US corp. XenSource announces version 4 of its XenEnterprise virtualization software for Monday.more »
SWsoft, which produces the Virtuozzo virtualization software among other things, reports a 127 percent increase in turnover for the first 6 months of 2007 compared to the previous year's figures.more »
Consolidating 3900 servers on 30 Linux mainframes based on IBM's own Z Series has helped IBM to cut its power bill considerably. Power consumption has dropped by up to 80 percent.more »
Virtual Machines Intro Linux in the dawn of the virtual eraSep 01, 2006
Virtualization can save you time, money, and effort, but you’ll need to find the right tool for the task.more »
VMware ESX Server Practical virtualization with ESX ServerSep 01, 2006
Improved resource balancing, central administration, and service consolidation – you can only win with virtualization. Linux Magazine visits a communal data center for a practical look at virtualization in the workplace.more »
VServer High performance virtualization with VServerSep 01, 2006
The VServer project offers a secure and highly efficient virtualization alternative.more »
Xen 3 Para-virtualization in Linux with Xen 3Sep 01, 2006
The Xen virtualization system is is quickly becoming a standard feature of corporate Linux. We’ll show you how to get started with the latest version of Xen.more »
Virtualization on IBM and Sun Servers Virtualization with entry-level servers by IBM and SunSep 01, 2006
The top players on the Unix server scene all include virtualization support with their operating systems. We compared two candidates from IBM and Sun.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.