The quick guide gives a short and understandable explanation of the objectives of version 3 of the GPL; recent discussions on GPLv3 had caused many developers to forget the generic purpose of the license – guaranteeing the freedom of software development.more »
Red Hat has signed the Sun’s Contributor Agreement and TCK License Agreement with the aim of developing an Open Source Java platform for RHEL.more »
Google’s mobile phone has been dubbed Android and is actually an Open Source platform with an operating system and applications.more »
Sun Microsystems, Inc. reported results today for its fiscal first quarter, which ended September 30, 2007.more »
On November 1, 2007, the Federal Open Source Alliance released the results of its Federal Open Source Referendum Study, which provides new insight into the current adoption rates, trends, benefits, challenges, and success rates of open source implementation within Federal agencies.more »
An organization calling itself the Open Document Foundation has given rise to rumors and speculation concerning the free document standard Open Document Format, ODF, of late. Leading members of the ODF Alliance say that it would be wrong to overestimate the significance of the Open Document Foundation.more »
Open Source in Mobile Ties, T-shirts, and telephonesOct 31, 2007
OSiM, Open Source in Mobile, is a series of events dedicated to exploring the role of open source in the world of mobile phones. The latest installment was held in September in Madrid, Spain.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.