After some stops and starts, the first release candidate for Open Office 3.0 is finally ready; after some discussions the project team decided today to go for a second try.more »
Workspace: OpenOffice.org Bookmarks How to bookmark anything in OpenOffice.orgAug 31, 2008
Learn how to bookmark OpenOffice.org documents with the Bookmarks Menu extension or create your own bookmarking tool.more »
This month we look at Seagate hard drive announcements; Mandriva's Gdium netbook; new Red Hat solutions; JasperForge v2; AMD Linux drivers; and Gnome Linux on Garmin's Nuvi 880, 860, and 5000 navigation devices.more »
Workspace: Digital Signatures Digital signatures for documents and emailJul 15, 2008
We'll show you the free and easy way to set up digital signatures for office documents and email.more »
The Open Office project has just released version 3 of the free office package.more »
Web-based Office Tools Online office suitesJul 11, 2008
A mobile office without a laptop? No problem – a new generation of web applications converts your browser into a word processor or spreadsheet.more »
Office Suites A tour of OpenOffice alternativesJul 11, 2008
If OpenOffice is too fat and feature-rich for your taste, try one of the office alternatives. We found much to like and much to wish for when we put six office suites to the test.more »
ODF Compatibility Open Document Format in practiceJul 11, 2008
What happens when you feed an ODT document created with OpenOffice to a word processor like AbiWord, KWord, or Writely? Read on to find out.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.