Linaro announces the formation of the Linaro Enterprise Group (LEG). Linaro is a not-for-profit engineering organization that develops open source software for ARM architecture.more »
Welcome EditorialOct 26, 2012
I’m looking at another crop of press releases and marveling at the ever-expanding market for products that fall under the ubiquitous heading of Big Data. Big Data is everywhere. (Or is it Big Data are everywhere – to reprise that classic quandary?) Gigantic file storage appliances from vendors like Oracle and HP and software tools like Apache Hadoop continually add new building blocks to the data infrastructure. And the goal of all this? Apart from more conventional uses for scientific modeling and analysis, one of the reasons for this huge interest in accumulating data is a phenomenon known as data mining, which Wikipedia defines as a process that “attempts to discover patterns in large data sets.”more »
Table of Contents: 145 What's inside the December 2012 issueOct 26, 2012
Building a botnet doesn’t necessarily make you an outlaw; we show you how one programmer automated a timesensitive business application with a botnet. Next, get ready to hit the ground running with HTML5, and secure your websites with sound PHP programming principles.more »
- AMD/OpenJDK/Oracle explore use of GPUs
- Smartphone security
- ASF Airavata
- Slackware 14 release
- Shuttleworth funds Inktank/Ceph
- New Apache toplevel project
- Zentyal 3.0 small business server reveals major release
- Keccak wins NIST
- SHA-3 competition
Perl: Microformats Microformats help plan your vacationSep 21, 2012
Microformats add generally accepted tags, such as social network connections or geodetic coordinates, to HTML pages. Automated scripts collect them and help represent the data in graphically appealing ways – for example, geodata for vacation destinations.more »
Welcome EditorialSep 21, 2012
Patent law is a very imperfect tool for establishing moral culpability. Whether you favor patents or not, it is important to face the fact that patent law is a construct of the business world. Patents protect opportunities for patent holders and restrict opportunities for others – all for some supposedly greater purpose, we are told, but in any case, none of this ever has the clarity that will allow you to point your finger at a violator as you would at someone who stole your car. So I don’t have a lot of faith in patents, but I still have a feeling you’ll do better in life if you come up with your own solutions.more »
Doghouse: Know Thyself Strategic planningSep 21, 2012
Mission, vision, and value statements can help define small businesses, corporations, and movements – including FOSS.more »
Android's market share climbs to 64.1%– up 20.7 percentage points from 2011.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm