The quick guide gives a short and understandable explanation of the objectives of version 3 of the GPL; recent discussions on GPLv3 had caused many developers to forget the generic purpose of the license – guaranteeing the freedom of software development.more »
Red Hat has signed the Sun’s Contributor Agreement and TCK License Agreement with the aim of developing an Open Source Java platform for RHEL.more »
Google’s mobile phone has been dubbed Android and is actually an Open Source platform with an operating system and applications.more »
Sun Microsystems, Inc. reported results today for its fiscal first quarter, which ended September 30, 2007.more »
On November 1, 2007, the Federal Open Source Alliance released the results of its Federal Open Source Referendum Study, which provides new insight into the current adoption rates, trends, benefits, challenges, and success rates of open source implementation within Federal agencies.more »
An organization calling itself the Open Document Foundation has given rise to rumors and speculation concerning the free document standard Open Document Format, ODF, of late. Leading members of the ODF Alliance say that it would be wrong to overestimate the significance of the Open Document Foundation.more »
Open Source in Mobile Ties, T-shirts, and telephonesOct 31, 2007
OSiM, Open Source in Mobile, is a series of events dedicated to exploring the role of open source in the world of mobile phones. The latest installment was held in September in Madrid, Spain.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.