phpVirtualBox Virtual desktops in your web browser with phpVirtualBoxMar 15, 2013
Putting all virtualization tasks on a separate server saves significant resources on the client. phpVirtualBox makes it possible to create, configure, manage, and use remote VMs in a browser window.more »
New products extend and improve Red Hat's virtualization environment.more »
Citrix Announces XenServer 6.1
Red Hat Updates Enterprise MRG
Xen.org Releases Xen 4.2more »
AMD announces its participation in OpenJDK Project “Sumatra” in collaboration with Oracle and other members of the OpenJDK community to help bring heterogeneous computing capabilities to Java for server and cloud environments.more »
VMware Workstation 9, the latest version of VMware's personal virtualization software, now delivers Windows 8 support, a new web UI, and OpenGL support for Linux.more »
vSphere Free virtualization with VMware vSphereJul 24, 2012
The free vSphere Hypervisor 5.0 lets companies enter into professional virtualization without the overhead of a commercial solution. If you decide you need additional enhancements later, you can always upgrade to enhanced VMware solutions.more »
Practical Wine Building a Wine environment for Windows applicationsJun 21, 2012
More and more Windows applications run on Linux thanks to Wine. If you spend a little time on configuration and troubleshooting, you won’t be stuck in Windows – even with applications that no one dreamed would run on Linux.more »
CrossOver Install and run Windows applications on Linux with CrossOverJun 21, 2012
If Wine has thrown you into the impenetrable depths of operating system arcana, you might try CrossOver, a commercial application that contributes to the Wine project.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm