Projity, the company behind the free OpenProj software reports more than 25,000 downloads of the project software within the first week after the release.more »
The Google software package now contains a free version of Sun's StarOffice, the commercial variant of the free OpenOffice.org office software.more »
IBM has now released the new version of the Lotus Notes Groupware and Collaboration Suite for Linux servers. Besides numerous enhancements and a new, Java-based architecture, the Red Hat Enterprise Linux 5 now provides a Linux distribution-based platform for the server.more »
Following Firefox and Thunderbird, a known URL security bug was closed in the Seamonkey browser suite in August. A similar bug has now been found in Konqueror.more »
Swiss vendor Archivista offers a document management solution comprising T2 Linux, OCR software, scanning software, archiving software and hardware. Version VIII of the GPL'd including the free OCR programs Ocrad 0.17 and Tesseract 2.0 is now available for downloading.more »
The new Sage Classic Line 2008 ERP solution now runs on the Collax Solution Platform based on a Linux server.more »
O3Spaces Extending OpenOffice.orgJun 30, 2007
Microsoft has been quite successful with pushing its SharePoint technology as a means for supporting document collaboration and version control. Until now, no direct competitors have come up with a viable alternative to SharePoint, but O3Spaces is about to change that.more »
Recoll Finding files with RecollMay 31, 2007
Whether you’re looking for a letter to the Internal Revenue Service or an email from an online trader, the Recoll desktop search machine will help you find it with just a few mouse clicks.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm