New Hack language adds static typing and other conveniences.more »
Visual Programming with Alice Alice 3.1Sep 09, 2013
If you can use your desktop environment, then you can also write programs: All you need is your mouse, the Alice IDE, and some time to experiment.more »
Qmake for Qt Building Qt projects with QmakeApr 30, 2013
Qt’s own build system Qmake is often overlooked for larger projects, but many experienced developers appreciate Qmake support for shadow builds and pre- or post-build dependencies.more »
Real-World Raspberry Pi Exploring the Raspberry Pi through real-world projectsApr 19, 2013
The single-circuit-board Raspberry Pi computer, only as big as a credit card, makes it easy to gain experience with embedded Linux systems. We'll show you some hands-on examples of how to use the Raspberry Pi in an everyday environment.more »
The Tizen project announces the general availability of Tizen 2.0 source code and SDK.more »
According to Dice, the recession is over for software developers, system administrators, and other IT specialists.more »
Maluuba nAPI Natural language processing with Maluuba’s nAPIJan 23, 2013
Add natural language processing to your own applications with Maluuba’s Natural Language API (nAPI).more »
Tclkit Cross-platform software development with TclkitJan 23, 2013
Although performance differences between scripting languages and classic compiled languages are hardly significant, one disadvantage of scripting languages was that you always had to install an interpreter first. Tclkit lifts this burden.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm