With Windows 8.1, Microsoft tries to correct the mistakes made in Windows 8 that are still keeping users and companies from using the new operating system. Besides the half-hearted revival of the Start button and the ability to boot directly into the desktop, it includes some interesting features.
SUSE has released the third update of its enterprise distribution. Along with updated software and bug fixes, Novell has added new drivers, storage and networking improvements, and support for UEFI secure boot to the current release.
External staff, home offices, individual smartphones, and cloud services like Dropbox can easily drive a security-conscious admin crazy. But, Novell's Filr file storage system is designed to solve most of these problems.
As availability requirements continue to grow, Microsoft intends to do away with database mirroring in its SQL Server product. We show you some alternative options in SQL Server 2012 and 2014.
A big advantage in virtualization is the ability to move systems from one host to another without exposing the user to a long period of downtime. To that end, the hypervisor and storage component need to cooperate.
Many HPC sites with petabytes of data need some sort of backup solution. Among the many candidates, cloud storage is a serious contender. In this article, we look at one solution with some serious advantages: S3QL.
Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A.R.T. features of drives. But is S.M.A.R.T. the best way to predict impending drive doom?
Criminals often focus on browsers for various attacks because they are a worthwhile, attractive, and often easy target. However, admins can investigate such attacks with forensic tools that provide the ability to reconstruct browser sessions.
Since Microsoft announced the discontinuation of its Threat Management Gateway (TMG) – successor to the Internet Security and Acceleration (ISA) Server – companies have been looking for an adequate replacement. Citrix jumps into the breach with its various NetScaler products.
Applications such as web browsers can open up vulnerabilities and threaten an entire system. As a remedy, Capsicum provides the option of finely granulated allocation of privileges on top of sandboxing.