Video: Programming Django, part 2 Programming with the Python Django web frameworkSep 09, 2008
Part 2 of the video workshopmore »
Django Video Workshop Programming with the Python Django web frameworkSep 08, 2008
The screencast is from Douglas Napoleone of the Python Software Foundation, programming a step-by-step solution for a simple database web application,more »
In response to a challenge to programming language developers set by the editors of Linux Magazine, Python Django returned with a solution that is now available as a video workshop.
Stackless Python Programming with Stackless PythonJul 02, 2008
The Stackless extension brings lightweight processes to Python, opening a new style of programming with dynamic heap access.more »
Practical Python in Linux Getting started with Python in LinuxJul 02, 2008
We’ll introduce you to Python, an easy-to-learn scripting language, and also help you get started creating your own practical Python scripts.more »
Optimizing Python Optimizing Python scriptsJul 02, 2008
The trick to optimization is to save time in the right places.more »
Version 0.20.0 of Itools, a function rich library for Python programmers, has now been released.more »
Version 1.0 of Pottymouth, a Python module for HTML processsing has just been released. The tool helps sanitize user input from websites.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm