The Document Foundation announced today that LibreOffice 3.3.1 with improved stability and new colorful icons is now available for download. The new icons are based on The Document Foundation branding guidelines, and includes updates to several language versions.more »
Announced today, Splashtop OS which features the Chromium browser and Bing search engine is now available for download.more »
Gpredict Gpredict satellite tracking softwareFeb 11, 2011
Predict and track satellite orbits and control amateur radio equipment with Gpredict satellite tracking software.more »
The North American Fedora User and Developer Conference (FUDCon) was held on Arizona State University campus in Tempe Arizona from January 29 -31, 2011 and proved to be the largest FUDCon to date with over 200 people pre-registered to attend and final attendance numbers estimated around 175 people.more »
Workspace: Piwigo Your photos, your way: Hosting photos with PiwigoJan 24, 2011
Control your content by hosting your own photo gallery and publishing photos on your own server with Piwigo.more »
"The decision to be open to Qt is in no way a criticism of GNOME. It’s a celebration of free software’s diversity and complexity," says Ubuntu founder, Mark Shuttleworth in his blog.more »
“It's not on the Natty plan for now, but we'll be evaluating the progresses and will consider adding a 3rd session option if the development goes as planned,” said David Barth, Desktop Experience Team, Engineering Manager at Canonical.more »
Jaspersoft 4, a commercial open source Business Intelligence Suite designed for web applications, is now available.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm