RapidSMS offers a flexible framework for developing SMS-based applications, and PhoneGap streamlines the art of cross-platform app development.more »
Drupal and WordPress often hog the spotlight, but other content management systems offer impressive performances. This month, we look at the latest Joomla release and check out concrete5.more »
This month, we explore open source science projects. The young TileMill project is a powerful mapping tool for cartographers, HUBzero provides a platform for scientific collaboration, and the NASA-sponsored Virtual Microscope magnifies specimens without breaking any glass slides.more »
Neither time nor politics can stay the progress of Project Cauã.more »
Need some extra cash? Enjoy a challenge? Not afraid of a little competition? If this sounds like you, then put on your coding cap and dive into an open source contest.more »
Cache: Lib-Ray HD video for fixed media, but without DRMJun 27, 2011
Beyond DRM restrictions with the new Lib-Ray project.more »
Koha Library System Easy library administration with KohaJun 27, 2011
Information technology plays a key role in modern library environments. We check out Koha, an open source integrated system that can help manage a library’s daily operations.more »
Vinux, Orca, and Gnome Linux accessibilityMay 31, 2011
Accessibility for computer users with disabilities is one of the noblest goals for Linux and open source software. Vinux, Orca, and Gnome lead the way in Linux accessibility.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm