Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
“Stronger definition of network behavior in software is a growing trend, and open interfaces are going to lead to faster innovation,” said Nick McKeown, ONF Board member and professor at Stanford University.more »
"I want to share with you the process of installing PacketFence on Ubuntu and then how it can be used from the command line to create a powerful network access control system," Jack Wallen says in his Install and Configure Packetfence on Ubuntu Linux article.more »
Letters Write AccessNov 23, 2010
Dear Rikki Kite: I picked up a copy of Linux Magazine the other day and read your most current, interesting article. Since you welcomed ideas for topics, I have a topic that never seems to be addressed.more »
Tech Tools International Technology NewsOct 25, 2010
- Netgear Launches Network Management Platform
- Low-Distortion TI Operational Amplifier
- Eurotech Unveils Catalyst TC
- IBM New Global Financing Program
Likewise Open 6 found in Maverick Meerkat's repository, allowing enterprise network connectivity.more »
"Collaborate Across Borders" in Germany, to be specific.more »
Google's project lead confirms timeframe at Computex.more »
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.