Chat Archive with Sugar API Storing instant messaging data with Sugar CRM 6.4 and the Dropbox connectorJul 24, 2012
The Sugar customer relationship management tool lets you import unstructured data from the cloud. We’ll show you how to use this feature to integrate instant messaging services.more »
Greylisting with Postgrey Defeat spam with Postgrey by greylisting and whitelisting incoming mailJul 24, 2012
Vendors continue to develop new defenses against spam, one of the Internet’s most notorious pests. In this article, we integrate Postgrey with the Postfix mail server for a greylisting and whitelisting solution.more »
Gnublin Getting to know the Gnublin boardMay 29, 2012
Embedded Linux doesn’t have to be rocket science, which the Gnublin board clearly shows. If you want to learn how to read sensors, flip switches, and switch LEDs on ARM Linux, this tiny machine is perfect for your research.more »
Alexandria Library Manager Manage your book collection with the Alexandria collection managerMay 29, 2012
As your book collection grows, you might lose track of your volumes. Alexandria lets you catalog your tomes quickly and easily without a pesky database server.more »
Timeline Managing tasks and events with TimelineMay 29, 2012
Is the conference before or after your publication date? What tasks do you need to complete in what order? Was Jean born before Derek? Was the Atari ST released after the Amiga? Timeline is a program that can give you fast answers to these kinds of question, typically at a glance.more »
LinkChecker Finding dead links with LinkCheckerMay 29, 2012
LinkChecker helps you keep your site free of broken links.more »
The Apache OpenOffice Project announces Apache OpenOffice 3.4, the first release of OpenOffice under the governance of the Apache Software Foundation.more »
Getting Started with Analytics Data Analytics for the NewbieMay 03, 2012
The huge emphasis on data and data analytics in the business world and the IT job market might have you thinking about brushing up on your database skills. And what better platform than Linux to obtain powerful and free tools to flex and train your data muscles?more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.