OSADL, a consortium of Linux users in the automation industry, has released a realtime Linux kernel for Intel's Atom processor.more »
Theodore Ts'o has renamed the Ext4 filesystem, for which he has been responsible for source and documentation, from extdev to ext4. Linus Torvalds has also incorporated the change into his personal source tree for the upcoming Kernel 2.6.28.more »
KSplice Applying updates to an active kernel with KspliceSep 30, 2008
Uptime is often just as important as updates. But doesn't a kernel patch require a reboot? Ksplice lets you have your cake and eat it too.more »
The third and final day of the Linux Plumbers Conference, a conference designed by developers for developers, featured two final microconferences: one focused on Dbus Desktop Integration, and the other on Future Displays and Input Devices.more »
Greg Kroah-Hartman's keynote address at the Linux Plumbers Convention 2008 was officially about the Linux Ecosystem, but started as a direct attack on Ubuntu developer Canonical. He claims that the company contributes next to nothing to kernel development.more »
The second day of the Linux Plumbers Conference got off to a productive start with an address by Jonathan Corbet, co-founder of LWN.net. "The Kernel Report" covered the challenges facing the kernel development community and the current or pending responses to those challenges, as well as a short summary of the Kernel Summit held earlier this week.more »
KVM Kernel-based virtualization with KVMSep 05, 2008
KVM brings the kernel into the virualization game. We’ll explain why the Linux world is so interested in this promising virtualization alternative.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm