Home Search
fedora - search results
If you're not happy with the results, please do another search
Push and pull network filesystems with ccgfs
Author: Ben Martin
The CC Network Filesystem (ccgfs) lets you mount filesystems over the network using either the push or pull model for connections. Most...
Keep tabs on your finances with HomeBank
Author: Dmitri Popov
"Where does all my money go?" If you want to know the exact answer to that question, you need HomeBank, a personal...
x2x is a software alternative to a KVM switch
Author: David Pendell
Unless you have fully embraced the virtualization movement, you probably have more than one machine in your home or office, particularly if...
Setting up your own certificate authority with gnoMint
Author: Ben Martin
gnoMint is a desktop application that lets you easily manage your own certificate authority (CA). Many secure communications technologies use digital certificates...
Profit Pops at Red Hat But KVM Payoff Will Wait
As income and revenues rise, the Linux vendor sheds some light on its view of the future of hypervisors and Fedora.
Link: internetnews.com
Category:
Linux
Profit Pops at Red Hat But KVM Payoff Will Wait
Author: JT Smith
Despite a slowing U.S. economy, Linux vendor Red Hat continues to grow, thanks in part to uptake of its JBoss middleware solutions...
ASUS Eee PC 901 Linux Boot Performance
Author: JT Smith
With the Atom-based ASUS Eee PC 901 we have already delivered disk encryption benchmarks and a Linux distribution comparison of Xandros, Fedora,...
Easily displaying two-dimensional data with GtkDatabox
Author: Ben Martin
Many applications need to graphically display the relation between two data axes. Common examples are how one resource such as CPU load...
Faster Web page load times for mobile devices with Ziproxy
Author: Ben Martin
Ziproxy is Web proxy server, but rather than cache content the way Web proxies like Squid do, it's designed to compress the...
Securing your network with PacketFence
Author: Cory Buford
Network access control (NAC) aims to unify endpoint security, system authentication, and security enforcement in a more intelligent network access solution than...