New products extend and improve Red Hat's virtualization environment.more »
Citrix Announces XenServer 6.1
Red Hat Updates Enterprise MRG
Xen.org Releases Xen 4.2more »
AMD announces its participation in OpenJDK Project “Sumatra” in collaboration with Oracle and other members of the OpenJDK community to help bring heterogeneous computing capabilities to Java for server and cloud environments.more »
VMware Workstation 9, the latest version of VMware's personal virtualization software, now delivers Windows 8 support, a new web UI, and OpenGL support for Linux.more »
vSphere Free virtualization with VMware vSphereJul 24, 2012
The free vSphere Hypervisor 5.0 lets companies enter into professional virtualization without the overhead of a commercial solution. If you decide you need additional enhancements later, you can always upgrade to enhanced VMware solutions.more »
Practical Wine Building a Wine environment for Windows applicationsJun 21, 2012
More and more Windows applications run on Linux thanks to Wine. If you spend a little time on configuration and troubleshooting, you won’t be stuck in Windows – even with applications that no one dreamed would run on Linux.more »
CrossOver Install and run Windows applications on Linux with CrossOverJun 21, 2012
If Wine has thrown you into the impenetrable depths of operating system arcana, you might try CrossOver, a commercial application that contributes to the Wine project.more »
Nested Virtualization A private cloud with high availability and storage on the laptopJun 21, 2012
Nesting of hypervisors, known as a nested virtualization, makes it possible to set up a complete virtualization scenario with a data center, storage, and high-availability functions on a laptop. In this article, we show you how, with Linux iSCSI and free VMware trial versions.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems