New rules emphasize collegiality in coding.more »
Upstart lands in the dust bin as a new era begins for Linux.more »
Laidout Book Creator Bookbinding on the ScreenMar 10, 2015
The Laidout graphic application simplifies the design of books and booklets.more »
But what do the big numbers really mean?more »
Calligra Suite Calligra Redefines the Office SuiteFeb 10, 2015
Calligra Suite goes beyond the standard four or five office suite programs by offering a range of applications for desktop and mobile computers.more »
Pi-Top Prepares to Revolutionize Open Hardware Do-It-Yourself Laptop KitJan 13, 2015
Riding the popularity of the Raspberry Pi, a new company is producing a modular laptop kit to house small-board computers.more »
Enhancing Your Work Habits with KDE KDE Productivity OptionsDec 16, 2014
KDE extends the concept of the desktop with innovations that can significantly enhance your productivity.more »
The Linux New Media Awards have honored the most significant products, projects, people, and organizations for open source/Linux every year since 2000.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm