Tuesday, October 28, 2014

Suse enterprise Linux can take your system back in time

Suse enterprise Linux can take your system back in time | Quick Look: Ubuntu 14.10

ITworld Linux and Open Source Strategies

Google Plus LinkedIn Facebook Twitter


Microsoft (hearts) Linux, for Azure's sake
Microsoft now loves Linux. That was the message from Microsoft CEO Satya Nadella, standing in front of an image that read "Microsoft [heart symbol] Linux," during a webcast Monday to announce new services it has added to its Azure cloud, including the Cloudera Hadoop package and the CoreOS Linux distribution. In addition, the company launched a marketplace portal, now in preview mode, designed to make it easier for customers to procure and manage their cloud operations.[ Next read: 16 weirdest places you'll find Linux ] Microsoft also plans to release an Azure appliance, in conjunction with Dell, that will allow organizations to run hybrid clouds where they can easily move operations between Microsoft's Azure cloud and their own in-house version.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: NetBrain Technologies

Why Legacy Diagramming Fails Our Businesses
Accurate network diagrams are the Holy Grail in enterprise network management – most network teams know they should be documenting their networks but haven't found a universally good way of doing it. Learn More

WHITE PAPER: Absolute Software Corporation

Extend Compliance And Risk Management To What Really Matters
While governance, risk management, and compliance (GRC) programs have matured well over time, this maturity has come mostly in response to new and changing regulations, which has resulted in programs that are narrowly focused on protecting employees, investors, consumers, and other stakeholders — not on protecting the business itself. Learn More

Suse enterprise Linux can take your system back in time
Which will be handy when configuration changes don't go well. Read More

Quick Look: Ubuntu 14.10
The latest release of Ubuntu focuses on application updates, maintenance and stability enhancements. Read More

Ubuntu turns 10: A look back at desktop Linux standard bearer
A brief history of Ubuntu, as alliterative as all-get-out. Read More


WHITE PAPER: Infoblox

A Cybercriminal's Guide to Exploiting DNS for Fun and Profit
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do--as an easy target. Learn how you can effectively secure your DNS infrastructure today. Learn more >>

Got 5 minutes? Take ITworld's audience survey and you could win $500
This brief, 10-question survey will help us learn more about you, our readers. The survey should take no more than 5 minutes of your time, and at the end of the survey you will be given the opportunity to enter a drawing to win a $500 cash prize. Go on, what have you got to lose? Read More

Canonical celebrates cloud freedoms with new Ubuntu
Canonical continues to aggressively equip its flagship Ubuntu Linux server software with more tools to help users build and run clouds. The open-source OS now comes with the latest edition of the Docker virtualization container technology and, for the first time, Pivotal's Cloud Foundry stack for running platform services. Both software packages allow customers to more easily move their applications and services around the data center and onto the cloud. [ Quick Look: Ubuntu 14.10 ] "Until not that long ago, people built applications to run in a particular application server environment that may have been supported only on a limited number of operating systems or database environments. They had a restricted choice of options," said Mark Baker, Canonical cloud and server product manager.To read this article in full or to leave a comment, please click here Read More

Vulnerability in widely used 'strings' utility could spell trouble for malware analysts
One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, but it can actually lead to a system compromise, a security researcher found. String extraction is typically done using a Linux command-line tool called strings that's part of GNU Binutils, a collection of tools for binary file analysis and manipulation available by default in most Linux distributions. Google security engineer Michal Zalewski was recently running a type of vulnerability testing known as fuzzing against a library called libbfd (the Binary File Descriptor library) that sits at the core of GNU Binutils and is used for file format parsing. Fuzzing is the act of providing unexpected input to an application like libbfd in order to trigger potentially exploitable behavior.To read this article in full or to leave a comment, please click here Read More


ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!

SALARY SURVEY:

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_linux as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.