Home Search
open - search results
If you're not happy with the results, please do another search
Fresh Open Source reviews: pyblosoxm and Amanda
Steve Mallett writes: Today OSDir.com has two sweet app reviews. Both from other bloggers. pyblosxom and Amanda. One to save your daily...
Fresh Open Source reviews: Fire and Ogle
Steve Mallett writes: "Yummy new reviews/blogs of some cool open source apps for OS X and *nix on OSDir.com..."
Fire >> Mac OS X: Instant...
Head of SCO Group in UK to push Open Source
Anonymous Reader writes: "The head of the SCO Group is in London, where he has spoken to the UK's Commonwealth Business Forum on...
Slapper worm shows Open Source software has flaws too
"The proliferation of the Slapper worm confirms Gartner's long-held view: Although it can offer significant security benefits over time, open-source software is not intrinsically...
Sun crypto curves into Open Source project
"Sun Microsystems has donated its Elliptic Curve Cryptography technology to the OpenSSL project.
The donation is designed to boost efforts among developers to move to...
SETI@home user base to be pooled using Open Source software
Dave B writes: "The SETI team at Berkley have ambitious and altruistic aims for the next generation of the S@H software.
They are developing the...
EU finances ‘OpenEvidence’, an Open Source project
"The EU is very active in supporting Open Source development by providing financial aids to European projects of interest, like OpenEvidence that was approved...
Caldera/SCO 3.1.1 OpenLinux distribution gains LSB certification
Reader writes: "Darl McBride and Mike Angelo discuss Caldera Linux and LSB. MozillaQuest Magazine (mozillaquest.com) reports: 'If the Linux community is going to successfully...
Open source, shared source or secret sauce?
"Microsoft is entitled to draw its own conclusions from its shared source initiative, and it has the political skill to make capital out of...
Open Source group gets Sun security gift
"Sun's "elliptic curve" technology is involved in the process of using keys to encrypt and decrypt information for electronic transactions. Such encryption lets people...