Gscan2pdf Electronic document archives with gscan2pdfOct 31, 2007
Many scanner tools confuse users with functional overkill. The clear-cut gscan2pdf scanning aid gives users a simple approach to converting existing paper documents into space-saving PDF files.more »
The office suite builds on Open Office adding a plethora of graphical elements and fonts.more »
Open Source service provider Corratech recently released Opensuite, a platform for the integration of heterogeneous enterprise applications.more »
UK-based ARM is looking to develop a Linux platform for mobile devices in cooperation with six partners.more »
Software vendor Autodesk is looking to release a geodetic program for the conversion of geographical data into various formats as Open Source.more »
IBM's Lotus Symphony will be unable to break the dominance of Microsoft's Office package according to market researchers Gartner. Open Office still has too many deficits for enterprise use, they say, and the future belongs to Web-based office and collaboration solutions.more »
KDE 4 Preview of KDE 4.0Sep 26, 2007
The first KDE 4 beta release gives users a sneak preview of the many innovations the next K Desktop generation will introduce.more »
About one week after IBM joined the Open Office project, Big Blue is releasing its own free office package. The office software, dubbed Lotus Symphony is based on Open Office.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm