OpenShift is an open source hybrid cloud application Platform as a Service (PaaS) developed by Red Hat. Red Hat also offers a version of OpenShift for private clouds called OpenShift Enterprise.
OpenShift uses Red Hat Enterprise Linux (RHEL) and its SELinux (Security-Enhanced Linux) subsystem as its foundation. OpenShift supports multiple languages for ease of development, including Java, PHP, Python, Ruby, Perl and Node.js.
- Collaborative Editing
Collaborative editing is a process of writing and editing documents or projects by more than one person. Collaborative editing software tools like Firepad and Textflow as well as services like Google Docs facilitate collaborativelyediting individual computer files by multiple users. Business Benefits of Collaborative Editing Collaborative editing can be performed in real-time or in non-real-time. […]
- virtual Ethernet (vEth)
Virtual Ethernet (vEth) is a virtual interface within a network switch that dynamically provisions virtual machine (VM) operations based on network policies stored in the switch. The IEEE 802.1Qbg working group is responsible for developing the official virtual Ethernet (vEth) specification, and is tasked with creating a virtual Ethernet standard that will provide access for […]
- Key Lime Pie (Android Codename)
Key Lime Pie is the dessert-themed Android codename for the upcoming 4.4 update of the open source Android mobile operating system. Key Lime Pie is expected to be released in late 2013 as the successor to the v4.1, v4.2 and v4.3 “Jelly Bean” updates. New features and enhancements in Key Lime Pie are unknown at […]
- BLU Acceleration
BLU Acceleration is an IBM technology designed to help enterprises tackle big data, enabling users to have faster access to key information. The BLU Acceleration software extends the capabilities of traditional in-memory systems by providing in-memory performance even when data sets exceed the size of the memory. According to IBM, during testing, some queries in […]
- Mobile Malware
Malicious software (“malware”) that is designed specifically to target a mobile device system, such as a tablet or smartphone to damage or disrupt the device. Most mobile malware is designed to disable a mobile device, allow a malicious user to remotely control the device or to steal personal information stored on the device.