Home Search
for - search results
If you're not happy with the results, please do another search
Alan Cox: Linux 2.4.13-ac5
Author: JT Smith
ftp://ftp.kernel.org/pub/linux/kernel/people/alan/linux-2.4/. Intermediate diffs are available from http://www.bzimage.org.Cox writes, "Radeonfb seems to have the odd problem but the rest now
...
Red Hat Embedded Linux Developer Suite now available
Author: JT Smith
"Red Hat, Inc. today announced that the Red Hat Embedded Linux Developer Suite is now available. The Developer Suite is a packaged...
The law and Open Source software
Author: JT Smith
Network Computing posts an interesting, but rather error-prone, essay on Open Source, Free Software, and copyright law: "Licenses that are mass-produced for...
Xkeymacs
Author: JT Smith
"Xkeymacs is a (GPL2'ed) free software which gives emacs-style key
bindings to all applications under Windows. (Each key bindings can be
turned on...
Ex- ICANN CEO post-Sept. 11 howler
Author: JT Smith
The Register: "The former president and CEO of Internet overseeing body ICANN, Mike Roberts, has angered members of Internet community including an...
Open source MyLinux PLW project is scuttled
Author: JT Smith
Anonymous Reader writes, "LinuxDevices.com reports that the MyLinux Pocket Linux Workstation project has been canceled. The completely open source hardware/software project was...
Fujitsu links Linux cluster using Infiniband
Author: JT Smith
Reported at Network World Fusion: "Fujitsu says it has succeeded in using InfiniBand to connect together a cluster of Linux-based servers running...
Retailers not sold on Apple’s iPod
Author: JT Smith
From ZDNet: "While analysts praised Apple's entry into the MP3 market, they expressed concern that the cost of the device--$50 to $100...
Why government can no longer justify Windows
Author: JT Smith
- By Robin "Roblimo" Miller -
Windows XP is a very nice operating system, far superior to previous Windows versions. It is nearly...
Linux Security Week
Author: JT Smith
Posted at LinuxSecurity.com: "This week, perhaps the most interesting articles include "Avoiding security holes when developing an application," "Secure Communications with OpenSSH,"...