CeBIT Open Source Project Lounge -- AdempiereERP AdempiereERP -- True Open Source Enterprise Ressource PlanningFeb 03, 2009
AdempiereERP is among the 15 projects that will present their work at CeBIT, offering an enterprise ressource planning for the German market.more »
With a bug fix release the OpenOffice team has enhanced its free open application suite and added a few features in the mix.more »
Free office solution OpenOffice.org is still in the best of shape, based on reactions from project members to Novell developer Michael Meeks's recent pessimistic view. The Linux Foundation is one of many who are concerned. All want one thing: more.more »
Workspace: Business Data Business intelligence with OpenOffice.org BaseDec 31, 2008
Learn how to analyze your business data with the help of OpenOffice.org Base and the Sun Report Builder extension.more »
Novell developer Michael Meeks has warned of an increasing imbalance in the OpenOffice.org Project. His concerns: too few developers, inadequate code maintenance and the gradual withdrawal of companies like Sun.more »
With the “Implementation Notes”, Microsoft has published documents recording the integration of Open Document Format (ODF) 1.1 into its Office 2007 package.more »
Google Chart Eye-catching graphics with the Google Charts APINov 30, 2008
The Google Chart API lets you draw custom graphs, charts, maps, and barcodes through a simple web interface.more »
Once considered by Bill Gates and Steve Ballmer as a plague on all software and the work of the devil, open source software is now accepted with open arms by Microsoft, even evoking their active support.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm