Skip to content
Thoughtful, detailed coverage of everything Apple for 34 years
and the TidBITS Content Network for Apple professionals
Show full articles


This week we bring you news on PSI’s purchase of Mac developers InterCon and Software Ventures, and follow-ups to previous articles on the PowerTalk Key Chain and AOL’s recent purchases. We also have news of Netscape integrating Macromedia Director playback technology, plus news on StyleWriter drivers and cartridges, and, finally, the first part of a three-part essay by Luciano Floridi on the Internet’s potential impact on how we think about knowledge.

Geoff Duncan No comments

IBM’s Been Taking Notes

IBM's Been Taking Notes -- Lotus Development Corporation announced Sunday that it will let itself be acquired by IBM at a price of $64 a share, with the total deal working out to about $3.5 billion (see TidBITS-280)

Adam Engst No comments

Eric Garneau

Eric Garneau recently directed our attention to Everything Macintosh, an excellent Web page that brings together a huge number of links to Macintosh-related resources

Adam Engst No comments

The Big Gulp Continues

After last week's move by AOL to purchase GNN and WebCrawler, Internet access provider PSI decided to show its hand and purchase Mac developers Software Ventures and InterCon

Adam Engst No comments

AOL Acquisitions & Web Follow-up

A few people with more financial knowledge than I have set me straight on the fact that when one company acquires another by paying in stock, it doesn't hurt the purchasing company particularly at all, especially if the companies being bought have no liabilities

Adam Engst No comments

Key Chain for the Web Follow-up

A number of people wrote in about my editorial in TidBITS-279 that proposed that Web browsers support the PowerTalk Key Chain (or at least something akin to it) to deal with the many authenticated Web sites springing up. Andrew Anker , president of HotWired Ventures wrote to defend HotWired's use of authentication: We actually offer a number of sophisticated features that result from our use of authentication