual clusters with RocksJan 01, 2009
Rocks offers an easy solution for clustering with virtual machines.more »
Cobbler Automated installation with the Cobbler provisioning toolJan 01, 2009
Cobbler helps you install new systems in a hurry. We'll show you how to use this nifty shoemaker to deploy Xen and VMware virtual machines.more »
Building Virtual Appliances Building virtual appliances with VMware Studio and SUSE StudioJan 01, 2009
A virtual appliance combines the benefits of virtualization with the simplicity of a single-service device. We show you how to roll your own virtual appliances with VWware Studio and SUSE Studio.more »
The free virtualization product VirtualBox has released a new version 2.1 that not only supports 3D graphics, but the full VMDK and VHD formats from VMware and Microsoft.more »
Hewlett-Packard has partnered with Novell in developing a new, secure Linux desktop product. At the same time, HP has joined up with Mozilla to promote a desktop virtualization project for small business customers.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.