Linus Torvalds, Ted Ts'o, Alan Cox, Ingo Molnar, Andrew Morton and other Linux kernel developers are embroiled in a contentious discussion over the sense -- or nonsense -- of journaling and delayed allocation before a commit in the ext3 and ext4 filesystems. Heavy words are flying.more »
Wicd Network Manager Easy network access with WicdMar 29, 2009
Mobile users change networks in rapid succession. Wicd quickly and conveniently manages the corresponding profiles.more »
Nagios Traffic Light Adding a homebuilt warning light to your data centerMar 29, 2009
A clever combination of Nagios and a doityourself traffic lights lets you know how your network is feeling.more »
A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.more »
Novell announced today that SUSE Linux Enterprise Server (SLES) is officially out in version 11. The SLES extensions for Mono and the desktop version SLED 11 should also concurrently hit the market. A high-availability extension is to follow.more »
Rumors of a Red Hat takeover have been circulating since time immemorial. Maybe this time there's some truth to it.more »
Kernel 2.6.29 has arrived and brings with it a string of new features. We're presenting some of them and describe what to make of them.more »
As of this summer, Sun Microsystems will provide storage and computing resources for cloud computing. They intend to open up the APIs with a public review process.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.