The Linux Foundation welcomes Samsung Electronics as a Platinum member.more »
Germany rejects the European Commission directive requiring phone and internet companies to store records.more »
• CloudStack moves toApache
• Red Hat Data Grid 6 beta released
• News Bites
• Blue Systems sponsors Kubuntu
• IBM PowerLinux Solutions
• Spyrus Pocket Drive
• Ubuntu 12.04 LTS for desktop launched
• Ubuntu 12.10 flies with Quantal Quetzal
• Coverity 6.0 released
Table of Contents: 140 Chips & GadgetsMay 29, 2012
This month’s emphasis is on hardware. We look at video acceleration, smartphone security, and new life for old devices.more »
• The Linux Foundation welcomes four new members
• Gnome 3.4 released
• News Bites
• Unbreakable Enterprise Kernel 2
• Vector Linux 7.0 Light
• Linux 3.3
• XBMC 11.0
• Metal-as-a-service provisioning tool
• Knoppix 7.0 with kernel 3.2.4
• SUSE milestones
• MythTV 0.25 out
• Android emulator improved
• Qt 5 Alpha source only release
Doghouse: Open Source Plumbing Community NotebookMar 02, 2012
maddog imagines what it would be like to own a Microsoft-certified toilet.more »
Windows secure boot controversy gets uglier.more »
As you will see if you read our news, Hewlett Packard, which everyone calls HP, was big this month. The computer giant announced some sweeping changes, including sweeping changes to undo the sweeping changes they announced a few months ago.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm