Home Search
lin - search results
If you're not happy with the results, please do another search
Penguin Computing expands again
Author: JT Smith
Penguin Computing Inc., leading provider of reliable Linux systems for Internet serving, today announced that it has opened a central regional...
AT&T completes investment in Net2Phone
Author: JT Smith
Net2Phone Inc. has announced that AT&T completed their investment of $1.4 billion in Net2Phone, a leading provider of voice enhanced services...
Take console productivity to a new level with Screen
Author: JT Smith
Screen is an application that's often underestimated. Screen is, simply put, a screen manager with VT100/ANSI terminal emulation. Think of it as...
Visionary software applications for wireless devices at Conference 2000
Author: JT Smith
At Motorola's four-day
conference, the messaging group will exhibit conceptual software applications, designed to underscore the future potential of wireless communications.
MontaVista delivers multi-architecture tool kit
Author: JT Smith
The Hard Hat Linux Cross Development Kit, version 1.2, is now available, according to a
press release on this page at Business...
Interview: Miguel de Icaza on just about everything
Author: JT Smith
Anonymous Reader writes "In a long interview, Miguel de Icaza discusses everything from why he thinks .NET is a good idea to...
New configuration management system
Author: JT Smith
From Avogato: "Apparently Compaq/Digital have been working on something called Vesta, a configuration management system, for about 10 years. It's been ported...
Note-it Mozilla sidebar tab updated
Author: JT Smith
From LinuxPR: LiveSidebar is proud to announce the new version of the Note-it, our Post-it style tab - an application for...
Open Source flaw threatens MS code
Author: JT Smith
ZDNet story:
"A security flaw in open-source software used by Linux and Unix systems for compression may affect some Microsoft products that...
Crypto-Gram for March 15
Author: JT Smith
LinuxSecurity Contributors: "In this issue SNMP vulnerabilities, "Responsible Disclosure" by the IETF, Terrorists, Cryptography
...