RawTherapee Processing RAW files with RawTherapeeSep 30, 2008
RAW format images offer more options for editing than JPEG formats – RawTherapee brings this potential to Linux.more »
A new product, Iron, is a viable alternative for those reluctant to reveal their personal data when using Google's Chrome browser. The Iron browser is based on Chrome's source code.more »
The British Educational Communications and Technology Agency (Becta), the government body with the mission of "Leading next generation learning," has for the first time included Open Source enterprises on their list of official software and IT service suppliers for the nation's schools.more »
Ekiga, formerly known as GnomeMeeting, is an open source VoIP application with video support. The Ekiga project has recently incorporated major enhancements into its version 3.0 software.more »
Eee manufacturer Asus has expanded its sub-notebook series with a desktop version. The Eee Box with the Intel Atom processor is available in Linux and Windows XP.more »
The Dutch company Zarafa turns its groupware of the same name to open source.more »
The Hanlin eReader V3 from Tianjin Jinke Electronics out of China claims to provide a month of use between battery charges. By then 10,000 pages of reading should have been possible – provided you have the requisite time and patience.more »
The dispute over the display of the EULA in the new Firefox has been settled.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm