Hewlett-Packard has partnered with Novell in developing a new, secure Linux desktop product. At the same time, HP has joined up with Mozilla to promote a desktop virtualization project for small business customers.more »
Red Hat president and CEO Jim Whitehurst sees opportunities for open source firms that might be putting undue burden on their dwindling IT departments because of the current economic downturn. Whitehurst offered his views in a press conference in Munich. His conclusion: "When people look at alternatives, often Open Source wins."more »
Red Hat president and CEO Jim Whitehurst sees opportunities for open source firms that might be putting undue burden on their dwindling IT departments because of the current economic downturn.more »
VMworld 2008 A report from VMworld 2008Nov 30, 2008
VMworld, the world's largest virtualization event, offered a variety of technical events, birds-of-a-feather sessions, press conferences, and perhaps the biggest IT party ever. VMworld's fifth year is one to remember.more »
Six months after Fedora 9, the free project is now releasing its newest version 10 of the popular Linux distribution, code-named Cambridge.more »
Computer vendor Transtec has actualized its Calleo 330 server series on the new 45-nonometer Opterons from AMD. All Calleos now come with SUSE Linux Enterprise Server (SLES) 10.more »
At the USENIX LISA conference in San Diego, Lee Damon and Mike Ciavarella presented a foundation workship as a tutorial for admins with tips and tricks for working efficiently. The presentors didn't agree on all points, but one commonality was that they advised against running High Performance Computing (HPC) together with virtualization.more »
The virtualization specialist adopted the know-how for the product through its acquisition of Trango Virtual Processorsmore »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm