CyanogenMod Android privacy vs. developer wars
The chief developer of the popular alternative Android firmware CyanogenMod thought that requiring devices to report unique smartphone and tablet data would be an unqualified blessing. They reckoned...
View ArticleUbuntu 12.10 Outshines Windows 8: Five Reasons that Throw an Insight
Microsoft has always tried to be in the race to stay at the top, but there are other operating systems that are present in the market and have a niche about themselves.
View Article7 Search Engines for Big Data
Examines the finest open source software that provide full-featured search engines through an application programming interface.
View ArticleSetup and Run Your Own Online SMS Portal With PointSMS on RHEL/CentOS/Fedora
PointSMS is an free open source online sms application was written in PHP language, that enables you to setup your own online sms portal to send single or high volume of SMS messages through GloboSMS...
View ArticleUbuntu 13.04's "Final Beta" arrives
The only beta of Raring Ringtail, Ubuntu 13.04, has been released so that users and developers can get a preview of the next release of the operating system which should be released at the end of this...
View ArticleGoing Mobile with Raspberry Pi
Want to take your Pi project mobile, or maybe prototype a mobile project with your Pi? These tutorials teach you to build a Raspberry Pi laptop, handheld, and Google Glass-style wearable HUD.
View ArticleSailfish OS SDK released for Linux, Windows and Mac
Software builders with a can-do attitude should be delighted to learn that the SDK for Sailfish OS has arrived just a few days late of its pencilled-in due date.
View ArticleWhy Windows fragmentation will blow Windows to smithereens (cough)
Android fragmentation will wreck Android for smartphones and tablets just as much as Windows fragmentation ruined Windows for the PC.
View ArticleTry Out the Beta 2 Version of Ubuntu 13.04 Raring Ringtail
Canonical released the Beta 2 Version of Ubuntu 13.04 Raring Ringtail, it come with many change and improve performance. Ubuntu 13.04 Beta 2 also come with derivative distributions: Kubuntu, Lubuntu,...
View ArticleUbuntu 13.04 goes beta
In a few weeks, the latest and greatest version of Ubuntu Linux will roll out. Here's what to expect and what's missing.
View ArticleMinimum Grep You Need to Know
You need to find a phrase in over 200 files worth of code. Manual searching is not a feasible option. If you are like me you know about grep, but it has always made you nervous. It is so powerful...
View ArticleInstalling Rails on Ubuntu 12.10
Installing Ruby and Rails on Ubuntu 12.10 can throw up some errors. I’ve found a method that worked, and wrote a few notes about it.
View ArticleFuduntu 2013.2 Released!
The Fuduntu team is proud to announce the second quarterly release of 2013, Fuduntu 2013.2. This release comes with many improvements, including many bug fixes, new features/apps, and other news items....
View ArticleBuilding an RSS Reader for Android
It is not an unusual requirement for mobile apps these days to be able to consume an RSS feed from another site (or many) to aggregate the content - Or maybe you just want to build your own Android app...
View ArticleGarbage Collector Performance Comparison
For the Red Hat / Intel webinar on big data and JBoss Data Grid (JDG), I executed a performance test against JBoss Data Grid with RadarGun on dedicated Intel hardware. Prior to executing the...
View ArticleUbuntu 13.04 Linux Can Outperform Apple OS X 10.8.3
In the road to the release of Ubuntu 13.04 "Raring Ringtail" later this month will be a number of articles benchmarking this major Linux distribution update against its friends and competitors.
View ArticleIn-kernel memory compression
Amdahl's law tells us that there is always a bottleneck in any computing system. Historically, the bottleneck in many workloads on many systems is the CPU and so system designers have made CPUs faster...
View ArticlePPTP Setup Guide for Windows XP
A VPN connection works like a tunnel over the public network, securing and encrypting the access for any of those who connect to it. Thus, your network resources will be safe from the eyes of...
View Article