Building a data center from scratch doesn't just mean getting the latest in gear. It also brings with it the latest power, cooling and data center design. Here's what one company did.
Building a data center from scratch doesn't just mean getting the latest in gear. It also brings with it the latest power, cooling and data center design. Here's what one company did.
<b>Phoronix:</b> "...we took this opportunity to deliver a fresh set of *BSD benchmarks. In this article we have benchmarks of PC-BSD 8.0 x64 against Kubuntu 9.10 x86_64."
<b>Free Software Magazine:</b> "Most people with an interest in software freedom will turn to GNU/Linux as their operating system of choice. Few realize however, that the vast majority of GNU/Linux distros are not entirely free. Imagine migrating away from Windows, only to find that by installing GNU/Linux you are accepting a restrictive Microsoft license!"
<b>Ubuntu Geek:</b> "GNOME Commander aims to fulfill the demands of more advanced users who like to focus on file management, their work through special applications and running smart commands. This program is not aimed at users wanting the weather forecast in a sidebar in their file manager."
Virtually Speaking: In the next battleground for the cloud, IBM's choice of Red Hat's virtualization technology may be changing the landscape, but don't count VMware out just yet.
Database security should have multiple locks at multiple layers with multiple keys (and perhaps some barbed wire, an electric fence, a moat and a mean junkyard dog as well). With all these locks and keys, some locksmith skills are certainly useful. Rebecca Bond introduces some of her favorite DB2 Locksmith tips.
With an HD display and an HDMI port, HP's $400 netbook is all about the video -- at least until we try it and find that an 11.6- rather than the usual 10.1-inch screen is irresistible for everyday productivity, too.
Turning on auditing is easy; knowing what to do with it is entirely different. Learn how to create a standard audit trail using Oracle’s Enterprise Manager.
Many database shops have no idea of the security breaches that occur across user granted privilege and floating unused synonyms. James Koopmann offers tips for granting privileges explicitly to a user or group of users, and assigning privileges to a role and then granting that role to users.
With an HD display and an HDMI port, HP's $400 netbook is all about the video -- at least until we try it and find that an 11.6- rather than the usual 10.1-inch screen is irresistible for everyday productivity, too.
<b>LWN.net:</b> "But in reality the FLOSS ecosystem relies on a complex legal framework in order to run smoothly and to stand up to proprietary software competition: the various software licenses, contribution agreements, copyright and other "intellectual property" law."
IT security firm Sense of Security has demonstrated how a vulnerability in older versions of the Web server could giver hackers control over databases.