- FTC ends Google investigation
- Samba implements Windows AD
- News Bites
- Ubuntu launches a new phone OS
- Samsung announces Tizen phone
- Perl turns 25
Big Data DB
- vert.x project leader
- Apache Cassandra v1.2 released
- HPC app contest
Canonical announces a smartphone interface for the Ubuntu operating system.more »
Discovering the New Gnome Gnome starts to reinvent itself, cautiouslyDec 28, 2012
The last few years have been troubled for the Gnome Project. Once a premier desktop environment for Linux, it has seen its market share diminish amid user dissatisfaction over Gnome 3 and accusations that the project was ignoring users. Yet, over the last six months, something important has been happening: Slowly and quietly, the members of Gnome have started trying to turn the situation around.more »
Red Hat Inc. joins a European Union initiative working to create LEADS (Large-scale Elastic Architecture for Data-as-a-Service) for mining and analyzing web data.more »
Doghouse: Industry Report The software industry and developing countriesDec 19, 2012
A recent report highlights some advantages as well challenges for implementing free software in developing countries.more »
- Red Hat Releases RHEL 6.4 beta and Enterprise Virtualization 3.1
- Amazon Announces Redshift Data Warehouse Service
- Ceph on SUSE
- XtreemFS 1.4
New organization will oversee interoperability and standards for the popular open source database.more »
Kernel News Zack’s Kernel NewsNov 26, 2012
Chronicler Zack Brown reports on the latest news, views, dilemmas, and developments within the Linux kernel community.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm