- September 19, 2008
Canadian firms team up with Novell on the Free the Penguins giveaway, which enables 10 students to share one computer running SUSE Enterprise Linux Desktop and saves energy too.
- September 15, 2008
Cisco Systems has transformed its data center into on-demand computing resource with Linux as an agile, cost-effective platform for rapid virtualization.
- September 13, 2008
Microsoft and Novell have made good on their 2006 interoperability pact with adapters to speed performance of their respective OSes on the other's hypervisor.
- September 10, 2008
Recent survey data reveals that Linux figures prominently in data centers, but it's unclear whether Linux has grown at the expense of Windows or of legacy systems.
- September 08, 2008
Fedora 10 debuts next month, with features to simplify administration, improve power efficiency and refine access controls -- changes that will ultimately find their way into Red Hat Enterprise Linux.
Sponsored by Splunk - The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More
Sponsored by IBM - User demand of flash storage is growing fast, as design innovation, efficiency, low cost, and storage virtualization drive adoption. Learn why users are choosing flash storage. See More
Sponsored by Dell - In today’s business environment, software has become a critical differentiator in determining business success. A recent article in Harvard Business Review postulates that every business is a competitor on a software playing field, no matter what sector it is in. See More
Sponsored by SimpliVity - Databases like SQL Server and Oracle are very dependent on disk storage, and database performance is tightly coupled to storage performance. There is often blanket guidance about storage array features to enable or disable. For example, most database tuning guides recommend disabling deduplication on the database storage. See More
- September 05, 2008
Novell SUSE will give users the option of using the SELinux security tool, but the company will continue to recommend its own simpler AppArmor tool.
- September 04, 2008
By purchasing Qumranet, the developer of the KVM hypervisor, Red Hat now touts itself as on par with Microsoft' in providing "end to end" virtualization.
- August 26, 2008
The University of Arkansas now has courses devoted to Linux on the mainframe. It also has a loaned z900 machine, which it shares, along with compute resources, with other schools.
- August 20, 2008
Sabre Holdings, the parent of Travelocity, has standardized on Red Hat Enterprise Linux 5 to lower cost, improve performance and troubleshoot code issues without relying on a vendor.
- August 15, 2008
Merrill Lynch touted its "stateless computing" cloud at LinuxWorld. But one analyst countered that the project pushed the limits of technology to the edge.
- August 07, 2008
In an effort to expand its foothold in the Linux market, Oracle Corp. has created an Unbreakable Linux partnership program and signed 15 vendors to it.
- August 07, 2008
IBM took advantage of LinuxWorld in San Francisco to announce a bevy of new products and partnerships promoting Linux.
- August 04, 2008
A Trusted Computer Solutions security tool helps protect Linux servers from attack. The tool will be featured at the 2008 LinuxWorld show.
- August 03, 2008
Rising energy costs and increasing data center complexity require the merging of IT and facilities tasks, says an Avocent exec, who will present at this year's LinuxWorld conference.
- August 03, 2008
SELinux has made strides in protecting systems from intrusion by unauthorized access but its lack of user-friendliness remains a weakness.