A new study by IDC charts big changes in the big hardware market.more »
Enterprise giant frees itself from ink and home PCs (and visa versa).more »
The One-Watt Server Home Router as a Mini-ServerAug 22, 2013
Many devices now run Linux – but mostly as closed source firmware that you cannot access. We show how to use OpenWrt to free the TL-MR3020 router from its proprietary firmware and convert it into an all-around server for your home network.more »
Getting System Info with I-Nex InventoryJul 15, 2013
Thanks to I-Nex, users can see an overview of all their important hardware inventory information, such as graphics cards, processors, and hard drives.more »
A new universal workaround will keep Linux booting on the next generation of UEFI-enabled personal computers.more »
Tune Your Hard Disk with hdparm Disk Inspector: Retrieving and setting hard drive parameters with hdparmDec 16, 2012
Hdparm is the tool to use when it comes to tuning your hard disk or DVD drive, but it can also measure read speed, deliver valuable information about the device, change important drive settings, and even erase SSDs securely.more »
Quantum Computing PossibilitiesAug 27, 2012
With the arrival of the “first commercially available quantum computer,” the D-Wave One, we look at what it is and what open source can contribute.more »
Raspberry Pi Pioneer ComputingJul 30, 2012
The sudden popularity of miniboard systems like Raspberry Pi have brought back the pioneering spirit of Linux’s early days. Suddenly, do it yourself in the open source community is back.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm