Hard-Core Hardware: Disk fragmentation is a significant problem for many data centers. Virtualization only makes it worse. Find out what steps you can take to mitigate it.
Andrew Lock shows how to serve your customers by challenging industry norms, innovate with existing products and combine information with promotion to with your customers.
<b>Enterprise Storage Forum:</b> "Choosing the right solid state drive (SSD) for your enterprise storage networking environment is a critical decision — and equally critical is making sure you have the right controller to get the most out of the pricey drives."
<b>Linux Magazine: </b>"digiKam is an immensely powerful photo application, so learning all its features requires time and effort. But this capable photo management application also offers a few easy to use features which you can use to instantly improve your shots."
<b>LWN.net:</b> "The chief of the Unix side was Evi Nemeth. The first thing that struck most people about Evi was a general sense of distraction and disorganization; it's only later that one realized the she was one of those smart people who make things happen."
If you work in a corporate IT shop, then Windows 7 is mostly likely in your future, and it may come sooner rather than later, according to a panel of financial and technology analysts queried by InternetNews.com.
<b>Linux Pro Magazine:</b> ""People with disabilities deserve to have control of their own technological destinies." With this statement, the Free Software Foundation (FSF) announces that it is turning its attention to accessibility."
<b>InfoWorld:</b> "Source code availability is a central factor in establishing trust in the open source community, as knowledge that the source is available can often allay fears about the future of a particular open source project or product. And yet, this trust can often be overstated."
Hackers took advantage of a security gap in Yahoo Messenger and a bevy of Windows operating systems to spread malware through the instant messaging client.
Understanding the total cost of ownership as it applies to technology will help you make better buying decisions for your company and save you time, money and aggravation. Analyst Laurie McCabe explains what you need to know about TCO.
<b>Cyberciti:</b> "How do I make sure only authorized person access my backups stored on the tape drives (DAT, DLT, LTO-4 etc) under Linux or UNIX operating systems? How do I backup /array22/vol4/home/ to /dev/rmt/5mn or /dev/st0 in encrypted mode?"
<b>eSecurityPlanet:</b> "An audit by the Justice Department's Office of the Inspector General reveals that while the FBI and Justice Department have made "various efforts" to fight identity theft crimes in recent years, these initiatives have "faded as priorities" mainly because the agencies have failed to develop a coordinated plan to deal with what's become an epidemic of cybercrimes."
Understanding the total cost of ownership as it applies to technology will help you make better buying decisions for your company and save you time, money and aggravation. Analyst Laurie McCabe explains what you need to know about TCO.
As the use of mobile devices continues to soar, enterprise cloud applications are now resident in the palm of your hand. With this mobility comes ever greater responsibility to keep enterprise data safe.
<b>Facebook:</b> "We built Flashcache to help us scale InnoDB/MySQL, but it was designed as a generic caching module that can be used with any application built on top of any block device."