Scheduled for release in October, Ubuntu 9.10, codenamed Karmic Koala will come with server cloud computing and a new desktop design.more »
Brazil's municipal schools should be getting more than 350,000 power-saving thin clients for their students.more »
Learning FreeNAS Chapter 2: Preparing to Add FreeNAS to Your NetworkFeb 13, 2009
Configure and manage a network attached storage solution
- Turn a PC into a Network Attached Storage server with FreeNAS
- Configure, manage, and troubleshoot your FreeNAS installation
- Up to date with the latest FreeNAS release
- Includes a comprehensive troubleshooting section
Big Blue is now providing images for Amazon's cloud. A cloud software-as-service (SaaS) for SUSE Linux, among other products, is to follow.more »
IBM's motto for the upcoming CeBIT 2009 trade show in Hannover, Germany in March is "Smarter Planet": "You'll see that transistors will be everywhere -- animals, people, clothing," says Martin Jetter, CEO of IBM Germany, in his keynote at yesterday's conference preview in Munichmore »
Debian Linux founder and former OpenSolaris chief Ian Murdock is taking over the role of chief strategist for cloud computing at Sun Microsystems.more »
Developer Chris Ball has patched the Vino Virtual Network Computing (VNC) server to display multiple simultaneous mouse and keyboard events. The result could be an end to the battle over mouse and keyboard control among local and remote users in a VNC environment.more »
Foomatic is now released in version 4.0. The software creates PDFs, describes external drivers better and includes PPD extensions.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm