Ever wanted to clone your database for testing? This article from IBM.com offers the basics of cloning a DB2 database for Linux, UNIX, and Windows Operating Systems.
Looking for a web application stack? Find out all the important distinctions and trade-offs among the available solutions from the points-of-view of a few developer types.
Research firm Gartner argues in a new report that servers that are virtualized end up being less secure than before when it comes to network security. But it also has advice on how they can be better secured.
Check out this free service that lets you build Web forms for your small business ecommerce site. Plus, how you use Google Alerts and a streaming audio tool.
Facing an uphill fight against titans IBM, HP and Dell, the Japanese systems vendor believes it has its own secret sauce to take on the data center and gain cloud computing market share.
Facing an uphill fight against titans IBM, HP and Dell, the Japanese systems vendor believes it has its own secret sauce to take on the data center and gain cloud computing market share.
Hard-Core Hardware: The age of solar power is fast arriving, and it may be keeping the lights on in a data center near you. The former downsides, chiefly cost constraints, no longer apply.
Hard-Core Hardware: The age of solar power is fast arriving, and it may be keeping the lights on in a data center near you. The former downsides, chiefly cost constraints, no longer apply.
<b>ERACC Web log:</b> "This article is a rebuttal to Michael Gartenberg’s Opinion: Linux on the desktop: Still not happening over at Computerworld Operating Systems. Executive Summary: Michael Gartenberg is wrong."
Bob Muglia's PASS keynote addresses on Tuesday revealed a rack that contained 8 different IBM machines, configured with 192 different CPUs. Ted Kummert demonstrated SQL Server Report Builder 3 and discussed Microsoft's Information Platform Vision. 	
Many security breaches occur across user granted privileges and floating unused synonyms. That being said, the question becomes, how can we get a handle on this. Read on to learn more...
Recently acquired, the Metasploit project is a popular pen testing framework loved by white- and black-hats alike. Now that it has a corporate parent, does it have a future as a viable open source project?
<b>Tech Broiler:</b> "We talk about Canonical's upcoming Ubuntu 10.04 LTS release for Desktop and Server, and the company's near term goals for 2010 and 2011."
Few projects end up having too much time. Successfully completing a project often depends on tackling core, significant, and risky aspects of any custom solution first—like the long hard march up hill—and finishing with the trim, or cosmetic work, last.
<b>The Register:</b> "San Francisco's rogue sysadmin Terry Childs, who refused to reveal passwords when he was sacked, could learn his fate later today."