"In the face of constant change, both in software technology itself and in people's attitudes toward it, long-term software projects need to reinvent themselves in order to stay relevant. I'm encouraged to see the GNOME community taking up this challenge, responding to the evolving needs of users and questioning the status quo," says Matt Zimmerman, Canonical CTO.more »
Charly's Column: Terminator The sys admin’s daily grind: TerminatorMar 28, 2011
Friends are all about friendship – names and appearances typically don’t play any role at all. Sys admin Charly’s friend the Terminator is a convincing example.more »
Command Line: SANE Control your scanner with SANEMar 01, 2011
Running your scanner from the command line offers greater control of tasks. We show you how to get started.more »
Charly's Column: lsof Sys Admin's Daily Grind: lsofJan 31, 2011
The shorter a command, the longer the list of support parameters. This rule applies to lsof, one of Charly’s favorite commands.more »
“It's not on the Natty plan for now, but we'll be evaluating the progresses and will consider adding a 3rd session option if the development goes as planned,” said David Barth, Desktop Experience Team, Engineering Manager at Canonical.more »
"Where will KDE be in five years,"asks KDE e.V. board member, Frank Karlitschek, and the K16 planning meetings aim to focus community members 'visions' for the project to answer this question.more »
Doghouse: Deprecated Formats maddog learns a lesson about deprecated formats but finds a workable solution.Nov 23, 2010
Often I talk about documents and the importance of open formats, mostly oriented toward formats like the Open Document Format (ODF) standard versus Microsoft’s OOXML specification.more »
The newest version of the open source of the A/V recording and conversion tool was codenamed “Works With HTML5” for obvious reasons.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems