Open source project Panda provides Software to create your own do-it-yourself video platforms -- provided you also pay for the Amazon Web Services.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
U.S. Linux distributor Red Hat has bought the virtual computing solutions vendor Qumranet.more »
Etherboot.org project leader Marty Connor describes the benefits of network booting with open source firmware.more »
Workspace: WikidPad A wickedly useful applicationJul 09, 2008
What is WikidPad? Well, that’s a tough one. The author calls it an “IDE for thoughts,” and although that’s a pretty good description, it just doesn’t really do WikidPad justice. Basically, WikidPad is what you want it to be: a notebook, an address book, a to-do manager, and a desktop wiki.more »
PCManFMFile Manager PCManFM with tabbed browsingJul 07, 2008
Convenient file management beyond Nautilus and Konqueror is very much a real option. The PCManFM program is an attractive option with lean architecture and innovative features.more »
Workspace: wikiCalc Wikified approach to the spreadsheetJul 01, 2008
wikiCalc is a unique tool that offers a combination of spreadsheet functionality and wiki features. This may sound like a strange pairing, but wikiCalc provides a refreshingly new approach to the spreadsheet concept.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.