After five years of litigation between SCO and Novell, the final judgment from the U.S. District Court in Utah is that the rights to Unix belong to Novell. SCO, which is already financially stressed, owes Novell around 2.5 million dollars.more »
The Mozilla Foundation has published its audited financial statements and tax form for 2007. Chairperson Mitchell Baker uses the event to review Mozilla's performance and despite the current financial turmoil, sees good prospects for the future.more »
Taiwanese firm VIA Technologies, specializing in chipsets and the x86 platform, has gone into a cooperative agreement with the OpenChrome video driver project to help in their development effort.more »
The Openmoko project, developers of an open source mobile phone platform, has recently pulled its download site offline due to a patent dispute.more »
An article from the Debian-Administration.org community describes how to boot up Debian much faster on an Asus Eee 901. Its author, Phil Endecott, claims to do it within 14 seconds using his method.more »
Thanks to a hack a few days ago, BusyBox has been running on the T-Mobile G1 mobile phones with Google's Android platform. Now Jay Freeman, alias saurik, goes a step further: in his blog he describes how to install Debian Lenny by way of root access on the device.more »
Japanese company Fixstars Corporation, specializing in Cell/B.E. technology, has acquired Terra Software Solutions to add Yellow Dog Linux to its portfolio.more »
The virtualization specialist adopted the know-how for the product through its acquisition of Trango Virtual Processorsmore »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.