Meet the Totem media player
The official Totem site indicates that there's more to come for this most practical player. Planned features include scanner support and a webcam utility, along with the expected bug fixes and expanded documentation.
Totem might seem like just a modest little program, but it already has an impressive set of features – too many in fact to cover sufficiently in this article. I look forward to exploring more of its current features and to its continuing evolution.
All of the most of the popular media and movie players for Linux have their strengths and weaknesses, whether in overall design, technical foundations, or documentation.
I must say that Totem is certainly one of the best balanced players I've used. It provides just the right controls and expected functions in an uncomplicated, easily navigated user interface and offers some most unique features (e.g., the YouTube browser and the Telestrator function).
When I first approached this review, I wondered what I'd encounter. Although new to Ubuntu and Totem, I hoped for a stressless and satisfying experience. Well, I'm relaxed, I'm satisfied, and I plan to install Hardy Heron on its own drive in the test box here at Studio Dave. Of course, I also plan to keep using Totem as my movie player of choice whenever I'm in session with Heron.
Buy this article as PDF
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.