- September 19, 2008
Canadian firms team up with Novell on the Free the Penguins giveaway, which enables 10 students to share one computer running SUSE Enterprise Linux Desktop and saves energy too.
- September 15, 2008
Cisco Systems has transformed its data center into on-demand computing resource with Linux as an agile, cost-effective platform for rapid virtualization.
- September 13, 2008
Microsoft and Novell have made good on their 2006 interoperability pact with adapters to speed performance of their respective OSes on the other's hypervisor.
- September 10, 2008
Recent survey data reveals that Linux figures prominently in data centers, but it's unclear whether Linux has grown at the expense of Windows or of legacy systems.
- September 08, 2008
Fedora 10 debuts next month, with features to simplify administration, improve power efficiency and refine access controls -- changes that will ultimately find their way into Red Hat Enterprise Linux.
Sponsored by SimpliVity - Databases like SQL Server and Oracle are very dependent on disk storage, and database performance is tightly coupled to storage performance. There is often blanket guidance about storage array features to enable or disable. For example, most database tuning guides recommend disabling deduplication on the database storage. See More
Sponsored by SolidFire - “Never run out of disk space” became the storage administrator’s prime directive because of the big difference between storage and the rest of an organization’s IT infrastructure. When the network guys slightly underestimate the bandwidth they’ll need to provide, the network gets congested and applications slow down. Similarly, if the server crew ends up running a few too many VMs on too few hosts, the VMs run slower. See More
Sponsored by SolidFire - When a host server fails to deliver a sufficient level of IOPS, the solution is often to invest in solid-state storage. As many organizations have discovered, however, solid-state storage is a costly solution that may only temporarily correct the problem. Like any other storage technology, there is a limit to the number of IOPS that solid-state storage can deliver, and it is often only a matter of time before this limit is reached and the performance problems return. See More
Sponsored by Dell - Bimodal IT is a new paradigm in development. Find out how it improves outcomes, and learn the first steps to making your organization a bimodal operation. See More
- September 05, 2008
Novell SUSE will give users the option of using the SELinux security tool, but the company will continue to recommend its own simpler AppArmor tool.
- September 04, 2008
By purchasing Qumranet, the developer of the KVM hypervisor, Red Hat now touts itself as on par with Microsoft' in providing "end to end" virtualization.
- August 26, 2008
The University of Arkansas now has courses devoted to Linux on the mainframe. It also has a loaned z900 machine, which it shares, along with compute resources, with other schools.
- August 20, 2008
Sabre Holdings, the parent of Travelocity, has standardized on Red Hat Enterprise Linux 5 to lower cost, improve performance and troubleshoot code issues without relying on a vendor.
- August 15, 2008
Merrill Lynch touted its "stateless computing" cloud at LinuxWorld. But one analyst countered that the project pushed the limits of technology to the edge.
- August 07, 2008
In an effort to expand its foothold in the Linux market, Oracle Corp. has created an Unbreakable Linux partnership program and signed 15 vendors to it.
- August 07, 2008
IBM took advantage of LinuxWorld in San Francisco to announce a bevy of new products and partnerships promoting Linux.
- August 04, 2008
A Trusted Computer Solutions security tool helps protect Linux servers from attack. The tool will be featured at the 2008 LinuxWorld show.
- August 03, 2008
Rising energy costs and increasing data center complexity require the merging of IT and facilities tasks, says an Avocent exec, who will present at this year's LinuxWorld conference.
- August 03, 2008
SELinux has made strides in protecting systems from intrusion by unauthorized access but its lack of user-friendliness remains a weakness.