Although spam filtering and blocking is helpful for the end user, it doesn't stop the production of spam. KnujOn strikes spam at the source.more »
Synctool, a configuration managemment tool that synchronizes computer clusters, is available in a new 4.0 version. The software underwent some internal rework and picks up new features.more »
Template Builder as of now is a permanent part of Oracle's JeOS mini-Linux and produces images, known as templates, for Oracle VM.more »
Perl: Tracking Online Orders Perl keeps track of online ordersJul 01, 2009
A distributed database based on the distributed Git version control system relies on a Perl script to help users track Internet orders. When the goods arrive, purchasers update their stock counts, wherever they may be at the time.more »
Market research firm IDC just finished a study of open source enterprise applications with decision makers in 515 European organizations. The result: open source is undergoing market expansion in business applications.more »
GLPI Managing resource information in GLPIJun 01, 2009
Anyone working in information technology knows how hard it is to keep track of inventory, maintenance history, and user support requests. GLPI puts the details in reach.more »
With version 6 of the web content and document managment suite Jahia has set the Swiss enterprise bearing the same name onto a higher level in terms of standard and reputability.more »
Cfengine 3 Managing the network with CfengineApr 01, 2009
Automate admin tasks with the powerful Cfengine framework.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.