spacer spacer

spacer spacer

UnixProNews
SecurityProNews
ITmanagement







Top Articles

Mount Mac and Windows Filesystems in Linux
[2010-11-30] As most offices are mixed platform environments these days, with more Apple products and Linux desktops co-existing with Windows boxes, there was a time when converter applications had to translate files one by one into a format, understandable to each respective system.

Optimizing Your Top Experience (Advanced)
[2010-11-16] My last article, Optimizing Your Top Experience, showed you several tips and tricks that you can use to improve how you use the top command to improve the way you monitor your system. Today, I will share with you some advanced techniques that I use to make top do exactly what I need it to do.

Optimizing Your Top Experience
[2010-11-02] For a long time after I began working in a Unix environment, I was using the top command right out of the box, because that was all I knew. I knew that I could get my machine's load average and memory usage, and other information about running processes, but that was it.

GNU Parallel: Speed Up Processing With Multi-cores, Clusters
[2010-10-19] Looking at the wall that is Moore's Law, computer processor manufacturers placed more than one processor core, each one essentially an independent operating unit, on each chip, but software must be rewritten to take advantage of being able to each core as an individual processor instead of the entire chip as one brute processor. Most software has not been rewritten to target each individual processor core.

Configuring your Sudoers File
[2010-10-05] If you are managing a Unix network, you know that there are things that must be done on a regular basis that require root authentication or user privilege elevation. There are three general options available to you. First, you can be constantly on call from your users, authenticating their commands yourself. This is a good way to lose weight as you will be running around constantly, but not a great way to run a network. Second, you can give out the root password. Ha, ha, ha, I know silly right?

Performance Tuning Apache for Heavy Loads
[2010-09-21] Apache provides a small article on general performance tuning, and it breaks issues down between Hardware/OS, Run-Time Configuration, and Compile Configuration. In many practical applications, you may not have the budget to control hardware resources, and typically we run into performance problems after Apache is already compiled and running. Thus, focusing in on the various configuration options available to boost performance is appropriate for most cases.

Amazon Drops EC2 Cloud Computing Prices Again
[2010-09-09] The price of Cloud Computing continues to fall as Amazon announced in their blog recently that they are once again reducing prices for their cloud services.

Newest Server from IBM Boasts 256-Cores
[2010-08-24] IBM has rolled out it's largest Unix server to date with the new Power 795. It is designed for companies with large-scale database applications or who want to integrate several Unix/Linux systems into one large virtualized system.

The Code that Violates SCO's Copyright: What is Plagiarism in Programming?
[2010-08-10] The ongoing battle of SCO versus the Unix and Linux world continues, and has been a topic of conversation here at unixpronews.com. However, the comments on a unrelated case decision (but related in terms of particular legal definitions that could be applied to some of SCO's cases) has spawned another heated discussion in the comments on what is copyright violation in coding.

Dell Narrows Ubuntu Offerings Online
[2010-07-27] Dell's move to make Ubuntu available over a large segment of their consumer Desktop and Mobile PCs has become common place and provided a huge platform on which *nix systems grew more socially acceptable personal operating systems.

SCO's Battle Against Linux Continues
[2010-07-13] For eight years, the SCO group, which produces several versions of the Unix Operating System, has been on the legal warpath against Linux. It maintains that certain Linux distributors copied portions of Unix for use in their operating systems.

CRON Doing work on your schedule
[2010-06-29] The cron service is a basic utility in UNIX that provides the ability for different processes to be run at specific times each day.

How to Setup Redmine, A Project Management Web Application
[2010-06-15] Many companies and projects have started using an open-source project management tool to manage their projects called Redmine. You can see a short list of known users of Redmine here.

How To Setup Gentoo Style Colors For Bash On Your Linux/Unix System
[2010-06-01] This Linux/Unix tutorial will show you how to colorize your Bash prompt to resemble the colors of Gentoo Linux is easier than you think.

Is it time for OpenSolaris users to jump ship?
[2010-05-17] Since Oracle acquired Sun Microsystems and with it, several open source technologies, OpenSolaris users want to know where Oracle's priorities lie.

BitDefender Rolls Out Antivirus Scanner For UNIX
[2010-05-04] In many organizations UNIX-based workstations are becoming popular as a cost effective computing resource.

Fork Bomb Protection
[2010-04-20] The fork command is a vital part of the Unix shell environment. It works by creating a new thread, called the child, which is identical to the original (parent) thread. From there the new thread will execute the command called by the user, while the shell can either wait for that execution to finish, or can continue on.

Where Does The IT Community Stand Now That Novell Owns Unix?
[2010-04-01] While Novell's ownership of Unix was confirmed by a jury earlier this week, Novell's future as an independent company, at least in its current form, is far from secure. With the recent jury ruling, a Novell acquisition could impact Linux vendors and customers.

SCO Group Receives $2 Million In Financing
[2010-03-19] For better or for worse - and admittedly, many people will say it's for the much, much worse - the SCO Group has received a financial lifeline of sorts. SCO, which filed for Chapter 11 bankruptcy protection in 2007, is set to get $2 million in funding.

Gartner Puts Unix Server Sales Down
[2010-03-01] Given that the last UnixProNews report covered similar findings from IDC, this may not come as a surprise, but there's more not-good news regarding the market for Unix-related hardware. Gartner determined that Unix server sales dropped by a significant amount in the fourth quarter.

IBM Leads In Unix Market
[2010-02-16] Unix servers saw a 23.4 percent revenue decline in the third quarter of 2009 (Q309) compared to the same time period in 2008, according to market research IDC.

IBM Promotes "Future Of Unix Servers"
[2010-02-02] Products that represent "the future of Unix servers" are on their way, according to a new ad from IBM that appeared in the Wall Street Journal. And said products - which are, in fact, the next generation of Power Systems - may be worth a second or even third look.

Encryption: What happened to it?
[2010-01-22] Over the past few years, there have been numerous cases of stolen data from companies. Everything from credit card companies to hospitals have lost the personal data of people. I myself had my credit card data lost, because an employee had account numbers, credit card numbers, and Name on a stolen company laptop.

Korean Bank Upsets Unix-To-Mainframe Migration Trend
[2010-01-05] In a country that's known for producing and consuming advanced technology, Unix is about to lose some ground. BC Card - which is Korea's biggest credit card company - has decided to switch from relying on Unix servers and embrace IBM mainframes, instead.

The Importance of Securely Deleting Data
[2009-12-15] I have worked for some companies the care greatly about deleting data certain ways and others that do not seem to care if you delete data or not. If your company deals with sensitive data that you don't want anyone else to see, you may want to look into a way to securely delete your data.

Newsletter Archive | Article Archive | Submit Article | Advertising Information | Resources | About Us | Contact

UnixProNews is an iEntry, Inc. publication - $line) { echo $line ; } ?> All Rights Reserved Privacy Policy and Legal

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.