"In the face of constant change, both in software technology itself and in people's attitudes toward it, long-term software projects need to reinvent themselves in order to stay relevant. I'm encouraged to see the GNOME community taking up this challenge, responding to the evolving needs of users and questioning the status quo," says Matt Zimmerman, Canonical CTO.more »
Charly's Column: Terminator The sys admin’s daily grind: TerminatorMar 28, 2011
Friends are all about friendship – names and appearances typically don’t play any role at all. Sys admin Charly’s friend the Terminator is a convincing example.more »
Command Line: SANE Control your scanner with SANEMar 01, 2011
Running your scanner from the command line offers greater control of tasks. We show you how to get started.more »
Charly's Column: lsof Sys Admin's Daily Grind: lsofJan 31, 2011
The shorter a command, the longer the list of support parameters. This rule applies to lsof, one of Charly’s favorite commands.more »
“It's not on the Natty plan for now, but we'll be evaluating the progresses and will consider adding a 3rd session option if the development goes as planned,” said David Barth, Desktop Experience Team, Engineering Manager at Canonical.more »
"Where will KDE be in five years,"asks KDE e.V. board member, Frank Karlitschek, and the K16 planning meetings aim to focus community members 'visions' for the project to answer this question.more »
Doghouse: Deprecated Formats maddog learns a lesson about deprecated formats but finds a workable solution.Nov 23, 2010
Often I talk about documents and the importance of open formats, mostly oriented toward formats like the Open Document Format (ODF) standard versus Microsoft’s OOXML specification.more »
The newest version of the open source of the A/V recording and conversion tool was codenamed “Works With HTML5” for obvious reasons.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm