Linux New Media AG has presented its annual awards for outstanding contributions to Open Source at CeBIT 2009 in Hannover. The OpenStreetMap project ended up garnering two of the six Linux New Media awards.more »
Expert Python Programming Chapter 10: Documenting Your ProjectFeb 13, 2009
Best practices for designing, coding, and distributing your Python software
- Learn Python development best practices from an expert, with detailed coverage of naming and coding conventions
- Apply object-oriented principles, design patterns, and advanced syntax tricks
- Manage your code with distributed version control
- Profile and optimize your code
- Proactive test-driven development and continuous integration
The new version of the Python content management system (CMS) has split its source code into separate packages, called eggs.more »
The latest release from Java developer Sun fully integrates PHP and offers a taste of Python support.
As usual, Sun Microsystems used its own in-house trade fair to launch a new release.
Django Web Framework Django and the Django Software FoundationSep 30, 2008
We talk to one of the creators of the Django project about the formation of the Django Software Foundation, and we show you how to get started with this user-friendly web framework.more »
Romain Gaucher, a specialist in web security, offers his Scalp tool in version 0.4. The log analyzer searches for attacks on Apache web applications.more »
In his screencast, Douglas Napoleone programs a simple music database by using the Python Django framework. In its now available second version, Napoleone demonstrates how it works in the roughly two hours of the video.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm