Home Search
for - search results
If you're not happy with the results, please do another search
Sun responds to .NET
Author: JT Smith
Sun Microsystems has posted an analysis of Microsoft's .NET strategy. "Is .NET a radically new and innovative platform, as Microsoft claims? Or...
What if there was no copyright law?
Author: JT Smith
Slashdot readers sound off on this submission: "It seems lately that a whole lot of the discussion on
...
Commentary: Elections without fraud
Author: JT Smith
A column at Technocrat advocates Internet voting as a way to combat election fraud: "All in all, Peer-To-Peer, rather than Client/Server would...
Hacker research team disputes ‘hack SDMI’ results
Author: JT Smith
The Register follows up on an earlier story: "The SDMI (Secure Digital Music Initiative) group has announced, despite earlier
...
Wearable computer maker chooses Crusoe
Author: JT Smith
InfoWorld reports that Minnesota wearable computer maker Via has chosen Transmeta's Crusoe chip for its belt-attached computer because of the chip's low...
old.
Author: JT Smith
"Ah, life is good with DSL. Everyone has enough bandwidth to have fun.
...
Nasa cyber-criminal pleads guilty
Author: JT Smith
A 20-year-old man from California has pleaded guilty to breaking into several computers at Nasa's Jet Propulsion Laboratory in 1998. VNUnet reports.
Category:...
Interfacing with Java from PHP
Author: JT Smith
At zez.org:
PHP4 ext/java provides a simple and effective means for creating and invoking methods on Java objects from PHP. This article will...
Whistler to include ‘block all unsigned apps’ secure mode
Author: JT Smith
The Register reports that Microsoft is to incorporate a "signed application" system in
...
Three-tier web site architecture
Author: JT Smith
Penguin Computing will employ its newest servers - including
ones introduced at LBE - to demonstrate three-tier Web site architecture...