Canonical, the company behind Ubuntu, wants a more elegant and user-friendly Linux-Desktop for it's users. In a full blown statement at this year’s OSCON, Ubuntu grounder Mark Shuttleworth proclaimed: ‘'The great task in front of us over the next two years is to lift the experience of the Linux desktop from something that is stable and robust and not so pretty, into something that is art'’.more »
Fotoxx v35 Image manipulation with FotoxxAug 31, 2008
The Fotoxx image manipulation program offers highlights such as HDR and panorama functions, but where there is light, there is also shadow.more »
At first, plans for Gtk+ 3 were considered unnecessary – the developers themselves considered the 2.x version mature enough – now, some developers are toying with the idea of developing Gtk+ 3. Gnome founder Miguel de Icaza comments on and criticizes the developments in his blog.more »
Version 2.6 of Gimp uses the Gegl library, which can display up to 32 bit color depth.
A tutorial on the Gimpusers.com community website gives visitors the lowdown on next generation Gimp features.more »
GIMP Improving digital images with the GNU Image Manipulation ProgramJul 10, 2008
GIMP is great for fixing digital images. We’ll show you how to correct washed-out or under-exposed images and white balance.more »
Graphviz Graph visualization with GraphvizJul 10, 2008
Using drawing tools to manually create graphs and diagrams can be a slow and convoluted process. The Graphviz toolbox offers a faster way. Based on a short text with the information for the graph, Graphviz quickly generates a neat drawing.more »
GIMP: Part 2 Enhance less than perfect images with the GIMPJul 09, 2008
GIMP is a powerful tool for improving digital photos. We’ll explain how to crop pictures, simulate depth of field, and correct perspective.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.