Sep 11, 2014 GMTThese days, large free software projects resemble any non-profit organization, with governing boards and obligations to release regular reports. How many users read those reports is uncertain -- not many, I would guess, because, even in free software, the reports tend to be glossy exercises in PR. However, if nothing else, their financial statements are worth a close look, because they suggest the priorities and directions of project's governing bodies.Two examples are GNOME and KDE ( I would have looked at other popular desktops, but none of the others release quarterly or annual reports). Examining their statements for the 2013 financial year shows two projects have very different...
Off the Beat: Bruce Byfield's Blog
Sep 06, 2014 GMTWhenever a major security story like the recent leak of nude celebrity photos occurs, I hope that some serious discussion will happen. But I am always disappointed, and this time was no exception. No one, apparently, wants to explore the obvious -- that, just maybe, buying cloud storage is a flawed business and security model.I understand why people buy cloud storage, of course. It's convenient, especially if you want to access your data from multiple computers and different locations. Almost certainly, it is cheaper than paying for your own system administrators or even buying new hard drives.And let's not forget the coolness factor of using the latest technology. For an industry...
Aug 31, 2014 GMTDigital typography is a mixed blessing. On the one hand, thanks to office suites and typesetting applications, as well as an increasing number of free-licensed fonts, any computer user can potentially produce professional-looking publications. On the other hand, conventions left over from the typewriter, half-understood rumors, and some odd choices in popular office suites have left most of us unable to come anywhere close to realizing that potential.True, we have calmed down enough so that we no longer feel obliged to use every design feature available. Those who remember the late 1980s, when many design features were first introduced, may still have nightmares about text that was...
Aug 27, 2014 GMTSome users condemn panel applets and desktop widgets as clutter. For me, however, they are two of the most important features of a desktop environment because of the degree of customization they allow. Their lack is a major reason I am indifferent to GNOME and Unity, and conversely why I prefer KDE and -- increasingly, Linux MInt's Cinnamon.Cinnamon's applets and desklets are a relatively new feature. Two releases ago, there were only a handful of applets and two or three desklets that amounted more to proofs of concept than anything of much use. However, in the latest release, I count 27 applets pre-installed and another 169 available online, as well as 17 desklets, making for a healthy...
Aug 20, 2014 GMTInformation designer Edward Tufte said it first: slide shows allow as much two-way exchange of information as a Soviet May Day rally. The presenter has almost total control, which tempts them into reading their presentation off the slides in a kind of death march through the bullet points. Meanwhile, human audiences falls into stupors and other species gnaw off a leg to escape -- twin fates that make the looming return to school and seriousness in September something to dread unless you take definite steps to improve matters.If your presentation runs in an unsupervised loop, you may want it to be a summary of your talk. However, in almost all other circumstances, you need to struggle...
Aug 06, 2014 GMT"I don't trust it," someone wrote when Wikipedia and its reliability was discussed on Facebook recently. One or two others added that, for them, a Wikipedia citation immediately discredited an article. I was surprised by these old school sentiments, having imagined that familiarity had years ago blunted contempt, and Wikipedia now had at least a reluctant acceptance.Not that Wikipedia hasn't had its share of dubious episodes, with contributors accepting payment, and editing wars that can change the reliability of an entry from hour to hour. At times, the conflicts have become so heated that some entries have to be protected, so that just anyone with a grudge or a need for...
Jul 29, 2014 GMTKDE concluded long ago that names were an important part of branding. However, looking at the latest changes, I am genuinely undecided whether the effort to brand through names is worth the effort, or is only likely to cause confusion.The concern with names goes back to the earliest days of KDE, when every application began with a "K" (Kate, K3B, Konsole), or at least contained a "k" somewhere in the name (Amorok). By the release of KDE 4, this convention had been dropped, but the new modular sub-systems were all given names (Akonadi, Plasma), few of which except for Phonon, the sound controls, had even a hint of their functions.In 2009, KDE announced a change in its...
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.