What's new in Gnome 2.24?
The Vinagre VNC client  and the Vino VNC server also offer some new features. In full screen mode, Vinagre does not display the toolbar until you move the mouse pointer to the top of the window. The new features also include improved screen content handling if the remote machine uses a higher resolution than the local machine (Figure 4). A new Panel applet supports fast access to bookmarks and host systems.
In a style similar to VirtualBox , Vinagre now supports the keyboard shortcut Ctrl+Alt+Del to shutdown the remote system.
After much work, version 3.0 of the Ekiga video conferencing program – formerly known as GnomeMeeting – is now available. Besides adding a completely new user interface, the developers have also been working on the SIP features. More modern video codecs and a smoother display – in full screen mode too – make it quite clear how much work has gone into the program in recent months. For the first time, Ekiga will now install on Microsoft Windows.
Developers have added two new programs: Empathy, an instant messenger based on Gossip, and the Hamster project, which helps users keep track of the time spent on various tasks. Although most users previously installed Pidgin – formerly known as Gaim – as their IM tool, the program's limited functionality made it difficult to use. Empathy is a welcome return to the KISS (Keep It Simple Stupid) principle, and it supports all the major messaging protocols, including ICQ, AIM, MSN, Yahoo, and Jabber. Empathy relies on libraries that keep to the Freedesktop specifications, although it also uses Libpurple, on which Pidgin was based.
The Hamster project provides a simple approach to managing time requirements for daily tasks. Output in HTML and several helpful visualization features leave a positive overall impression for this fairly recent project (Figure 5).
Some components failed to make the Gnome 2.24 freeze. The new version of Epiphany, for instance, was originally supposed to rely on Apple's Webkit rendering engine. Although Webkit is now on a par with Gecko in many areas, it still has some issues with accessibility.
As a result of these issues, the developers decided to delay the Webkit integration until Spring 2009. The Conduit  synchronization tool was also delayed. In all likelihood, both Webkit and Conduit will make the next version of Gnome.
Gnome 2.24 offers no spectacular changes to basic libraries. For the most part, the developers have focused on stability, although several new tools and features debut with the latest version.
According to the Gnome project, at least two more Gnome releases will follow this version before Gnome 3 arrives. The next release in the 2.X series is Gnome version 2.26, which is scheduled to appear in mid-March 2009.
- Gnome: http://www.gnome.org
- Guadec: http://www.guadec.org
- Nautilus: http://www.gnome.org/projects/nautilus/
- Empathy IM wiki page: http://live.gnome.org/Empathy
- Hamster project wiki page: http://live.gnome.org/ProjectHamster
- Epiphany: http://www.gnome.org/projects/epiphany/
- Gedit: http://www.gnome.org/projects/gedit/
- Gnome Commander: http://www.nongnu.org/gcmd/
- File Roller: http://fileroller.sourceforge.net
- Totem: http://www.gnome.org/projects/totem/
- Capuchin: http://capuchin.k-d-w.org
- Vinagre: http://www.gnome.org/projects/vinagre/
- VirtualBox: http://www.virtualbox.org
- Conduit wiki: http://live.gnome.org/Conduit
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm