Home 2012
Yearly Archives: 2012
Cyber Attacks Explained: Web Exploitation
Websites are no longer merely about having an "Internet presence" today, but are also used for commercial transactions and to transfer sensitive data. Such...
Web Acceleration with Varnish 3.0
In this article we'll setup a ready-to-deploy WordPress-compatible Varnish service as our HTTP reverse caching proxy, and have it cache the desktop and mobile...
CodeSport
In this month's column, we take a quick look at the threading support introduced in the new standard for C++11.
One of the major events...
Linux Desktop Experience with ARM and MIPS
The Linux experience for many of our readers most likely starts with an x86 hardware platform. However, desktop solutions exist for other platforms, like...
Joy of Programming: Why is a Software Glitch Called a ‘Bug’?
In this column, we've always covered unusual and interesting technical topics. This month, we discuss the word "bug", and the history behind its use...
Speed up Your Cloud with Memcached
Is your website running into performance bottlenecks? Does the database or backend feel like a really expensive resource, even though you've got a huge...
An Interview with Richard Stallman on Freedom, Android, Amazon, Facebook, Steve Jobs…
Any government that tells people to teach proprietary software is essentially delivering the country into the hands of a company.
Before you even speak a...
FreeBSD 9.0 — Fast, Safe and Completely Geeky
Yes, I know, we're kind of late in getting this article out, but that's because there was a lot of things that were added...
Linux Certifications Hot or Not?
Industry stalwarts share their views on the importance of Linux and FOSS certifications.
While Linux is gaining popularity at a fast pace, related certifications are...
Creating Realistic Materials for Blender Projects
Having completed the three-part series, Animate with Blender, this article focuses on the science behind the process of creating good materials and textures within...