Home Search

for - search results

If you're not happy with the results, please do another search

Sun responds to .NET

Author: JT Smith Sun Microsystems has posted an analysis of Microsoft's .NET strategy. "Is .NET a radically new and innovative platform, as Microsoft claims? Or...

What if there was no copyright law?

Author: JT Smith Slashdot readers sound off on this submission: "It seems lately that a whole lot of the discussion on ...

Commentary: Elections without fraud

Author: JT Smith A column at Technocrat advocates Internet voting as a way to combat election fraud: "All in all, Peer-To-Peer, rather than Client/Server would...

Hacker research team disputes ‘hack SDMI’ results

Author: JT Smith The Register follows up on an earlier story: "The SDMI (Secure Digital Music Initiative) group has announced, despite earlier ...

Wearable computer maker chooses Crusoe

Author: JT Smith InfoWorld reports that Minnesota wearable computer maker Via has chosen Transmeta's Crusoe chip for its belt-attached computer because of the chip's low...

old.

Author: JT Smith "Ah, life is good with DSL. Everyone has enough bandwidth to have fun. ...

Nasa cyber-criminal pleads guilty

Author: JT Smith A 20-year-old man from California has pleaded guilty to breaking into several computers at Nasa's Jet Propulsion Laboratory in 1998. VNUnet reports. Category:...

Interfacing with Java from PHP

Author: JT Smith At zez.org: PHP4 ext/java provides a simple and effective means for creating and invoking methods on Java objects from PHP. This article will...

Whistler to include ‘block all unsigned apps’ secure mode

Author: JT Smith The Register reports that Microsoft is to incorporate a "signed application" system in ...

Three-tier web site architecture

Author: JT Smith Penguin Computing will employ its newest servers - including ones introduced at LBE - to demonstrate three-tier Web site architecture...