The quick guide gives a short and understandable explanation of the objectives of version 3 of the GPL; recent discussions on GPLv3 had caused many developers to forget the generic purpose of the license – guaranteeing the freedom of software development.more »
Red Hat has signed the Sun’s Contributor Agreement and TCK License Agreement with the aim of developing an Open Source Java platform for RHEL.more »
Google’s mobile phone has been dubbed Android and is actually an Open Source platform with an operating system and applications.more »
Sun Microsystems, Inc. reported results today for its fiscal first quarter, which ended September 30, 2007.more »
On November 1, 2007, the Federal Open Source Alliance released the results of its Federal Open Source Referendum Study, which provides new insight into the current adoption rates, trends, benefits, challenges, and success rates of open source implementation within Federal agencies.more »
An organization calling itself the Open Document Foundation has given rise to rumors and speculation concerning the free document standard Open Document Format, ODF, of late. Leading members of the ODF Alliance say that it would be wrong to overestimate the significance of the Open Document Foundation.more »
Open Source in Mobile Ties, T-shirts, and telephonesOct 31, 2007
OSiM, Open Source in Mobile, is a series of events dedicated to exploring the role of open source in the world of mobile phones. The latest installment was held in September in Madrid, Spain.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.