Keyboardio Open Hardware Comes to the KeyboardJul 16, 2015
Keyboardio is not only one of the first open keyboards, it looks poised for modest profitability as well.more »
Building LibreOffice Online LOOL brings online document editing and viewingApr 08, 2015
Collabora and Ice Warp team up to create LibreOffice Online (LOOL) for online and collaborative document creation and viewing.more »
Laidout Book Creator Bookbinding on the ScreenMar 10, 2015
The Laidout graphic application simplifies the design of books and booklets.more »
Pi-Top Prepares to Revolutionize Open Hardware Do-It-Yourself Laptop KitJan 13, 2015
Riding the popularity of the Raspberry Pi, a new company is producing a modular laptop kit to house small-board computers.more »
The League of Moveable Type Open Source FontsNov 18, 2014
The Free Font Movement is transforming free software, one character at a time.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.more »
Snowdrift.coop The Funding DilemmaOct 21, 2014
Snowdrift.coop aims to solve some of the problems facing free software funding by linking the amount of an individual pledge to the number of donors willing to share the financial commitment.more »
Lennart Poettering wants to change the way Linux developers talk to each other.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm