Google Earth Exploring Google EarthOct 16, 2009
Google Earth lets you view the world from space and zoom in on towns, roads, and buildings. We’ll show you how to travel our planet’s surface, its cities, and even the sky from your desktop.more »
Wave A look ahead at Google’s exciting Wave projectOct 16, 2009
Part email, part instant messenger, part bulletin board, and part wiki, Google’s new communication platform promises to transform correspondence into conversation.more »
Introduction to the Google Tool Set Communicate, collaborate, and create with free tools from GoogleOct 16, 2009
Google believes most of what you do on a computer can happen in a browser window – from anywhere in the world. The versatile Google tool set brings that vision to everyday users, and it is all just a few mouse clicks away.more »
Fast Web Servers Alternative servers and Apache techniquesSep 30, 2009
This month we look at some alternative web servers and show you some smart Apache techniques.more »
Nginx Web service and reverse proxy with the speedy nginxSep 30, 2009
The fast and practical Nginx web server is easy to configure and extend.more »
Workspace: Zotero Turn Firefox into a research toolSep 30, 2009
We show you how Zotero can turn Firefox into the ultimate research tool.more »
The free Java search engine Apache Lucene is available in version 2.9. The release provides numerous new features and API enhancements.more »
If it were to go by Project Boot.kernel.org, practially all distros in the foreseeable future would boot off the Internet.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm