Bazaar, the open source distributed version control system software has been released in version 1.10.more »
Seamless Integration Intro Expert techniques for living with WindowsNov 30, 2008
Yes, you can do that with Linux… Even if you want to live in an open source world, it's still full of Windows. This month we study strategies for Windows integration.more »
Open Source Job Scheduler Open Source Job SchedulerNov 30, 2008
Planning and scheduling jobs can mean a lot of work, especially if they are spread across multiple machines. Here's a tool to make that task a lot easier.more »
Today R1Soft announced the beta release of Hot Copy for Linux, a command-line utility that takes instant readable and writeable snapshots of disks or volumes on any Linux server.more »
Linux company Red Hat has announced the beta release of version 5.3 for Red Hat Enterprise Linux 5 (RHEL) products.more »
Aimed at small to mid-sized businesses, the Systems z10 Business Class (BC mainframe is IBM's leaner, cheaper version of the high-end mainframe released in February.more »
Green IT Intro Examining power consumption in LinuxSep 30, 2008
How much power is your system really using? And how much can you actually save with the new generation of energy-conserving techniques and components? This month we study the phenomenon known as Green IT.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm