Welcome Guest | Sign In
LinuxInsider.com
Match the Big Data Job to the Big Data Solution
April 27, 2012
In the rush to play in the Big Data game, it's easy to forget the fundamentals. The fear of being left behind can cause enterprise IT teams to move directly into pilot projects with a choice of products and technologies that may not be best designed to solve the identified business problem.
Linux Admin Manual Is a Great Reference Tool That's Not for Dummies
April 24, 2012
Linux Administration: A Beginner's Guide by Wale Soyinka is a hands-on manual for IT staffers who must dance with Windows and Linux. It is a practical guide for network admins who deploy and maintain Linux and other free and open source software. In this Sixth Edition opus, Soyinka provides an extensive update on the latest Linux distros.
Amazon Adds a Hint of Eucalyptus to AWS
March 27, 2012
Amazon Web Services has teamed up with private cloud infrastructure provider Eucalyptus in a move that could enable the deployment of hybrid clouds. Hybrid clouds are a combination of internal private clouds and external public clouds.
Iceland Has the Hots for FOSS
March 26, 2012
The government of Iceland recently launched a one-year migration project for all its public institutions in what appears to be an acceleration of its movement toward free and open source software and away from proprietary systems. The project will apparently lay the foundation for the migration with a common infrastructure.
OpenSUSE, Linus' Daughter, and a Question of Security
March 08, 2012
There's nothing like a rant to get the conversational ball rolling here in the Linux blogosphere, and if it can be a rant from Linus Torvalds himself, well, it doesn't get much better than that. That, in fact, is just what last week afforded in the form of a Google+ post from the father of Linux on the topic of openSUSE security. "I don't think I can talk about 'security' people without cursing, so you might want to avert your eyes now," Torvalds began.
Loophole Could Give Android Devs a Private Picture Show
March 02, 2012
Similar to Apple's iOS, Android is apparently vulnerable to apps secretly copying photos. Android developer Ralph Gootee created a test app that masquerades as a simple timer but steals the most recent image on the user's smartphone and posts it on a public photo-sharing site. Critics said the development further emphasizes the danger of Google's hands-off approach to the Android Market.
VMware Hatches Spring Hadoop Cross-Breed for Big Data
March 02, 2012
Virtualization giant VMware has unveiled Spring Hadoop, which integrates its Spring Framework with the Apache Hadoop platform. Spring provides a comprehensive, lightweight framework that will make it easier for devs to build solutions around the Hadoop platform, according to the company. Spring Hadoop is available under the open source Apache 2.0 license and can be downloaded free.
The Whens, Whats and Hows of iPad 3
February 11, 2012
A Wall Street Journal report on Thursday gave Apple fans all the excuse they needed to indulge in some more speculation regarding the iPad 3 -- if that is its real name, and if whatever it is even exists. Apple's kind of tight-lipped about this stuff. At this moment in the tablet universe, it's hard to guess what kind of grand and monumental new features Apple would want to add to the iPad.
Facebook to Investors: You Like What You See?
February 04, 2012
Facebook's finally decided to take a head-first dive into the mountain of cash it's been standing on for years. Following several days of heated rumors and years of speculation about when CEO Mark Zuckerberg was finally going to cash in his chips, the company filed an S-1 statement with the SEC, paving the way for an IPO as early as this May.
New Android Scare: Just How Malignant Is That Malware?
January 31, 2012
Antivirus vendor Symantec announced recently that up to 5 million Android devices may have been infected with a particular type of malware. Multiple publishers were pushing out apps -- some of which were found in the official Android Market -- containing malware known as "Counterclank," according to the AV company.
Windows 8 Secure Boot - or How Microsoft Is Riling Up the Linux Masses
January 23, 2012
What a difference a week makes. It was just the other day that Linux bloggers were celebrating the news from researcher Net Applications that desktop Linux had surged in popularity in recent months. Now, the mood in the blogosphere has plummeted once again as a result of the latest developments on the Windows 8 front.
CRM in 2012: Big Changes in the Wind
January 09, 2012
The CRM landscape is shifting gears -- and it looks as though 2012 will be the year that will see investments in technologies to cash in on a veritable explosion of social media, mobile and integration opportunities. The winners in 2012 will be those that can figure out new ways to distinguish themselves on the customer service front, said Ajay Kapoor, vice president of customer service for Avaya.
Can Amazon Save Android From Malware Hell?
December 20, 2011
As Android continues its breathtaking rate of growth, malware directed at the platform is keeping pace. Studies from McAfee and other antivirus software providers warn that Android is a breeding ground for malicious software. Google has come under fire as a result.
Top 5 Linux Predictions for 2012
December 13, 2011
Linux continues to grow both its reach and credibility among enterprise IT users and customers, bringing competition, price and time-to-market pressure and options to key markets such as cloud computing and mobile software. Looking at the coming year for Linux, these are the key areas to watch: cloud computing, Platform as a Service, Android, the automobile industry -- and not the desktop.
EMC's Atmos Smooths the Path to Cloud-Based Storage as a Service
December 06, 2011
New enhancements to EMC's Atmos Cloud Delivery Platform are designed to ease the way enterprises and service providers implement and access public and private cloud storage. VMware vApp packaging should simplify installation, and improved visibility and reporting tools provide the means to expand cloud metering services and improve administrative reporting and controls
Open Source, Abundance and Open Innovation
November 15, 2011
Open source and innovation are locked in a dynamic and symbiotic relationship. Open source, community-based development evolved to meet developer needs for access and openness. While early open source represented innovation in development processes -- and, of course, was enabled by the emergence of the Internet and Web search -- it did not always result in innovation in terms of breakthrough new technologies.
Enterprise Security System Puts Android Under Lock and Key
October 12, 2011
The proliferation of smartphones has created headaches for security-minded IT departments everywhere, but a Motorola subsidiary aims to give system administrators more peace of mind with a solution for managing Android phones in business environments. Three Laws Mobility, purchased by Motorola eight months ago, announced Tuesday that its management solution for Android phones is now ready for prime time.
Red Hat Grabs Gluster in Big Data Play
October 05, 2011
In a move to expand its enterprise cloud storage capabilities, Red Hat will spend $136 million to acquire Gluster, a storage company that builds management tools for data centers and cloud services. The companies announced the deal Tuesday, and the deal is expected to close by the end of the month.
Facebook Enlists Websense for Neighborhood Watch
October 04, 2011
Facebook, long a darling of cybercriminals looking to lure in unsuspecting cybersocializers, has partnered with content security vendor Websense to help protect members from links that lead to malware and malicious sites. That may prove good news to corporations, where many IT managers consider employees' use of social media a security threat but where few of them do much about it.
That Was the Breach That Was
September 27, 2011
A series of intrusions into the heart of the Linux Kernel.org servers in late August that went undetected for some 17 days is still shrouded in mystery. If Linux developers know how the breach occurred, they are not saying. They also are keeping mum on the extent of any damage the break-in caused.

See More Articles in Enterprise Section >>
Facebook Twitter LinkedIn Google+ RSS