<b>Channel Register:</b> "Ohio computer components reseller Provantage accidentally let slip pricing information for the forthcoming "Magny-Cours" eight- and 12-core Opteron 6100 series of processors for two- and four-socket boxes"
<b>eSecurityPlanet:</b> "An audit by the Justice Department's Office of the Inspector General reveals that while the FBI and Justice Department have made "various efforts" to fight identity theft crimes in recent years, these initiatives have "faded as priorities" mainly because the agencies have failed to develop a coordinated plan to deal with what's become an epidemic of cybercrimes."
<b>Lifehacker:</b> "Plenty of utilities can recover deleted files, but what if you can't boot your computer, or the whole drive has been formatted? Here's how to dig deep and recover the most elusive deleted files, or even whole partitions."
Hard-Core Hardware: Disk fragmentation is a significant problem for many data centers. Virtualization only makes it worse. Find out what steps you can take to mitigate it.
<b>Linux Magazine: </b>"digiKam is an immensely powerful photo application, so learning all its features requires time and effort. But this capable photo management application also offers a few easy to use features which you can use to instantly improve your shots."
If you work in a corporate IT shop, then Windows 7 is mostly likely in your future, and it may come sooner rather than later, according to a panel of financial and technology analysts queried by InternetNews.com.
<b>Phoronix:</b> "...it turns out that Canonical may actually deploy Btrfs this year. Not only to provide an installation option within the installer for Btrfs, but to make it the default file-system."
<b>Enterprise Storage Forum:</b> "Choosing the right solid state drive (SSD) for your enterprise storage networking environment is a critical decision — and equally critical is making sure you have the right controller to get the most out of the pricey drives."
Hard-Core Hardware: Disk fragmentation is a significant problem for many data centers. Virtualization only makes it worse. Find out what steps you can take to mitigate it.
Andrew Lock shows how to serve your customers by challenging industry norms, innovate with existing products and combine information with promotion to with your customers.
<b>WEBM Project:</b> "Though video is also now core to the web experience, there is unfortunately no open and free video format that is on par with the leading commercial choices. To that end, we are excited to introduce WebM, a broadly-backed community effort to develop a world-class media format for the open web."
Hackers took advantage of a security gap in Yahoo Messenger and a bevy of Windows operating systems to spread malware through the instant messaging client.
Adobe Acrobat and Reader PDF applications are vulnerable to a new attack that relies on social engineering to trick users into clicking on something they shouldn't.
New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official.
<b>Linux Pro Magazine:</b> "And that's if the update installs at all, as there have been reports that the download cycle hits an endless loop and never fully completes."
<b>Tux Radar:</b> "To kill the time between now and the announcement of what's to come in the next version, we decided to take a look at the keywords used to describe previous Ubuntu releases to see how priorities have changed over the years"