<b>CIO:</b> "A new open source project, dubbed Opendedup, has appeared with the goal of creating a deduplication-based file system for Linux called SDFS."
<b>Linux Planet:</b> "Now with the Landscape 1.5 release, Canonical, the lead commercial sponsor behind the Ubuntu Linux operating system, is extending its management platform as it looks to further grow its enterprise business."
Caching can greatly improve performance but it can also lull you into a false sense of security. In some cases it can even make the performance worse. If you haven't already, then now is the time to learn the issues and limitations of caching so that you can truly improve performance.
Caching can greatly improve performance but it can also lull you into a false sense of security. In some cases it can even make the performance worse. If you haven't already, then now is the time to learn the issues and limitations of caching so that you can truly improve performance.
With over 100,000 new activations a day, Google's Android software is hot, but the finished version of Google's newer Chrome OS hasn't shipped yet. What's Google's strategy?
The introduction of the xml data type, with its own set of methods for processing xml data, made it possible for SQL Server developers to create columns and variables of the type xml. Deanna Dicken examines the modify() method, which provides for data manipulation of the XML data stored in the xml data type via XML DML statements.
<b>Linux Magazine:</b> "At last year's event participants received Android phones with a free month of service, fueling speculation that this year's attendees may receive some goodies as well."
With this new release, Novell's identity management tools/framework cover the move of services and identity floating in the clouds, and more tools for access and security on the way.
Bash error messages, like so many error messages, can be more cryptic than helpful. But the good news is bash has a built-in mechanism for creating your own customized error messages, and you don't have to be an ace programmer to do it. Ubuntu and openSUSE already use this; Akkana Peck shows us how to do it ourselves.
<b>CNet:</b> "Google and an alliance of privacy groups have come to Yahoo's aid by helping the Web portal fend off a broad request from the U.S. Department of Justice for e-mail messages, CNET has learned"
<b>Tech Republic:</b> "A few weeks ago I had the distinct displeasure of waking up to a series of emails indicating that a series of RAID arrays on a remote system had degraded. The remote system was still running, but one of the hard drives was pretty much dead."
<b>Thoughts on Technology:</b> "As of 10.04 beta I have begun using the KDE desktop environment. I really like many of the things KDE has to offer, however KDE's network manager applet (knetworkmanager) still is lacking compared to Gnome's applet."
In this economy, IT professionals have to make smart choices when it comes to spending money on developer tools. Does the new Intellisense feature of SQL Server 2008 Management Studio make third party intelligent code completion tools like Red Gate SQL Prompt obsolete?
<b>Ksplice:</b> "We think that it’s important for developers and system administrators to be more knowledgeable about the attacks that black hats regularly use to take control of systems, and so, today, we’re going to start from where we left off and go all the way to a working exploit for a NULL pointer dereference in a toy kernel module."
<b>IT World:</b> "The OSI has been one of those organizations that seemed to fall short of its true potential, which is always a source of frustration; you want them to succeed, and don't understand when things go awry."
<b>LinuxLinks:</b> " Now, let's scrutinize the 8 games at hand. For each game we have compiled its own portal page, providing screenshots of the game in action, a full description of the game, with an in-depth analysis of the features of the game, together with links to relevant resources and reviews."
States are passing more and more data security laws, the US Senate and the House have bills meandering through Congress, securing personal information and encrypting that data is no longer optional.