Nothing accelerates a PC like transitioning to an SSD, but some special configuration might be in order if you want to get the most from your drive.
Calligra Suite goes beyond the standard four or five office suite programs by offering a range of applications for desktop and mobile computers.
Even optical storage media are subject to wear. Dvdisaster helps you prevent data loss due to defective CDs, DVDs, or Blu-ray discs with a manageable amount of effort.
Hadoop version 2 has transitioned from an application to a Big Data platform. Reports of its demise are premature at best.
Red Hat's Satellite system management solution provides an amazing range of capabilities, but it isn't quite ready for orbit.
The online video store Netflix delivers video on demand to many countries. Although the service offers Linux-friendly HTML5 streams, you have to coax Netflix into actually serving them up.
Riding the popularity of the Raspberry Pi, a new company is producing a modular laptop kit to house small-board computers.
Batsh kills two birds with one stone: Programs written in this language can be compiled both as Linux Bash scripts and Windows batch files.
KDE extends the concept of the desktop with innovations that can significantly enhance your productivity.
A new browser with familiar technology: The lean Firefox offshoot Pale Moon is compatible with many cherished Firefox extensions.
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm