An implementation of the Git version control system in C# is the goal of the GitSharp Project. The developers have now released its first code, albeit in a pre-alpha state.more »
Java and .NET Intro Implementing Java and .NET in LinuxApr 30, 2009
In today's heterogeneous environments, it is hard to escape the influence of Java and .NET. So why not come prepared? This month we examine some tools and techniques for integrating the Java and .NET frameworks with Linux.more »
Developer Ulrich Drepper has provided a preview of the upcoming version 2.10 of the free GNU C library glibc.more »
The coming March release of QT Jambi will probably be the last. QT Software will discontinue support for the Java version.more »
The KDevelop team released its first beta version of the development environment for KDE and Qt programs.more »
Nokia issued its first release candidate for Qt 4.5 that includes, among other things, translucent widgets.more »
Google Performance Tools, part of Google's open source projects, is now available in version 1.0. Perf Tools is especially useful for optimizing multi-threaded programs.more »
Adobe Systems has issued a prerelease version of project Alchemy, a small tool that compiles C and C++ code for programs running on ActionScript Virtual Machine (AVM2). The idea is to expand the capabilities of Web applications running on Adobe Flash Player 10 and Adobe AIR 1.5.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm