Knoppix 7.3 comprises the current state of Debian GNU/Linux development and comes with the current hardware support of kernel 3.13, a new update function, and extended security and privacy features.
Giada is a small piece of musical software that can be used in many ways. Mainly designed for working with loops, Giada also can be used as a drum machine or be flexibly integrated into your workflow, thanks to VST and MIDI support.
OpenHatch teaches projects how to welcome recruits.
The Java-based TV-Browser software provides a wealth of features that help you organize your evening television viewing.
A laptop with no proprietary BIOS and 100 percent open source software may sound too good to be true, but that’s exactly what Gluglug delivers. Is it a good deal? Read on to find out.
Armed with a US$ 20 hunk of hardware and a free software-defined radio tool, we start the hunt for radio-transmitted data from a weather station.
The Bash Shell Script Compiler converts shell scripts directly into binaries. Compiling your scripts provides protection against accidental changes, but you will have to contend with some quirks.
OSI seeks to bring advanced speech processing to free software.
Chat rooms aren’t just for people. We’ll show you how to access an IRC channel using an automated bot.
Armed only with standard Linux tools, users can recover files, resurrect partitions, and rescue damaged media.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.