New releases of the two competing Web technologies, Flash and Silverlight, have just become available. While version 10 of the new Flash Player runs on three platforms, the Silverlight implementation, Moonlight, is designed exclusively for Linux systems.more »
Album Shaper Managing photo collections with Album ShaperApr 30, 2008
Digicams almost completely replaced legacy cameras, and now Album Shaper offers a replacement for photo albums.more »
The X.org developers are working on moving a less prominent component from userspace to kernel space: mode setting controls.more »
Chip manufacturer VIA has announced a strategic Open Source initiative for Linux driver development.more »
ATI graphics cards have become more and more interesting for Linux developers ever since the manufacture released the sources. The latest drive has released power management functions that have previously been neglected on Linux.more »
The new version includes Webkit and Phonon as part of the cross-platform library for graphical user interfaces. Trolltech has asked developers to test the RC.more »
Trolltech has just announced the first Qt 4.4 Beta on its website and made a download available. Among other features, the new version integrates Qt WebKit and multimedia framework that is based on Phonon.more »
Trolltech is releasing version 4.3.4 of its GUI library under the version 3 of the GPL. Apart from this the makers of Qt have simply fixed bugs in the release.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm