Red Hat and Microsoft have deepened their partnership even further in the virtualization realm under the concept of "interoperabiity." Cross-certification should lead to more satisfied customers.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
The Open vSwitch open source project has announced development of a sofware switch for virtual environments.more »
Microsoft caused a sensation with its release of its Hyper-V virtualization driver -- now its inclusion in the Linux kernel could be in doubt.more »
Announced at the Red Hat Summit in Chicago, the Red Hat Enterprise Linux version 5 update intends to set the groundwork for future virtualization products and cloud computing.more »
Market researcher IDC predicts that Linux will continue steady growth over the next five years, reaching into the billions of dollars in 2012.more »
Virtualization provider VMware has purchased open source firm SpringSource for $420 million.more »
QEMU and Qemu Manager Sneaking Linux into WindowsJul 31, 2009
Carry a virtual Linux machine with you wherever you go.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.