Red Hat Inc. joins a European Union initiative working to create LEADS (Large-scale Elastic Architecture for Data-as-a-Service) for mining and analyzing web data.more »
Doghouse: Industry Report The software industry and developing countriesDec 19, 2012
A recent report highlights some advantages as well challenges for implementing free software in developing countries.more »
- Red Hat Releases RHEL 6.4 beta and Enterprise Virtualization 3.1
- Amazon Announces Redshift Data Warehouse Service
- Ceph on SUSE
- XtreemFS 1.4
New organization will oversee interoperability and standards for the popular open source database.more »
Kernel News Zack’s Kernel NewsNov 26, 2012
Chronicler Zack Brown reports on the latest news, views, dilemmas, and developments within the Linux kernel community.more »
Perl: Google Drive Scanning and storing books on Google DriveNov 26, 2012
Armed with a Chinese guillotine and a scanner with an automatic document feeder, Mike Schilli gives his books some special treatment, courtesy of Google Drive, which offers 5GB of storage space – room enough to start an online PDF collection.more »
- Linux Foundation reports Secure Boot solution
- Ubuntu 12.10
- Plasma Active 3
- Android OS Tops
- Linaro Enterprise
- Group formed for ARM architecture
- Android installed on 3 of 4 smartphones
The Coming KDE An Interview with Aaron SeigoNov 05, 2012
Aaron Seigo discusses KDE’s new approach to managing change and the changes coming up in the next few years.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.