Although spam filtering and blocking is helpful for the end user, it doesn't stop the production of spam. KnujOn strikes spam at the source.more »
Synctool, a configuration managemment tool that synchronizes computer clusters, is available in a new 4.0 version. The software underwent some internal rework and picks up new features.more »
Template Builder as of now is a permanent part of Oracle's JeOS mini-Linux and produces images, known as templates, for Oracle VM.more »
Perl: Tracking Online Orders Perl keeps track of online ordersJun 30, 2009
A distributed database based on the distributed Git version control system relies on a Perl script to help users track Internet orders. When the goods arrive, purchasers update their stock counts, wherever they may be at the time.more »
Market research firm IDC just finished a study of open source enterprise applications with decision makers in 515 European organizations. The result: open source is undergoing market expansion in business applications.more »
GLPI Managing resource information in GLPIMay 31, 2009
Anyone working in information technology knows how hard it is to keep track of inventory, maintenance history, and user support requests. GLPI puts the details in reach.more »
With version 6 of the web content and document managment suite Jahia has set the Swiss enterprise bearing the same name onto a higher level in terms of standard and reputability.more »
Cfengine 3 Managing the network with CfengineMar 31, 2009
Automate admin tasks with the powerful Cfengine framework.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm