Ecommerce

6 of the Best Free Linux eCommerce Software

This feature focuses on shopping cart software, which is software used in eCommerce to enable consumers to purchase goods and services online. Anyone who wishes to run an eCommerce site has a wide range of platforms and software to choose from, many of them being proprietary. However, if you want to operate an eCommerce site, Linux makes a strong platform, with a wide selection of Open Source eCommerce software available.

Read more
Scratch

Great Ways for Kids to Learn the Art of Coding

We are surrounded by coding (often known as programming). That’s why all the cool kids are coding, or they should be. However, computer classes in the UK are dictated by the national curriculum, with students limiting their computing activities to learning applications such as Word and PowerPoint, and using the internet to help with their school work. However, learning how to use Microsoft Office is often of little or no interest to kids. They are motivated by interactive activities such as programming, as they like to make things to find out how they work.

Read more
LFTP

Command-line FTP Clients

The desktop environment with its bundle of programs sharing a common graphical user interface (GUI) remains a firm favorite with users. Not surprising really given that a good desktop environment makes computing fun and simple. The graphical desktop environment has become so ingrained in almost everyone’s computer activities that it might seem the command line will wither away. Yet, there is still an important role to play for the humble command-line interface (CLI).

Read more
Log Analyzers

Top 8 Log Analyzers

Most components of a web application produce operational log files. Some logs are written by each application in a unique format. Other components generate out-of-the-box logs. Monitoring system logs is an essential activity for anyone charged with taking decisions. System administrators need to monitor logs to look out for unusual activity, to troubleshoot applications and websites that are under their control. By scanning logs, extracting and correlating data, system administrators can investigate and resolve problems, carry out capacity planning, help to detect vulnerabilities, ensure the smooth running of services and balancing capacity, and establish who has used services and when.

Read more