A lot of the open source projects I really dig are things like Syllable OS, a non-Linux-based attempt to create a 'best practices' open source desktop operating system, and Uzebox, a really cool 'retro-minimalist' games console based on open source hardware.
On 5 November I joined a large crowd of other Sydneysiders at the Occupy Sydney protest. As at many other protests over the last half decade, the crowd was full of people either documenting the protest by filming and taking photographs or tweeting.
Last time I took a brief holiday I came back to work to find that HP had killed webOS (and there was a lightsaber on my desk).
I recently had the chance to spend some quality time with the Nokia N9: The glittering debut and sad curtain close for the Finnish phone company's MeeGo efforts.
So what is Amazon up to now?
It's the resignation that has sent shockwaves through geekdom. A tragic loss of someone who was a real pioneer in his field -- I mean sure, he's still kicking but he's stepped down from the role that's made him famous.
You know how it goes. You're out of the office for a few days and come back to find HP has acknowledged its grand hopes for webOS have come to naught and there's a lightsaber on your desk.
There are people who think software development is devoid of creativity. Of course, anyone who has even a passing interest in development, or, say has ever found him- or herself having a late night chat in a disreputable Sydney pub with a Drupal/Node.js developer, knows that this is untrue.
It's a sad ending and a new beginning for Techworld Australia. Last week we bade farewell to the site's founding editor: Rodney Gedda.
Probably the most interesting thing to come out of Malcolm Turnbull’s speech at the National Press Club yesterday was the idea that the coalition, given the opportunity, would separate Telstra and transfer the wholesale assets to a new “Network Co”. At TechWorld we posed a similar idea, but we can’t help but ask, is it workable?
New attack types combine known and unknown threats to exploit “unknown” vulnerabilities. Attackers are also hiding malware inside documents, websites, hosts and networks. These attacks have many purposes such as financial and ideological motives. They focus on stealing data, sabotaging business continuity, or damaging a company’s reputation.
- Marriott CIO: FCC message on WiFi blocking loud and clear
- Microsoft to business: Don't worry about Windows 10, consumers will test it
- Google Now adds data from Lyft, Airbnb and many more apps
- Outlook app for Android and iOS boosts Microsoft's mobile comeback
- MIT randomizes tasks to speed massive multicore processors
- NEC aims at Big Data 'sweet spot' with new SAP Hana tool
- Uber will fight to keep its Boston ride data private
- Verizon to allow opt-out from mobile 'supercookies'
- Brief: Tesla boosts 0-60 acceleration with over-the-air software upgrade
- AT&T will pay $18.2B as top bidder in mobile spectrum auction
- BMW cars found vulnerable in Connected Drive hack
- Twitter's Vine Kids app is not just for kids
- Apple puts the big hurt on Samsung
- Google Glass holds promise but requires a 'reset'
- Microsoft updates cloud-based SQL Server to simplify management