MySQL Online Schema Changes Online schema changes with MySQLDec 19, 2012
Making online schema changes to your database can be tricky, but the right tools can help. We show how to change even the largest tables in an orderly and efficient manner.more »
Charly's Column: Di The sys admin’s daily grind – DiDec 19, 2012
The more frequently a command is used, the fewer letters it should have, so the use of twokey commands like ls, mv, and df is second nature. We look at a previously little-known representative of this club, di.more »
- OpenShift for data centers and clouds
- MariaDB non-profit foundation launched
- Fedora 18 to include Mate desktop
- Oracle repository for kernel changes
- NVidia GeForce R310
- Android OS leads the smartphone market
- Microsoft contemplating yearly major release cycle
- HP writes off US$ 8.8 million on Autonomy
- Stallman alleges “surveillance code” in Unity
StarCluster HPC in the cloud with StarClusterDec 19, 2012
Some changes at Amazon require an update to the StarCluster article.more »
Script Dialogs Automating tasks with SSH, Zenity, Yad, KDialog, PuTTY, WinSCP, and Rex Secure AgentNov 26, 2012
Starting a script on a Linux server with just a few mouse clicks sounds more complicated than it really is. If you want to create attractive and interactive dialogs for your desktop users, all you need is a small utility called SSH and a little Bash know-how.more »
- Linux Foundation reports Secure Boot solution
- Ubuntu 12.10
- Plasma Active 3
- Android OS Tops
- Linaro Enterprise
- Group formed for ARM architecture
- Android installed on 3 of 4 smartphones
Phusion Passenger 4 offers improved scalability, Python WSGI support, multithreading, and better error diagnostics.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems