WordPress Administration Central management of WordPress blogsApr 30, 2013
Blogs have evolved from private diary to professional tool, and if you manage more than one WordPress installation, administration support would be useful. Three tools can help.more »
e-Commerce APIs eBay and Amazon e-commerce APIsApr 30, 2013
Thriving online stores are rare and the result of hard work. If you are just beginning to peddle your wares, you might be better off building a custom interface to sell your goods on eBay or Amazon.more »
Jekyll Generating static pages and blogs with JekyllApr 30, 2013
Most people starting a blog will almost automatically turn to WordPress, which calls for PHP, a database, and regular security updates … and thus a lot of attention. With the small Jekyll template engine, you can avoid all that.more »
New features in SUSE Studio 1.3 include enhanced cloud integration, VM platform support, and lifecycle management.more »
Workspace – In-Browser Editors An editor in your web browserMar 15, 2013
A browser and a text editor are staples of daily computing, so it makes perfect sense to combine the two for better efficiency.more »
PhpStorm 6 redesigned with a new look and many new features.more »
Firefox Extensions Getting More from FirefoxFeb 24, 2013
Firefox features many high-quality extensions to help improve productivity, protect your privacy, and more.more »
HTML5 Offline Offline-capable applications with HTML5Feb 08, 2013
An offline cache in your browser and a bit of HTML5 acrobatics combine for interactive web applications that keep working even when the Internet connection breaks down.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.