Home Search

open - search results

If you're not happy with the results, please do another search

IBM and Microsoft must co-operate, offshoring and Openwave’s open source gamble

Recently we wrote about IBM and Microsoft being on the same stage and demonstrating web services interoperating across their platforms. This...

Yale’s open source CAS single sign-on solution

Anonymous Reader writes "This article provides a step-by-step description of how to build a single sign-on solution(SSO) for a Web portal. It shows you...

Why Open Source May Be Doomed

Megan McArdle writes "I have to admit that I was never much of a believer in open source. Maybe my business school coursework rendered...

Open Asia: Open source in Mongolia, Nepal, and Pakistan

Author: Frederick Noronha We continue our country-by-country survey of the availability of open source software across Asian countries with a look at developments in Mongolia,...

Open Source Needs Long-Range Plans

Two companies announced this week they've been financially slapped around--one to the point of bankruptcy, and the other to the point where Wall Street...

Open source by any other name?

Author: Joe Klemmer Free/Libre/Open Source Software. FLOSS. It's an unwieldy name, but that's understandable given the diverse factions and groups in the community with...

Open source program stopping P2P in dorms

Programmers at the University of Florida have developed an open source tool to cut off file sharing going on among students, and early results...

Open source group plugs three holes

An open source group that maintains software for securing communications has released a patch to fix several vulnerabilities ...

Foot in the door for open source?

There is no question about it: As far as David-and-Goliath scenarios go, the scrappy open-source office applications that have taken on mighty Microsoft Office...

OpenSSL releases patch to fix holes found by U.K.

The open-source group that maintains software for securing communications released a patch on Tuesday to fix several vulnerabilities that were found during a security...