Stellarium Explore the Night Sky with StellariumMay 20, 2013
What shines in the dark is often hidden by clouds. Stellarium provides a clear view of the stars plus a lot of astronomical data.more »
Wanted: A Free Accounting Application for Non-Profits Non-Profit Accounting SoftwareMay 20, 2013
The Software Freedom Conservancy is raising funds to fill a major gap in free software functionality.more »
Firefox Extensions Getting More from FirefoxFeb 24, 2013
Firefox features many high-quality extensions to help improve productivity, protect your privacy, and more.more »
Potlatch 2: OpenStreetMap Editor Fast Mapping: Editing OpenStreetMap with Potlatch 2Feb 08, 2013
If you need a tool to make minor modifications in OpenStreetMap, Potlatch 2 is a useful choice as a fast and easy-to-use editor.more »
Bitcoin Basics Bitcoin Digital CurrencyJan 29, 2013
Bitcoin is a decentralized virtual currency, popular with hackers and the open source community. We’ll explain how the money is created and how it works.more »
Maluuba nAPI Natural language processing with Maluuba’s nAPIJan 23, 2013
Add natural language processing to your own applications with Maluuba’s Natural Language API (nAPI).more »
Avoiding Eye Strain Color Temperature ToolsDec 28, 2012
Do you have problems getting to sleep after a late night computer session? Does the monitor brightness hurt your eyes? Several Linux tools are available that could help with these problems.more »
Workspace: QuickNote and Geeknote Introduction to QuickNote and GeeknoteDec 19, 2012
Sorting through the array of note-taking tools and their features can be overwhelming. We look at two applications that offer a simple approach.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.