MySQL Online Schema Changes Online schema changes with MySQLDec 19, 2012
Making online schema changes to your database can be tricky, but the right tools can help. We show how to change even the largest tables in an orderly and efficient manner.more »
Charly's Column: Di The sys admin’s daily grind – DiDec 19, 2012
The more frequently a command is used, the fewer letters it should have, so the use of twokey commands like ls, mv, and df is second nature. We look at a previously little-known representative of this club, di.more »
- OpenShift for data centers and clouds
- MariaDB non-profit foundation launched
- Fedora 18 to include Mate desktop
- Oracle repository for kernel changes
- NVidia GeForce R310
- Android OS leads the smartphone market
- Microsoft contemplating yearly major release cycle
- HP writes off US$ 8.8 million on Autonomy
- Stallman alleges “surveillance code” in Unity
StarCluster HPC in the cloud with StarClusterDec 19, 2012
Some changes at Amazon require an update to the StarCluster article.more »
Script Dialogs Automating tasks with SSH, Zenity, Yad, KDialog, PuTTY, WinSCP, and Rex Secure AgentNov 26, 2012
Starting a script on a Linux server with just a few mouse clicks sounds more complicated than it really is. If you want to create attractive and interactive dialogs for your desktop users, all you need is a small utility called SSH and a little Bash know-how.more »
- Linux Foundation reports Secure Boot solution
- Ubuntu 12.10
- Plasma Active 3
- Android OS Tops
- Linaro Enterprise
- Group formed for ARM architecture
- Android installed on 3 of 4 smartphones
Phusion Passenger 4 offers improved scalability, Python WSGI support, multithreading, and better error diagnostics.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm