Home Search
applications - search results
If you're not happy with the results, please do another search
The Definitive Guide to Linux Network Programming
Julie Miller writes "Berkeley, CA--25 August 2004--To keep networks as secure as possible, many IT decision-makers are steering away from Microsoft and toward...
SMEs to drive Linux growth in India in next phase: Red Hat
Red Hat India, the Linux applications and open source provider, is betting on small and medium enterprise (SME) segment to drive the growth of...
Report from the KDE World Summit: Day six
Author: Tom Chance
Wednesday at aKademy provided KDE hackers with
their first day without a special focus. The KDE PIM (Personal Information
Management) developers had...
GNU believers
Author: Don Parris
If you look around the pews in your church next Sunday morning, you may see a few GNUs in the pews. ...
MEN Mikro Joins MontaVista Certification Program
Annette Oevermann writes "MEN Mikro Joins MontaVista LSP Certification Program
Embedded Hardware Company Helps Customers Reduce Costs and Accelerate Time-to-Market
Nuremberg, Germany , August 24, 2004....
Astaro & eIQnetworks Provide Centralized Secur
Jeff Pike writes "BURLINGTON, Mass. – August 23, 2004 – Astaro (www.astaro.com), developers of the most popular open source-based network security product in use...
Open-Source Community Skeptical About Microsoft’s Sender ID License
sjvn writes "Sender ID's license is making it impossible for open-source programmers to use it in their e-mail applications."
Link: eweek.com
Category:
Legal
Report from the KDE World Summit: Days four and five
Author: Tom Chance
Writing about aKademy can begin to feel a little
like writing a soap opera guide without the romance (so far). To save...
Report from the KDE World Summit: Day three
Author: Tom Chance
Day three of aKademy opened with presentations in two tracks, covering the themes of multimedia on the desktop and integration. A cruel...
Securing Web services: Be your own CA
Author: Jeffrey L. Vagle
In this article we continue our discussion of some of the foundations of public key infrastructure (PKI) that we began in...