GNOME 3.0 Determines Boston Summit
While the European Linux scene has been busy with KDE and Qt, a relatively unnoticed but important gathering occurred in the U.S. to determine the future of the GNOME desktop: the GNOME Boston Summit 2009.
The Boston Summit has been an annual gathering of GNOME hackers since 2004. It usually meets over the Columbus Day long weekend in October and consists of a combination of loose hacker sessions and discussion groups.
Ruby expert and IT consultant Jason D. Clinton submitted an excellent overview of the Boston Summit in his blog. In a telegraphic style, it covers just about all the presentations and sessions. He describes how developers are planning, among other things, to change the GTK 3.0 API, on the one hand to add new features such as XInput2, on the other to discourage hacking at the existing theme engines that break from release to release. GTK 3.0 should be getting a theme structure much like Chrome currently has with its colored tabs.
As a complement to GTK, developers are considering the Clutter toolkit based on OpenGL. However, a pent-up demand exists for differentiating GTK from Clutter for users and programmers, to define the boundaries between the two and determine which solution is best for an application.
The idea for a GNOME Shell emerged at last year's Boston Summit. This year Jon McCann showed how things stand with the graphical interface as one of the main elements of GNOME 3.0. The Shell has already progressed to support CSS, but much is still missing. Its status should be sharply improved over the next months as Red Hat fills a full-time position to work on it. Meanwhile, a few good tips for working on the GNOME Shell are included on the live.gnome.org cheat sheet.
Additional topics at the GNOME Boston Summit 2009 included usability, geolocation, telepathy, Splinter and DBUS access within Glib. Marina Zhurakhinskaya from Red Hat also presented the GNOME Women Outreach Program and spoke briefly about the Free Software Foundation's Women's Caucus that took place mid-September. The second part of Zhurakhinskaya's session covered GNOME marketing.
great postThanks a lot for sharing the article on cash. That's a awesome article. I enjoyed the article a lot while reading. Thanks for sharing such a wonderful article.I want to say very thank you for this great informations. now i understand about it. Thank you !
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm