37%
09.06.2018
the package sources.
The handling of new versions is often a bit inconvenient: If a new version of an installed package is available, the package manager downloads the entire archive once again. Some formats
37%
05.12.2014
metadata added by the cameras or the digiKam photo management tool. Firefox 32 and Google Chrome 37 provide access from the outside.
Phraseanet
The first test candidate comes from the French software house
37%
18.03.2014
be checked and verified, and innovative new features should be submitted through an upstream, peer-reviewed process such as the Linux kernel development process.
Firmware should be declarative, meaning
37%
23.04.2014
leverage that knowledge to find new targets and opportunities that can provide meaningful intervention for other diseases."
37%
27.05.2014
A prominent FOSS programmer has called for a reset of the adoption process for the new HTTP 2.0 web protocol. Poul-Henning Kamp, who is most closely associated with the FreeBSD project but also ...
An important FOSS developer calls for a reset on efforts to build Google's SPDY protocol into HTTP 2.0.
37%
14.10.2013
, Google, and Facebook have shown us that the concept of scalability applies to agility or speed as well as size. To keep up with the leaders, other companies will have to focus on providing similar high
37%
29.02.2012
.
The new server software also uses a “Smart Set-up” feature based on Fujitsu’s smart software technology. Thus, the system can automatically install and configure a pre-constructed system image on multiple
37%
20.09.2012
-performance storage applications while opening new opportunities for Panasas parallel storage technology in industries with I/O intensive workloads, including finance, life sciences, energy and manufacturing
37%
15.03.2012
Trend Micro Incorporated has announced the availability of DirectPass, a new password management solution. DirectPass manages website passwords and login IDs in one secure location, so users only
37%
18.10.2012
to update ICS at all – leaving it unchanged for decades.”
“Ideally, all ICS software would need to be rewritten, incorporating all the security technologies available and taking into account the new