Researchers at the Sandia National Laboratories said on Tuesday that they have successfully run more than one million Linux kernels as virtual machines on a single high-performance cluster.
Read more »US labs virtualize 1 million Linux kernels
- Login to post comments
IBM, Virtual Bridges and Canonical Introduce VERDE 2.0 Linux-server based Virtual Desktop
Virtual Bridges’ new VERDE 2.0 now integrates client-side hypervisor for offline PC use. Virtual Bridges, IBM and Canonical announced today the immediate availability of the newest version of a Linux-server based virtual desktop with the release of Virtual Bridges’ VERDE 2.0 software.
Read more »- Login to post comments
Get your GObject on with Vala
We've all heard the rants: Mono has patents, Microsoft releases community promise, community ignores, flamewars continue. Enough to make any developer want to stop programming out of sheer annoyance. Mono is an excellent language and platform; there's nothing anybody can do to change that. People will continue to develop C# apps, and those that continue to hate Mono will continue to complain.
Read more »- Login to post comments
Announcing PTS Desktop Live 2009.3
It has been no secret that we have been working to create our own Linux distribution that is designed to run off a Live DVD/USB device and would provide a standardized free software stack for running hardware benchmarks
Read more »- Login to post comments
Ingres aims to exploit modern CPUs
Ingres has announced it is working with VectorWise to improve database performance through fully exploiting the capabilities of modern CPUs. They are planning to create Ingres/VectorWise, a new product which incorporates the new techniques, for release in mid-2010.
Read more »- Login to post comments
Have You Been Hacked by Metasploit? Find Out!
Didn't think it was possible to detect a Metasploit attack? New open source tool will change your mind.
Read more »- Login to post comments
The Mystical Magical Secure Shell, Part 1
The secure shell is much more than a simple way to keep your passwords to yourself. For instance, it's possible to tunnel ports you may not have access to (if the machine is behind a firewall) through the SSH port. SSH makes it possible to run remote graphical sessions easily. You can even securely log in without a password. SSH is a veritable Swiss Army knife of OS toys.
Read more »- Login to post comments
BIND 9 DNS under attack - time to update
BIND 9 is a popular open source DNS server, and arguably the most deployed DNS server in use today. So even though this is a flaw in one DNS server (as opposed to DNS itself which was Kaminsky's flaw), it is highly critical.
Read more »- Login to post comments
Make the most of large drives with GPT and Linux
Preparing for future Linux disk storage with the GUID Partition Table
Read more »- Login to post comments
WASC Honeypot Opens Up With Open Source mod_security
The idea behind the IT security concept known as the honeypot is all about luring hackers into a server or network so they can be tracked. The Web Application Security Consortium (WASC) has its own particular brand of honey to attract would-be attackers -- a blend of open source and open proxies.
Read more »- Login to post comments
Recompiling PHP5 With Bundled Support For GD On Ubuntu
You'll learn how to recompile PHP5 with bundled support for GD on Ubuntu to use advanced GD functions for image editing, like desaturation, and so on.
Read more »- Login to post comments
Opensourc3 Magazine Issue #1 is released
OPensourc3, a magazine for Open Source Unified Computing has released issue #1. Articles cover Hypervisor and Cloud technologies, Virtualization and KVM, Deploying iSCSI in Linux, management with Puppet and more.
Read more »- Login to post comments
Linux your way with SUSE Studio
One of the great things about Linux is that it’s possible to do almost anything with the OS – scale it up, scale it down, customize it to suit your needs. But it’s much easier said than done. Creating your own Linux-based OS is no small feat. Or wasn’t. Until SUSE Studio.
Read more »- Login to post comments
So, is nice, nice and simple?
The command nice, and its corresponding function, nice(), appear to be quite simple. A non-privileged user can “nice” a process so that it gets less CPU time. Do you know more about nice? Try the quiz below.
Read more »- Login to post comments
Is pre-linking worth it?
The recent problem with prelink in Fedora Rawhide has led some to wonder about what advantages pre-linking actually brings—and whether those advantages outweigh the pain it can cause. Pre-linking can reduce application start up time—and save some memory as well—but there are some downsides; not least the possibility of an unbootable system as some Rawhide users encountered.
Read more »
