Google SketchUp Fearless 3D with Google SketchUpFeb 25, 2009
If you feel intimidated by 3D computer modeling, you’ll be pleased to find Google SketchUp. Now in release 7.0, Sketchup is extraordinarily simple to use and free for personal use.more »
Introduction to Google Tools A view from inside the Google ToolsetFeb 25, 2009
Save time and simplify your life with Google’s innovative online tools.more »
Lightweight CMS Tools Lightweight content management systemsDec 31, 2008
Would you like a content management system that's actually easy to manage? We take a closer look at some user-friendly CMS solutions, including Pluck, SkyBlueCanvas, and NanoCMS.more »
Adobe, maker of Photoshop and Flash, has released version 1.5 of its AIR platform for Linux. The software allows Web users to run so-called Rich Internet Applications (RIAs) without resorting to a browser.more »
Codenamed "Coltrane", the major release of Wordpress 2.7 comes with more than a few changes.more »
Thunderbird is nearing its premiere. Not too much is new, but there are many changes. The first beta of the free mail client provides a faster search and better IMAP integration. Creating email accounts and managing addresses and the calendar should be more intuitive.more »
Google Chart Eye-catching graphics with the Google Charts APINov 30, 2008
The Google Chart API lets you draw custom graphs, charts, maps, and barcodes through a simple web interface.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm