Perl: Google Drive Scanning and storing books on Google DriveNov 26, 2012
Armed with a Chinese guillotine and a scanner with an automatic document feeder, Mike Schilli gives his books some special treatment, courtesy of Google Drive, which offers 5GB of storage space – room enough to start an online PDF collection.more »
- Linux Foundation reports Secure Boot solution
- Ubuntu 12.10
- Plasma Active 3
- Android OS Tops
- Linaro Enterprise
- Group formed for ARM architecture
- Android installed on 3 of 4 smartphones
The Coming KDE An Interview with Aaron SeigoNov 05, 2012
Aaron Seigo discusses KDE’s new approach to managing change and the changes coming up in the next few years.more »
Kernel News New PWM SubsystemOct 26, 2012
Chronicler Zack Brown reports on the latest news, views, dilemmas, and developments within the Linux kernel community.more »
Perl – k-means Clusters Calculating clusters with AI methodsOct 26, 2012
A human observer can register clusters in a two-dimensional set of points at a glance. Artificial intelligence has a harder time getting it done; however, the relatively simple k-means method delivers usable results.more »
- AMD/OpenJDK/Oracle explore use of GPUs
- Smartphone security
- ASF Airavata
- Slackware 14 release
- Shuttleworth funds Inktank/Ceph
- New Apache toplevel project
- Zentyal 3.0 small business server reveals major release
- Keccak wins NIST
- SHA-3 competition
A new project for sharing media files might be as important for its philosophy as its features.more »
Could Mozilla’s announcement of the Boot to Gecko roadmap, along with the continued development of other web-based operating systems, make which Linux distro you’re running less important than the desktop environment?more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm