Linux - News, Features, and Slideshows
Linux in pictures
Now more than ever, the development of the Linux kernel is a matter for the professionals, as unpaid volunteer contributions to the project reached their lowest recorded levels in the latest "Who Writes Linux" report, which was released today.
By Jon Gold | 19 February, 2015 02:43
SUSE 12 is a broad set of Linux distributions ranging from desktop through enterprise level. We tested several instances and found them quite ready for enterprise use. All in all, SUSE 12 is a worthy competitor to Red Hat and Ubuntu in the enterprise Linux market.
By Tom Henderson | 20 January, 2015 08:23
Open-source software plays an increasingly prominent role in many areas of modern business IT it's in servers, databases and even the cloud. Vendors like Red Hat, Canonical and others have managed to graft open-source principles onto a profitable business model. The former company became the first open-source-centered business with $1 billion in annual revenue in 2012.
By Jon Gold | 03 December, 2014 00:20
Reformatting and restoring a PC is not fun--in the way spending 2 hours in the dentist's chair is not fun. You have to back up all your data (and pray that you haven't forgotten anything), reformat the hard drive, install Windows, track down missing drivers, find and reload all your software, restore your data, and pull out clumps of hair over the things you inevitably neglected to save. (Firefox plug-ins, anyone?)
By Rick Broida | 05 February, 2011 01:51
With all the many compelling reasons for a company to switch to Linux on the desktop, it's no wonder that businesses large and small are increasingly relying on the free and open source operating system.
By Katherine Noyes | 27 January, 2011 06:52
There are many ways that vendors of proprietary products try to scare business customers away from open source software, and one of the more commonly heard examples involves vague fears about compliance with open source licenses. There's nothing like the specter of a good lawsuit to scare a company back into a paid vendor's welcoming arms.
By Katherine Noyes | 05 November, 2010 10:49
Network World's analysis of publicly listed sponsors of 36 prominent open-source non-profits and foundations reveals that the lion's share of financial support for open-source groups comes from a familiar set of names.
By Jon Gold | 10 January, 2015 02:05
Mark Shuttleworth's recent closure of Ubuntu Linux bug No. 1 ("Microsoft has a majority market share") placed a meaningful, if somewhat controversial, exclamation point on how far Linux has come since Linus Torvalds rolled out the first version of the OS in 1991 as a pet project.
By Serdar Yegulalp | 15 July, 2013 14:11
Getting ready to review a Linux distribution is usually pretty straightforward. After some background research into the distribution's history, you download the latest ISO and beseech the head of IT to lend you a netbook or scrounge up some moth-infested, aging desktop PC.
By Rohan Pearce | 10 May, 2011 15:30
The Motorola Xoom was the most advanced tablet that we got to try out at Mobile World Congress. Other tablets, including the HTC Flyer, certainly look promising, but the Xoom is the launch device for the Google Android Honeycomb OS - the version of Android developed specifically for tablets - and the devices on show at MWC were fully working ones used for live demonstrations.
By Rosemary Hattersley | 20 February, 2011 02:59
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
This research report explores the importance of security strategy and Cyber Threat Intelligence. The purpose of the study is to understand how companies are using, gathering and analyzing threat intelligence as part of their IT security strategy. Some of the topics covered are: Whether timely, accurate and actionable cyber threat intelligence make a difference in blocking or preventing external attacks. Are companies using cyber threat intelligence effectively to make informed decisions about how to respond to a menace or hazard
- Rio Tinto signs $20m managed services contract with Empired
- Sony keeps optical discs alive with storage startup acquisition
- Legal trouble in wearables business: Jawbone sues Fitbit
- Lenovo shows smartphone that lets users interact with projected content
- Government hopes to pass site-blocking legislation next month
- Apache Cordova fixes flaw that could cause apps to crash
- MacTel unveils leaseback plan for Intellicentre 2 data centre
- Wi-Fi access point scans can betray a person's location
- Biometrics funding to help deliver identity assurance, Dutton says
- ISPs, rights holders continue negotiations over anti-piracy code costs
- Lenovo's new Windows 10 tablet to arrive in August
- Woolworths to resell services on Telstra's network
- After medical marijuana, Sidecar eyes alcohol and pharmaceuticals
- CA gets 'agile' with $US480 million purchase of Rally
- The cost of a data breach has jumped 23 per cent in two years