Saving Power Software-based energy savingsOct 01, 2008
Save power by choosing the right system and software configuration.more »
Cloud Computing Cloud computing with Amazon's Elastic Compute CloudOct 01, 2008
Cloud computing systems like Amazon's Elastic Compute Cloud (EC2) save power and overhead by taking the peak out of your server load.more »
In the video, Linux Pro Magazine speaks to Chris Howard about the Open Source market. Howard is a leading advisor with the Burton Group, an IT marketing and consulting company for customers with more than 2000 people on staff.more »
The British Educational Communications and Technology Agency (Becta), the government body with the mission of "Leading next generation learning," has for the first time included Open Source enterprises on their list of official software and IT service suppliers for the nation's schools.more »
The battle in the virtualization market enters a new phase: Sun Microsystems released new versions of its virtualization software Sun xVM. And a few days ago Red Hat announced its takeover of Qumranet, makers of the virtualizer KVM. Meanwhile Microsoft and Novell are teaming up to counter with their own Microsoft Hyper-V and Suse Linux Enterprise Server offerings.more »
With a development time of at least a year, X.Org will be released today, delayed by almost six months. Developers want to free themselves from dependencies in future versions.more »
Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
Free blog software WordPress notifies of a security update in its 2.6.2 version.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.