Workspace: Zotero Turn Firefox into a research toolSep 30, 2009
We show you how Zotero can turn Firefox into the ultimate research tool.more »
IBM has joined Canonical to market Ubuntu-based netbooks with IBM's Smart Work applications in emerging world markets. Africa is the beginning.more »
Earlier than previously announced, the OpenOffice Project has released information regarding the newest security updates, spurred on due to gaps in security.more »
Although spam filtering and blocking is helpful for the end user, it doesn't stop the production of spam. KnujOn strikes spam at the source.more »
FreeSWITCH VoIP with FreeSWITCHAug 31, 2009
FreeSWITCH is a powerful and versatile telephony platform that can scale from a softphone to a PBX and even to a carrier-class softswitch.more »
The Danish Competition Authority has conducted a market analysis of office software so as to give governmental agencies recommendations for public purchases. The results are a definite "live and let live" between the competing standards ODF and OOXML.more »
On August 11, a court in Texas banned the sale of Microsoft Word in the US due to a patent lawsuit, concerning XML features, brought by the Canadian company i4i.more »
The Fraunhofer Institute has published a whitepaper on the interoperability of Office Open XML (OOXML) and the Open Document Format (ODF). Microsoft had a hand in its development.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm