• Mount Mac and Windows Filesystems in Linux
    [November 30, 2010] As most offices are mixed platform environments these days, with more Apple products and Linux desktops co-existing with Windows boxes, there was a time when converter applications had to translate files one by one into a format, understandable to each respective system.
  • Optimizing Your Top Experience (Advanced)
    [November 16, 2010] My last article, Optimizing Your Top Experience, showed you several tips and tricks that you can use to improve how you use the top command to improve the way you monitor your system. Today, I will share with you some advanced techniques that I use to make top do exactly what I need it to do.
  • Optimizing Your Top Experience
    [November 2, 2010] For a long time after I began working in a Unix environment, I was using the top command right out of the box, because that was all I knew. I knew that I could get my machine's load average and memory usage, and other information about running processes, but that was it.
  • GNU Parallel: Speed Up Processing With Multi-cores, Clusters
    [October 19, 2010] Looking at the wall that is Moore's Law, computer processor manufacturers placed more than one processor core, each one essentially an independent operating unit, on each chip, but software must be rewritten to take advantage of being able to each core as an individual processor instead of the entire chip as one brute processor. Most software has not been rewritten to target each individual processor core.
  • Configuring your Sudoers File
    [October 5, 2010] If you are managing a Unix network, you know that there are things that must be done on a regular basis that require root authentication or user privilege elevation. There are three general options available to you. First, you can be constantly on call from your users, authenticating their commands yourself. This is a good way to lose weight as you will be running around constantly, but not a great way to run a network. Second, you can give out the root password. Ha, ha, ha, I know silly right?
  • Performance Tuning Apache for Heavy Loads
    [September 21, 2010] Apache provides a small article on general performance tuning, and it breaks issues down between Hardware/OS, Run-Time Configuration, and Compile Configuration. In many practical applications, you may not have the budget to control hardware resources, and typically we run into performance problems after Apache is already compiled and running. Thus, focusing in on the various configuration options available to boost performance is appropriate for most cases.
  • Amazon Drops EC2 Cloud Computing Prices Again
    [September 9, 2010] The price of Cloud Computing continues to fall as Amazon announced in their blog recently that they are once again reducing prices for their cloud services.
  • Newest Server from IBM Boasts 256-Cores
    [August 24, 2010] IBM has rolled out it's largest Unix server to date with the new Power 795. It is designed for companies with large-scale database applications or who want to integrate several Unix/Linux systems into one large virtualized system.
  • The Code that Violates SCO’s Copyright: What is Plagiarism in Programming?
    [August 10, 2010] The ongoing battle of SCO versus the Unix and Linux world continues, and has been a topic of conversation here at unixpronews.com. However, the comments on a unrelated case decision (but related in terms of particular legal definitions that could be applied to some of SCO's cases) has spawned another heated discussion in the comments on what is copyright violation in coding.
  • Dell Narrows Ubuntu Offerings Online
    [July 27, 2010] Dell's move to make Ubuntu available over a large segment of their consumer Desktop and Mobile PCs has become common place and provided a huge platform on which *nix systems grew more socially acceptable personal operating systems.
  • SCO’s Battle Against Linux Continues
    [July 13, 2010] For eight years, the SCO group, which produces several versions of the Unix Operating System, has been on the legal warpath against Linux. It maintains that certain Linux distributors copied portions of Unix for use in their operating systems.
  • CRON ? Doing work on your schedule
    [June 29, 2010] The cron service is a basic utility in UNIX that provides the ability for different processes to be run at specific times each day.
  • How to Setup Redmine, A Project Management Web Application
    [June 15, 2010] Many companies and projects have started using an open-source project management tool to manage their projects called Redmine. You can see a short list of known users of Redmine here.
  • How To Setup Gentoo Style Colors For Bash On Your Linux/Unix System
    [June 1, 2010] This Linux/Unix tutorial will show you how to colorize your Bash prompt to resemble the colors of Gentoo Linux is easier than you think.
  • Is it time for OpenSolaris users to jump ship?
    [May 17, 2010] Since Oracle acquired Sun Microsystems and with it, several open source technologies, OpenSolaris users want to know where Oracle's priorities lie.
  • BitDefender Rolls Out Antivirus Scanner For UNIX
    [May 4, 2010] In many organizations UNIX-based workstations are becoming popular as a cost effective computing resource.
  • Fork Bomb Protection
    [April 20, 2010] The fork command is a vital part of the Unix shell environment. It works by creating a new thread, called the child, which is identical to the original (parent) thread. From there the new thread will execute the command called by the user, while the shell can either wait for that execution to finish, or can continue on.
  • Where Does The IT Community Stand Now That Novell Owns Unix?
    [April 1, 2010] While Novell's ownership of Unix was confirmed by a jury earlier this week, Novell's future as an independent company, at least in its current form, is far from secure.? With the recent jury ruling, a Novell acquisition could impact Linux vendors and customers.
  • SCO Group Receives $2 Million In Financing
    [March 19, 2010] For better or for worse - and admittedly, many people will say it's for the much, much worse - the SCO Group has received a financial lifeline of sorts. SCO, which filed for Chapter 11 bankruptcy protection in 2007, is set to get $2 million in funding.
  • Gartner Puts Unix Server Sales Down
    [March 1, 2010] Given that the last UnixProNews report covered similar findings from IDC, this may not come as a surprise, but there's more not-good news regarding the market for Unix-related hardware. Gartner determined that Unix server sales dropped by a significant amount in the fourth quarter.
  • IBM Leads In Unix Market
    [February 16, 2010] Unix servers saw a 23.4 percent revenue decline in the third quarter of 2009 (Q309) compared to the same time period in 2008, according to market research IDC.
  • IBM Promotes “Future Of Unix Servers”
    [February 2, 2010] Products that represent "the future of Unix servers" are on their way, according to a new ad from IBM that appeared in the Wall Street Journal. And said products - which are, in fact, the next generation of Power Systems - may be worth a second or even third look.
  • Encryption: What happened to it?
    [January 22, 2010] Over the past few years, there have been numerous cases of stolen data from companies. Everything from credit card companies to hospitals have lost the personal data of people. I myself had my credit card data lost, because an employee had account numbers, credit card numbers, and Name on a stolen company laptop.
  • Korean Bank Upsets Unix-To-Mainframe Migration Trend
    [January 5, 2010] In a country that's known for producing and consuming advanced technology, Unix is about to lose some ground. BC Card - which is Korea's biggest credit card company - has decided to switch from relying on Unix servers and embrace IBM mainframes, instead.
  • The Importance of Securely Deleting Data
    [December 15, 2009] I have worked for some companies the care greatly about deleting data certain ways and others that do not seem to care if you delete data or not. If your company deals with sensitive data that you don't want anyone else to see, you may want to look into a way to securely delete your data.