Red Hat president and CEO Jim Whitehurst sees opportunities for open source firms that might be putting undue burden on their dwindling IT departments because of the current economic downturn. Whitehurst offered his views in a press conference in Munich. His conclusion: "When people look at alternatives, often Open Source wins."more »
Red Hat president and CEO Jim Whitehurst sees opportunities for open source firms that might be putting undue burden on their dwindling IT departments because of the current economic downturn.more »
VMworld 2008 A report from VMworld 2008Nov 30, 2008
VMworld, the world's largest virtualization event, offered a variety of technical events, birds-of-a-feather sessions, press conferences, and perhaps the biggest IT party ever. VMworld's fifth year is one to remember.more »
Six months after Fedora 9, the free project is now releasing its newest version 10 of the popular Linux distribution, code-named Cambridge.more »
Computer vendor Transtec has actualized its Calleo 330 server series on the new 45-nonometer Opterons from AMD. All Calleos now come with SUSE Linux Enterprise Server (SLES) 10.more »
At the USENIX LISA conference in San Diego, Lee Damon and Mike Ciavarella presented a foundation workship as a tutorial for admins with tips and tricks for working efficiently. The presentors didn't agree on all points, but one commonality was that they advised against running High Performance Computing (HPC) together with virtualization.more »
The virtualization specialist adopted the know-how for the product through its acquisition of Trango Virtual Processorsmore »
Intrepid Ibex, the codename for Ubuntu 8.10, has today finally reached the pinnacle, without hesitation. Although the new version of the popular Linux distribution hasn't won any new altitude records, it still brings along a number of interesting features to make life easier for users and
administrators. High among these features are some rejuvenated programs.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.