Gnome 2.14 A look at the Gnome 2.14 desktop environmentJul 31, 2006
New features and a leaner, faster, prettier desktop. Are you ready for the latest Gnome?more »
AIGLX AIGLX and the rise of the composite desktopJun 30, 2006
Red Hat’s head of X development describes the evolution of AIGLX.more »
Xgl and Compiz An OpenGL-accelerated desktop with Xgl and CompizJun 30, 2006
A member of Suse’s X11 team delivers an insider’s look at Xgl.more »
The Future of Linux Graphics OpenGL and the Linux desktopJun 30, 2006
New technologies will change the way you view the objects on your Linux desktop.more »
X11R7 X.Org 6.9 / 7.0 – Next Generation X11Jun 30, 2006
The first major X release for over 10 years, X11R7, has finally adopted a modular approach. X11R6.9, which uses the same codebase, is the last monolithic release for existing systems.more »
Fedora Core 5 A quick look at the latest FedoraJun 30, 2006
Fedora opens the spring fashion season with a bold new release. We took a look at the latest collection.more »
Enlightenment 17 Exploring the Enlightenment 17 window managerApr 30, 2006
Enlightenment has a large community of fans who are patiently waiting for a new version. If you are brave enough to try out Development Release 17, you’ll find an aesthetically pleasing and extremely flexible window manager.more »
DeskTOPia: Desktop Customizing Customizing your GUI desktopMar 31, 2006
Just a few tweaks can give your system that individual touch.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.