Home Search
lin - search results
If you're not happy with the results, please do another search
Lutris accelerates wireless Internet application deployment
Author: JT Smith
From LinuxPR: Lutris
Technologies Inc., a leading provider of application server technology for wired
and wireless development and...
Freenet: Will it smash copyright law?
Author: JT Smith
Newsbytes has a feature on Freenet: "Freenet has an offshoot, Espra.net, that is intended to function like a more secure Napster. But...
Richard M. Stallman addresses Brazilian Congress -dupe
Author: JT Smith
From LinuxPR: Today Richard M. Stallman, founder and
president of the Free Software Foundation (FSF), addressed the members of the
...
Glitch wipes out some Tripod pages
Author: JT Smith
ZDNET.co.uk: "Tripod, which lets people create personal home pages, routinely
polices its online community for sites that may host content that
violates...
A Stallman moment – fraught with dichotomy
Author: JT Smith
"Linux is powerful enough as an operating system to have caused the major operating system vendors in the world to change the...
Open Source is alive and well in Arizona
Author: JT Smith
Anonymous Reader writes "http://www.aztechbiz.com/news/20010319/232106
It's an editorial about Open Source in Arizona as it relates to the nearly ready for production, MyLinux Pocket...
Alternatives for Microsoft’s $500 million Xbox marketing budget.
Author: JT Smith
The Daily Radar suggests better ways to spend $500,000,000 to get Microsoft's Xbox gaming console out to market. At the top of...
Getting streaming off the computer and into the living room
Author: JT Smith
ZDNet reports that Hewlett-Packard and Real Networks are teaming up to create an Internet streaming device better suited for the living room...
Nautilus is here to stay, even if Eazel isn’t
Author: JT Smith
A story at ZDNet says the Nautilus project will thrive, even if Eazel doesn't survive, thanks to the GPL. "The GPL ensures...
Security update to imap
Author: JT Smith
From LWN.net: "imap is a package which contains POP3 and IMAP mail servers.
These vulnerabilities can be exploited only after user
...