An up-to-date look at free software and its makers
Small Steps to Success
A single application such as Gnome Voice Recorder is unlikely to convince PC users to change their free desktop preferences. However, it is the small utilities in particular that make working with a PC that much easier and reduce the frustration that newcomers can experience. Of course, if utilities are missing or cause usability problems they can just as easily frighten off potential converts.
If users are forced to launch a feature-rich application like Audacity  just to record some noise because of the inadequacies of Gnome Sound Recorder, the computing experience will suffer. The program interface does not have the same look as the desktop, and controlling the versatile audio tool can mean a fairly substantial learning process. On the other hand, if users immediately find the right tool for a minor task and quickly achieve the desired results, they are likely to feel more at home in an environment.
The moral of this story is that even smaller projects should introduce a structured approach to programming. This includes following the lines that Bons has taken: Start by sketching the interface, solicit proposed improvements, and continually improve the sketches before starting to code. In line with this, the Gnome Voice Recorder developers invite users to contribute more ideas and help the project move along. When this issue went to press, a lively discussion was already in progress on Bons' blog.
- Gluon: http://gluon.tuxfamily.org
- Karicat: http://gitorious.org/gluon/karicat
- Mii: http://en.wikipedia.org/wiki/Mii
- OpenAL: http://connect.creativelabs.com/openal
- Box2D: http://www.box2d.org
- Open Dynamics Engine: http://www.ode.org
- Gnome Voice Recorder: http://www.bomahy.nl/hylke/blog/gnome-voice-recorder
- "Free Software Projects" by Carsten Schnober, Linux Pro Magazine, July 2009: http://www.linux-magazine.com/w3/issue/104/094-095_projects.pdf
- Banshee: http://banshee-project.org
- F-Spot: http://f-spot.org
- Audacity: http://audacity.sourceforge.net
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm