The developers of the free Madwifi WLAN driver for Atheros chipset-based devices are discussing the foundation of a non-profit organization.more »
Seven months after the first alpha version, Novell and the community have made it on schedule: the new, free Suse distribution includes a KDE 4 preview, one-click installation, the new Libzypp package manager, and an accelerated boot process.more »
The Canary Isles now rely almost entirely on Linux in education.more »
Within the scope of the EU "FLOSSMETRICS" project, participant Carlo Daffara investigated how much truth the "Ten Myths about Open Source Software" actually contain.more »
KDE 4 Preview of KDE 4.0Sep 26, 2007
The first KDE 4 beta release gives users a sneak preview of the many innovations the next K Desktop generation will introduce.more »
The Debian project secretariat can call Debian developers to vote via Article 5.2 of the Debian Constitution. The aim is to shorten the Project Leader election and to become more communicative.more »
The 100 dollar laptop, which was designed for use in structurally underdeveloped areas, is available to the general public for a limited period, bundled with a sponsored machine for a child in need.more »
At its own Intel Developer Forum (IDF) the semiconductor manufacturer introduced its power saving initiative. Under the Less Watts umbrella a number of Open Source projects have joined forces to help reduce the power consumption of Linux systems.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm