New Hack language adds static typing and other conveniences.more »
Visual Programming with Alice Alice 3.1Sep 09, 2013
If you can use your desktop environment, then you can also write programs: All you need is your mouse, the Alice IDE, and some time to experiment.more »
Qmake for Qt Building Qt projects with QmakeApr 30, 2013
Qt’s own build system Qmake is often overlooked for larger projects, but many experienced developers appreciate Qmake support for shadow builds and pre- or post-build dependencies.more »
Real-World Raspberry Pi Exploring the Raspberry Pi through real-world projectsApr 19, 2013
The single-circuit-board Raspberry Pi computer, only as big as a credit card, makes it easy to gain experience with embedded Linux systems. We'll show you some hands-on examples of how to use the Raspberry Pi in an everyday environment.more »
The Tizen project announces the general availability of Tizen 2.0 source code and SDK.more »
According to Dice, the recession is over for software developers, system administrators, and other IT specialists.more »
Maluuba nAPI Natural language processing with Maluuba’s nAPIJan 23, 2013
Add natural language processing to your own applications with Maluuba’s Natural Language API (nAPI).more »
Tclkit Cross-platform software development with TclkitJan 23, 2013
Although performance differences between scripting languages and classic compiled languages are hardly significant, one disadvantage of scripting languages was that you always had to install an interpreter first. Tclkit lifts this burden.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.