Table of Contents: 145 What's inside the December 2012 issueOct 26, 2012
Building a botnet doesn’t necessarily make you an outlaw; we show you how one programmer automated a timesensitive business application with a botnet. Next, get ready to hit the ground running with HTML5, and secure your websites with sound PHP programming principles.more »
- AMD/OpenJDK/Oracle explore use of GPUs
- Smartphone security
- ASF Airavata
- Slackware 14 release
- Shuttleworth funds Inktank/Ceph
- New Apache toplevel project
- Zentyal 3.0 small business server reveals major release
- Keccak wins NIST
- SHA-3 competition
Perl: Microformats Microformats help plan your vacationSep 21, 2012
Microformats add generally accepted tags, such as social network connections or geodetic coordinates, to HTML pages. Automated scripts collect them and help represent the data in graphically appealing ways – for example, geodata for vacation destinations.more »
Welcome EditorialSep 21, 2012
Patent law is a very imperfect tool for establishing moral culpability. Whether you favor patents or not, it is important to face the fact that patent law is a construct of the business world. Patents protect opportunities for patent holders and restrict opportunities for others – all for some supposedly greater purpose, we are told, but in any case, none of this ever has the clarity that will allow you to point your finger at a violator as you would at someone who stole your car. So I don’t have a lot of faith in patents, but I still have a feeling you’ll do better in life if you come up with your own solutions.more »
Doghouse: Know Thyself Strategic planningSep 21, 2012
Mission, vision, and value statements can help define small businesses, corporations, and movements – including FOSS.more »
Android's market share climbs to 64.1%– up 20.7 percentage points from 2011.more »
Table of Contents: 142 Going VirtualJul 24, 2012
Your virtualization options continue to expand. This month, we look at two popular solutions. First, we show you how to map your virtual disks to optimize your KVM installation. Then, we examine the ins and outs of virtualization with VMware’s free vSphere Hypervisor 5.0.more »
- Red Hat Addresses Secure Boot
- FSF Addresses Secure Boot
- Android 4.1 Jelly Bean
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.
Popular desktop environment continues the Gnome 2 legacy – with new support for the Gnome 3 toolkit.
The Obama White House has issued a memorandum telling all US government agencies they must use HTTPS for all websites and web communication.
New program will dial up security for the Firefox browser.
Red Hat's community distro embraces the cloud.
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.