In a new FAQ, Oracle explains their position regarding SPARC, Solaris, Java, MySQL, and Open Office to clear up the many questions circulating.more »
Mobile applications, popularized by iPhone and Android, are getting some further encouragement from chipmaker Intel and its Atom platform.more »
Front End Drupal offers Drupal users, from the complete novice to experienced designers, a focused approach to site design, behavior, usability, and management, with a special emphasis on Drupal theming and interactive design. Includes several examples from start to end.more »
Qt Software from Nokia has kept its promise and released Qt to the community. A roadmap shows the direction the project is heading.more »
Java and .NET Intro Implementing Java and .NET in LinuxApr 30, 2009
In today's heterogeneous environments, it is hard to escape the influence of Java and .NET. So why not come prepared? This month we examine some tools and techniques for integrating the Java and .NET frameworks with Linux.more »
DotGNU Write standards-compliant C# programs in Linux with DotGNUApr 30, 2009
Write C# programs in Linux with the free and vendor-neutral DotGNU.more »
Java on Linux Making sense of Java on LinuxApr 30, 2009
We introduce some tools and projects of the Java landscape.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm