Learning FreeNAS Chapter 2: Preparing to Add FreeNAS to Your NetworkFeb 13, 2009
Configure and manage a network attached storage solution
- Turn a PC into a Network Attached Storage server with FreeNAS
- Configure, manage, and troubleshoot your FreeNAS installation
- Up to date with the latest FreeNAS release
- Includes a comprehensive troubleshooting section
Michael "Monty" Widenius, long associated with MySQL, has decided to leave Sun Microsystems. His plan is to pursue open source software development again as an independent agent, and he also sees a future in gastronomy that should benefit all database developers.more »
Hardware manufacturer HP has released the source code for its Advanced File System (AdvFS), which it uses for the Tru64 Unix OS under the GPL, along with a Linux reference implementation.more »
Intel's 10GBit Ethernet adapters for servers can now run the Fibre Channel protocol over Ethernet connections.more »
Linux distributor Red Hat has launched a public beta co-marketing initiative of its enterprise platform as a software service in cooperation with Amazon.more »
IBM has published plans for its own network service for IT infrastructures under the "Blue Cloud" heading.more »
Iomega recently launched a new range of NAS servers in rack and desktop formats. The servers offer capacities of between 640GB and 3TB.more »
Sun Microsystems is acquiring a majority shareholding in Cluster File Systems and thus the rights to the Lustre cluster filesystem.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm