Gnome 2.24 What's new in Gnome 2.24?Dec 31, 2008
The traditional Fall release of the Gnome desktop ushers in a number of useful new features.more »
Lightweight CMS Tools Lightweight content management systemsDec 31, 2008
Would you like a content management system that's actually easy to manage? We take a closer look at some user-friendly CMS solutions, including Pluck, SkyBlueCanvas, and NanoCMS.more »
Cobbler Automated installation with the Cobbler provisioning toolDec 31, 2008
Cobbler helps you install new systems in a hurry. We'll show you how to use this nifty shoemaker to deploy Xen and VMware virtual machines.more »
More than 14,000 users participated in this year's Linux graphics survey from Phoronix. The results of the study are now out.more »
The OpenSolaris project has issued its second solid release with the Live CD 2008.11, which integrates subprojects such as the installer and package manager.more »
Universal Plug and Play Exploring the Universal Plug and Play ArchitectureNov 30, 2008
Universal Plug and Play provides an easy framework for seamless integration of network devices. Learn how to build your own UPnP solution using the open source BRisa framework.more »
Six months after Fedora 9, the free project is now releasing its newest version 10 of the popular Linux distribution, code-named Cambridge.more »
Software called ArisID should allow developers to write protocol-independent applications that automatically incorporate identity management standards. The overall goal is to protect user data in a dependable and secure manner.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.