"In the face of constant change, both in software technology itself and in people's attitudes toward it, long-term software projects need to reinvent themselves in order to stay relevant. I'm encouraged to see the GNOME community taking up this challenge, responding to the evolving needs of users and questioning the status quo," says Matt Zimmerman, Canonical CTO.more »
Workspace: Piwigo Your photos, your way: Hosting photos with PiwigoJan 24, 2011
Control your content by hosting your own photo gallery and publishing photos on your own server with Piwigo.more »
“It's not on the Natty plan for now, but we'll be evaluating the progresses and will consider adding a 3rd session option if the development goes as planned,” said David Barth, Desktop Experience Team, Engineering Manager at Canonical.more »
GNOME's Orca screen reader is providing users accessibility to their graphical desktop using assistive technology service provider interface (AT-SPI).more »
Yorba, developers of Shotwell, the open source photo manager for GNOME, announced that version 0.8.0 is now available.more »
"Where will KDE be in five years,"asks KDE e.V. board member, Frank Karlitschek, and the K16 planning meetings aim to focus community members 'visions' for the project to answer this question.more »
Released today the new Ubuntu Font Family is now available to the world via the Google Font Directory.more »
Doghouse: Deprecated Formats maddog learns a lesson about deprecated formats but finds a workable solution.Nov 23, 2010
Often I talk about documents and the importance of open formats, mostly oriented toward formats like the Open Document Format (ODF) standard versus Microsoft’s OOXML specification.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm