Video Straming Streaming servers and codecsJul 10, 2008
If you want to use Linux to stream video over the Internet, you might have to fight your way through a jungle of codec alphabets. The available software is anything but intuitive. This article will help you pick the options that best fit your needs.more »
OpenLaszlo Cross-browser Internet applications with OpenLaszloJul 08, 2008
Long before Ajax hit the scene, Flash gave developers a basis for designing interactive web content. The OpenLaszlo framework, with its easy-to-learn command syntax, is the foundation on which many Flash applications build.more »
Workspace: DokuWiki Plugins DokuWiki pluginsJul 01, 2008
DokuWiki is a useful wiki system already, but you can take its functionality to a whole new level using some of the available plugins.more »
Mozilla Firefox 3 Beta 3 The next generation: Mozilla Firefox 3May 31, 2008
The next major release of Firefox promises changes to the user interface and serious speed benefits. Firefox 3 seamlessly integrates the Gtk environment and offers a plethora of new features.more »
Prism Launching web applications in PrismApr 30, 2008
More and more manufacturers are starting to offer their services directly in the form of web applications. Prism lets you use them like local applications.more »
Gaël Duval has announced the first beta release of the Ulteo Application System. This innovative Linux distribution aims to drastically simplify the use of computers applying thin client principles to do so.more »
Wind River is the first commercial vendor to conform with the Linux Foundation’s CGL 4.0 specificationmore »
Developer Daniel Bernstein has placed his Qmail mail server in the public domain.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm