Google Earth Exploring Google EarthOct 16, 2009
Google Earth lets you view the world from space and zoom in on towns, roads, and buildings. We’ll show you how to travel our planet’s surface, its cities, and even the sky from your desktop.more »
Introduction to the Google Tool Set Communicate, collaborate, and create with free tools from GoogleOct 16, 2009
Google believes most of what you do on a computer can happen in a browser window – from anywhere in the world. The versatile Google tool set brings that vision to everyday users, and it is all just a few mouse clicks away.more »
3D design applications are somewhat an anomaly among Linux. Sweet Home 3D proves that good, free programs now exist in that market.more »
Akonadi is the magic word for data storage for the KDE 4 desktop. Unfortunately none of the KDE 4 apps really use it. The KDE address book, KAddressBook, should become the first to do so.more »
This past weekend the Wine project released a new version of its Windows emulator. Apart from the numerous obligatory bug fixes, the release includes improvements to the Direct3D 10 API and an initial support for the Open Audio Library (OpenAL).more »
The KDE project's Sebastian Kügler dreams of a desktop that melts, like silk, into the Web. In a writeup to KDE developers he promotes Project Silk for better Web integration.more »
Since Nokia's takeover of Trolltech and the increased presence of Qt, the KOffice suite has been gaining prominence on mobile devices. Developers have been working on new import opportunities of Microsoft Office formats.more »
The Nero company has its latest Nero Linux 4 available now for download for $20.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm