Table of Contents: 152 What's inside the July 2013 issueMay 20, 2013
We look at SharePoint integration and show you how to manage Active Directory from Linux. But first, a special story on a dangerous new class of intrusion tools.more »
Qmake for Qt Building Qt projects with QmakeApr 30, 2013
Qt’s own build system Qmake is often overlooked for larger projects, but many experienced developers appreciate Qmake support for shadow builds and pre- or post-build dependencies.more »
Fedora developers release the first alpha version of Fedora 19, known as Schrödinger’s Cat, for general testing. The final release is expected in July 2013.more »
Tclkit Cross-platform software development with TclkitJan 23, 2013
Although performance differences between scripting languages and classic compiled languages are hardly significant, one disadvantage of scripting languages was that you always had to install an interpreter first. Tclkit lifts this burden.more »
New SDKs aim to integrate Splunk with big data applications.more »
SpringSource Releases New Tool Suites
Codethink Releases Baserock 1.1
PostgreSQL 9.2 Released
ROSA Announces Enterprise Distributionmore »
Table of Contents: 144 HadoopSep 21, 2012
Getting into high-performance computing has never been easier. We investigate HPC cloud computing and a popular Big Data platform.more »
Quantum Computing PossibilitiesAug 27, 2012
With the arrival of the “first commercially available quantum computer,” the D-Wave One, we look at what it is and what open source can contribute.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm