With Moblin2 Intel is taking another shot at developing a distro that runs on mobile Internet devices and netbooks. The first alpha of the small distro boots up fast.more »
Data security independence from hardware is the promise from backup specialist Arkeia for its upcoming Network Backup version 8.0. But it's not the only enhancement from the company with its French roots.more »
Sun Microsystems has acquired Belgian company Q-Layer, which specializes in cloud computing.more »
Rocks Clustering Creating virtual clusters with RocksDec 31, 2008
Rocks offers an easy solution for clustering with virtual machines.more »
Cobbler Automated installation with the Cobbler provisioning toolDec 31, 2008
Cobbler helps you install new systems in a hurry. We'll show you how to use this nifty shoemaker to deploy Xen and VMware virtual machines.more »
Building Virtual Appliances Building virtual appliances with VMware Studio and SUSE StudioDec 31, 2008
A virtual appliance combines the benefits of virtualization with the simplicity of a single-service device. We show you how to roll your own virtual appliances with VWware Studio and SUSE Studio.more »
The free virtualization product VirtualBox has released a new version 2.1 that not only supports 3D graphics, but the full VMDK and VHD formats from VMware and Microsoft.more »
Hewlett-Packard has partnered with Novell in developing a new, secure Linux desktop product. At the same time, HP has joined up with Mozilla to promote a desktop virtualization project for small business customers.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.