Home Search

applications - search results

If you're not happy with the results, please do another search

The Definitive Guide to Linux Network Programming

Julie Miller writes "Berkeley, CA--25 August 2004--To keep networks as secure as possible, many IT decision-makers are steering away from Microsoft and toward...

SMEs to drive Linux growth in India in next phase: Red Hat

Red Hat India, the Linux applications and open source provider, is betting on small and medium enterprise (SME) segment to drive the growth of...

Report from the KDE World Summit: Day six

Author: Tom Chance Wednesday at aKademy provided KDE hackers with their first day without a special focus. The KDE PIM (Personal Information Management) developers had...

GNU believers

Author: Don Parris If you look around the pews in your church next Sunday morning, you may see a few GNUs in the pews. ...

MEN Mikro Joins MontaVista Certification Program

Annette Oevermann writes "MEN Mikro Joins MontaVista LSP Certification Program Embedded Hardware Company Helps Customers Reduce Costs and Accelerate Time-to-Market Nuremberg, Germany , August 24, 2004....

Astaro & eIQnetworks Provide Centralized Secur

Jeff Pike writes "BURLINGTON, Mass. – August 23, 2004 – Astaro (www.astaro.com), developers of the most popular open source-based network security product in use...

Open-Source Community Skeptical About Microsoft’s Sender ID License

sjvn writes "Sender ID's license is making it impossible for open-source programmers to use it in their e-mail applications." Link: eweek.com Category: Legal

Report from the KDE World Summit: Days four and five

Author: Tom Chance Writing about aKademy can begin to feel a little like writing a soap opera guide without the romance (so far). To save...

Report from the KDE World Summit: Day three

Author: Tom Chance Day three of aKademy opened with presentations in two tracks, covering the themes of multimedia on the desktop and integration. A cruel...

Securing Web services: Be your own CA

Author: Jeffrey L. Vagle In this article we continue our discussion of some of the foundations of public key infrastructure (PKI) that we began in...