The SCALE 11x conference is rapidly approaching. This year’s event will be held February 22-24, 2013 at the Hilton Los Angeles Airport hotel.more »
HP’s Zero Day Initiative (ZDI) announces details for the annual Pwn2Own competition.more »
National Day of Civic Hacking events are being planned across the USA.more »
- NVidia gaming device
- Qt 5.0 Released
- Oracle NoSQL DB 2.0
- SuperSpeed USB 3.0
- FTC ends Google investigation
- Samba implements Windows AD
- News Bites
- Ubuntu launches a new phone OS
- Samsung announces Tizen phone
- Perl turns 25
Big Data DB
- vert.x project leader
- Apache Cassandra v1.2 released
- HPC app contest
Table of Contents: 148 What's inside the March 2013 issueJan 23, 2013
Science fiction authors and high-tech visionaries dream of a future where humans and computers communicate in ordinary English. A new cloud-based tool brings that future a little closer.more »
The Linux New Media Awards are back! Organized by the publisher of Linux Magazine and Linux Pro Magazine, these awards honor projects, organizations, people, and companies for their outstanding contributions to the Linux/FLOSS community.more »
With its move into Hall 6, CeBIT is now allocating even more space to the Open Source Area in 2013. The Open Source Forum, together with the Open Source Park making up this themed area on CeBIT, will benefit from the move as well.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm