Kotlin Programming Language Kotlin mixes Java with Groovy and ScalaOct 26, 2012
Kotlin, a small island in the Gulf of Finland, is also the name of a new programming language that aims to become a modern alternative to Java.more »
Mosh and AutoSSH Tools for channeling SSH over an unreliable connectionSep 21, 2012
SSH can make you crazy if the WLAN connection keeps breaking down, the IP address changes, or the data packets trickle over a slow mobile connection. AutoSSH and Mosh offer some features you won’t find in ordinary SSH.more »
Rust The Rust programming languageSep 21, 2012
Largely unnoticed by the public, the Mozilla Foundation is tinkering with its own programming language, Rust, which is intended to make writing reliable, fast, and concurrently running applications easier. For this purpose, the developers are borrowing generously from other languages.more »
Codethink announces version 1.1 (aka Secret Volcano) of its Baserock Embedded Linux software. Baserock is a Linux build system for the development of embedded, industrial or bare-metal, server-based Linux systems.more »
Doghouse: Tiny Computers Doghouse – Tiny ComputersAug 23, 2012
A choice of ultrasmall boards lets future developers learn how to create and program computers.more »
Table of Contents: 141 Living with WindowsJun 21, 2012
Interacting with the Windows world has never been easier. This month we look at Windows apps in Linux and Linux partitions in Windows.more »
Fabric Python Library Stitching together a crazy sys admin world with PythonJun 21, 2012
The Fabric Python library makes it extremely easy to create repeatable scripts of commands over SSH to any number of servers.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm