Many companies try to create a free software project around their products; however, ownCloud has taken the opposite approach, creating a company around a project.more »
34 Free Software Advocates Elected to European Parliament Free Software Wins in European ElectionsJun 16, 2014
Free software advocacy groups in Europe signed up 162 pro-free software candidates, 34 of whom were elected to the European Parliament.more »
Fast-Tracking Speech Recognition The Open Speech Initiative BeginsMar 10, 2014
OSI seeks to bring advanced speech processing to free software.more »
MakePlayLive Releases New Single-Board System Open Hardware Collective Takes on the Big VendorsDec 17, 2013
The KDE Vivaldi tablet isn’t here yet, but its development team is proposing cooperative businesses and open hardware as the future of free software.more »
The Linux-libre Project Freeing the Linux KernelNov 04, 2013
The Linux kernel and its penguin mascot are widely viewed as the symbol of free and open source software. The truth, however, is that the Linux kernel is only partly free.more »
Introducing the Accessible Computing Foundation Assistive TechnologySep 23, 2013
Assistive technologies may be the next major challenge for free software.more »
Replicant: The Struggle for Free Mobile The Struggle for Free MobileAug 26, 2013
Most people are under the impression that Android is free software, so why the need for Replicant, a project that describes itself as a “fully free Android distribution”?more »
GNOME Women in Open Source Project The GNOME Outreach Program for WomenJun 28, 2013
The GNOME Outreach Program for Women has seen success that other programs set up to encourage women in FOSS have not. We look at some of the reasons why.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm