- Welcome Guest
- Sign In
Responding to doubts about its claim that its Unix source code was illegally incorporated into Linux by IBM, SCO put some of the actual code in question on display for Unix conference attendees in Las Vegas this week ...
Calling its new office package an evolution from stand-alone, desktop applications to a more integrated software system, Microsoft has announced that Office 2003 is priced and ready for manufacturers ...
In responding to concerns voiced by U.S. Senator Norm Coleman (R-Minnesota), the Recording Industry Association of America has detailed its strategy for pursuing and prosecuting "egregious" infringers of copyright law ...
Wireless startup Airgo -- a company that consists of some of the wireless industry's most prominent pioneers -- announced it is sampling a new WiFi chipset that promises to double the range and data throughput rates of wireless local area networks (WLANs) ...
Apple announced Monday it is shipping the first of the highly anticipated G5 processors in two models of the Power Mac desktop computer ...
The legal battle over alleged unauthorized incorporation of Unix source code into Linux is leading to scrutiny of the GNU General Public License (GPL) that covers the use and distribution of open-source software ...
Los Alamos National Laboratory announced plans with system builder Linux Networx to build a Linux cluster supercomputer, using AMD Opteron processors, that will rank among the top 10 of the world's fastest computers and will facilitate nuclear weapons research ...
Lindon, Utah-based software company SCO has broadened its licensing attack against IBM by terminating a Sequent license on the same grounds it used as the basis for its earlier claims against IBM. SCO maintains that its Unix source code was used in Linux and therefore violates SCO's rights ...
Interoperability of different Web services specifications came closer to fruition with this week's release of the Basic Profile 1.0 by the Web Services Interoperability (WS-I) organization ...
As some antivirus vendors raised their alert rating on a Windows worm that has infected thousands of home and corporate computers, the spreading code continued to take over machines that might be used in an attack on Microsoft ...
A widely anticipated threat materialized this week as a worm that exploits a Microsoft Windows flaw began infecting some of the millions of vulnerable machines around the world. ...
Privacy advocates and foes of the Recording Industry Association of America's campaign to subpoena the names of file-sharing computer users from universities and service providers have won a small battle in the war over online music trading. A U.S. District Court has invalidated the RIAA's subpoenas to two Massachusetts universities ...
Consumer information held by Acxiom, one of the largest collectors and processors of such data, was reportedly accessed and downloaded recently by an intruder who broke into the company's massive database ...
The Linux legal war increased in scope and ferocity this week as IBM coutersued SCO, which had claimed Big Blue wrongfully used SCO Unix source code in Linux. Meanwhile, the open-source community has almost unilaterally aligned against Lindon, Utah-based SCO by supporting the counterclaim. ...
New coded exploits that take advantage of a widespread Microsoft Windows vulnerability have been posted online. By most reports, malicious scans to expose vulnerable systems are running rampant a week after government warnings regarding the flaw ...
IBM has added to the legal mix in its fight over source code claims by Lindon, Utah-based SCO Group, with a counterclaim against the smaller software company filed in court Thursday. ...
Seeking to target the embedded applications market, chipmaker Advanced Micro Devices has announced the acquisition of National Semiconductor's Information Appliance (IA) unit and the Geode family of microprocessors ...
Referring to new evidence in its investigation of Microsoft's anticompetitive practices, the European Union's commission in Washington, D.C., has offered the software company one last opportunity to respond before pursuing remedies ...
The next major step for Linux might be to penetrate higher-security computing environments, primarily in government and financial services, thanks to a certification achieved by an open-source configuration from SuSE and IBM, the companies said ...
A denial-of-service (DoS) attack that took down Microsoft's Web site Friday, two days after the U.S. Department of Homeland Security warned of a widespread Windows vulnerability, is being investigated by the Redmond, Washington-based software company and law enforcement officials ...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/03/computer-programmer.jpg
https://www.linuxinsider.com/story/upgrade-to-ubuntu-pro-for-5-years-of-free-extended-support-177388.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/06/backup.jpg
https://www.linuxinsider.com/story/essential-tips-for-reliable-linux-backups-177398.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide