Wanted: A Free Accounting Application for Non-Profits Non-Profit Accounting SoftwareMay 20, 2013
The Software Freedom Conservancy is raising funds to fill a major gap in free software functionality.more »
Firefox Extensions Getting More from FirefoxFeb 24, 2013
Firefox features many high-quality extensions to help improve productivity, protect your privacy, and more.more »
Potlatch 2: OpenStreetMap Editor Fast Mapping: Editing OpenStreetMap with Potlatch 2Feb 08, 2013
If you need a tool to make minor modifications in OpenStreetMap, Potlatch 2 is a useful choice as a fast and easy-to-use editor.more »
Bitcoin Basics Bitcoin Digital CurrencyJan 29, 2013
Bitcoin is a decentralized virtual currency, popular with hackers and the open source community. We’ll explain how the money is created and how it works.more »
Maluuba nAPI Natural language processing with Maluuba’s nAPIJan 23, 2013
Add natural language processing to your own applications with Maluuba’s Natural Language API (nAPI).more »
Avoiding Eye Strain Color Temperature ToolsDec 28, 2012
Do you have problems getting to sleep after a late night computer session? Does the monitor brightness hurt your eyes? Several Linux tools are available that could help with these problems.more »
Workspace: QuickNote and Geeknote Introduction to QuickNote and GeeknoteDec 19, 2012
Sorting through the array of note-taking tools and their features can be overwhelming. We look at two applications that offer a simple approach.more »
Table of Contents: 144 HadoopSep 21, 2012
Getting into high-performance computing has never been easier. We investigate HPC cloud computing and a popular Big Data platform.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.