SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks
Web Desktops, Web Applications, Thin Client
An SI Board Since December 1999
Posts SubjectMarks Bans
68 3 0
Emcee:  Jay Lowe Type:  Unmoderated
Previous 25 | Next 25 | View Recent | Post Message
Go to reply# or date (mm/dd/yy):
ReplyMessage PreviewFromRecsPosted
43 Yow ... more massive inter-thread parallelism ... so here we see a design conceJay Lowe-12/4/1999
42 Some more on Alteon: [go to urls for graphs] "Alteon revs WebOS with URLFrank A. Coluccio-12/3/1999
41 Peter, that is all truly very fascinating to me. Thanks for bringing those ideaFrank A. Coluccio-12/3/1999
40 AOL and SUN Let's see, SUN developed OAK for cable settop boxes - this latPJ Strifas-12/3/1999
39 You asked a lot of questions, the answer to some are not appropriate for this fReginald Middleton-12/3/1999
38 Hello Folks! Interesting thread here and a very timely topic! Perhaps the proPJ Strifas-12/3/1999
37 Reginald, I wanted to try out your products but can't get into your websiteRoger A. Babb-12/3/1999
36 MIS departments do not need a free computing model. For them, it is not worth tReginald Middleton-12/3/1999
35 Aha ... I get it. Yup ... I see the Hotmail argument as well. Flies with the Jay Lowe-12/3/1999
34 Technically, it is not difficult to implement. Practically, it is. In order forReginald Middleton-12/3/1999
33 >> These things must be examined in perspective Can you comment on the tJay Lowe-12/3/1999
32 >> Lotus Notes Lite" + "MSFT Office Lite" Well, that'Jay Lowe-12/3/1999
31 Reality check: Is 40 bit encryption more secure than the encryption commonly uReginald Middleton-12/2/1999
30 Hi Reginald, a few comments: re:<<Even without such security measures, iftth-12/2/1999
29 Okay, you needn't give away the store, although recusing at this point is gFrank A. Coluccio-12/2/1999
28 Your pretty good with that crystal ball thing. Give us two weeks and you will fReginald Middleton-12/2/1999
27 By placing the distributed system in a large company's proprietary network,Reginald Middleton-12/2/1999
26 This makes me think of the groupware thing. Sure would be nice if these web-baJay Lowe-12/2/1999
25 I'm not sure I'm the one who suggested this, but let's run with it:Frank A. Coluccio-12/2/1999
24 <Whether the threats that I have implied are real or imagined, likely or unlReginald Middleton-12/2/1999
23 You've touched on one of the sore points of enterprise level outsourcing. WFrank A. Coluccio-12/2/1999
22 >> mounting of their telecommuters' data on foreign servers Unless pJay Lowe-12/2/1999
21 Out of the box, out of the box? Hmm... now is that out of the literal box, I wJay Lowe-12/2/1999
20 Thanks for the compliments. The 40-bit encryption is via the Java security APIReginald Middleton-12/2/1999
19 <i>"ASPs are not the only entities under the authority of the law. DFrank A. Coluccio-12/2/1999
Previous 25 | Next 25 | View Recent | Post Message
Go to reply# or date (mm/dd/yy):