All presentations from the Open Source Forum at CeBIT 2012 are now available for free from the Linux Magazine video archive.more »
At the Linux New Media Awards 2012 prize giving ceremony for special achievements in the field of Linux and free software, Libre Office and Android each took two of a total of seven prizes.more »
Kernel News Hand-Picking PIDS; Massive Boot-Time Speedup; and Columns, Shmollums – the 80 characters per line dilemma.Mar 02, 2012
Chronicler Zack Brown reports on the latest news, views, dilemmas, and developments within the Linux kernel community.more »
Charly’s Column: Linux Fair The sys admin’s daily grind: OpenRhineRuhrJan 03, 2012
According to Goethe, the best way to gain an education is to travel. Sys admin Charly went to Oberhausen, Germany, for the OpenRhineRuhr fair last week.more »
Since the death of Steve Jobs, a lot has been written about him. I never met the man in person, but I admired the work Apple did in creating well-designed products.more »
“What are you going to say about Steve Jobs?” everyone has been asking me – or at least, the rare subset of people who know about this column and are also sufficiently co-located to bump into me in restaurants and bars. “Important guy…he changed the world…must be lots to mention…”more »
In June of this year, kernel developer Greg Kroah-Hartman sat down with Linus Torvalds in front of a live audience at LinuxCon Japan to look at the first 20 years of Linux, the state of the kernel, and the future of Linux.more »
Doghouse: Hey, Hey, Good-bye Cleaning out the computer closetJun 27, 2011
maddog says good-bye to some old friends and envisions new relationships.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm