Full Circle Magazine Is Not Affiliate1d with Or Endorsed by Canonical Ltd

Total Page:16

File Type:pdf, Size:1020Kb

Full Circle Magazine Is Not Affiliate1d with Or Endorsed by Canonical Ltd Issue #23 - March 2009 full circle STEVE STALCUP THE INDEPENDENT MAGAZINE FOR THE UBUNTU COMMUNITY PROGRAM IN C - PART 7 WEB DEVELOPMENT - PART 4 SPREADING UBUNTU - PART 2 TROUBLESHOOTING TROUBLESHOOTING USING THE COMMAND LINE HOW TO BE A GEEK GODDESS Full Circle magazine is not affiliate1d with or endorsed by Canonical Ltd. p.04 Troubleshooting p.06 Program In C - Part 7 p.08 Web Development - Part 4 p.15 Spread Ubuntu - Part 2 p.19 full circle Becoming An Ubuntu User p.22 w w w . f u l l c i r c l e m a g a z i n e . o r g How To Be A Geek Goddess p.23 : Steve Stalcup p.24 p.26 p.28 p.30 P.23 P.24 p.32 P.08 P.15 p.33 : Task Managers p.35 p.37 30 .35 P.19 P..28 P. P icons: KDE4 Oxygen The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: You must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('full circle magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under the same, similar or a compatible license. 2 EEDDIITTOORRIIAALL This magazine was created using : t's true what they say, time does fly when you're having fun. Next month is the second anniversary of FCM. Full Circle magazine will Ibe two years old this coming April, and, in celebration of this (semi)monumental event, FCM#24 will be an uber-issue with surprises galore. What do we want for our birthday? I'm glad you asked. We'd like to see FCM slap-bang on the front page of SlashDot, and Digg if possible. Not only will it keep Robert happy, it's his life long aim to be on SlashDot, but it will expose FCM to many new readers. A readership of Ubuntu is a complete operating 25,000 each month is great, but we want more. We're greedy system that is perfect for laptops, desktops and servers. Whether at like that. I'm sure there are still many folks out there who haven't home, school or work Ubuntu heard of Full Circle magazine, and we can't have that. contains all the applications you'll ever need including word processor, Enjoy this month's issue, keep a close eye out for FCM#24 on the email application and web browser. 24th of April and good luck in this month's competition. Oh, and keep those emails coming! Ubuntu is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Ubuntu with your friends, family, school or business for Editor, Full Circle Magazine absolutely nothing. [email protected] Once installed, your system is ready to use with a full set of productivity, internet, drawing and graphics applications, and games. 3 French Police: We Saved Millions Xavier Guimard, who says that the Gendarmerie has been able NNEEWWSS By Adopting Ubuntu to reduced its annual IT budget France's Gendarmerie Nationale says by 70 percent without having to Ubuntu 9.04 Beta Released it has saved millions by migrating its reduce its capabilities. desktop software infrastructure away : http://arstechnica.com Both the from Windows and replacing it with server, and Ubuntu. desktop editions, of They began their transition to open Ubuntu 9.04 source software in 2005 when it Game Development Survey (Jaunty replaced Microsoft Office with Jackalope) OpenOffice.org. It gradually adopted Free Game Developer forum are beta have been released. It comes other software applications, including having a discussion about the with many new features, some of Firefox and Thunderbird. After the possible ways of funding an open which come courtesy of upstream. launch of Windows Vista in 2006, it source game project, and have A new GNOME release, a new decided to phase out Windows and placed the arguments into a X.org release, a new notification incrementally migrate to Ubuntu. survey to ask people their system, they're all in there. opinions. If you would like to At the current stage of the migration, take part in the survey, click the Since Ubuntu 9.04 comes with it has adopted Ubuntu on 5,000 source link below, as they are GNOME 2.26, it inherits its new workstations. Based on the success trying to get as many features: it comes with the of this migration, it plans to switch participants as possible. Brasero burning tool, better 15,000 workstations to Ubuntu by support for multiple monitors with the end of the year. It aims to have http://tinyurl.com/opensurvey a new configuration panel, better the entire organization, and all PulseAudio integration, and so on. 90,000 of its workstations, running This Ubuntu 9.04 beta also comes Ubuntu by 2015. with X.org 1.6, and several more A report published by the European video cards now use open drivers. Commission's Open Source Sorry if you didn't win this month, Observatory provides some details but in next months issue we'll be : http://www.osnews.com reviewing and from a recent presentation given by have copies to give away! Gendarmerie Lieutenant-Colonel 4 GNOME 2.26 Released burning backends. Note that the NEWS previous method of burning is NEWS still part of GNOME. Work on GNOME's mail and Canonical Launching Ubuntu groupware suite, Evolution , has Server Training Course focussed on users migrating from Windows. Evolution now Expanding its Ubuntu training supports importing Outlook .pst series, Canonical is planning to files, as well as support for make an Ubuntu Server training Microsoft Exchange's MAPI course available later this year. In protocol. This makes GNOME a blog posting Canonical, the much more suited to work with The GNOME team has released financial backer of Ubuntu Linux, Exchange servers. said that the new course is being GNOME 2.26, the latest release in the designed in response to requests 2.x release branch. As everyone There are also a few media- from both students and partners. knows, GNOME is a multi-platform related improvements, such as open source desktop environment. the automatic subtitle 'Deploying Ubuntu in the The 2.26 release continues GNOME's downloader plugin in Media Enterprise Environment' will be a policy of incremental updates to a Player. There's also a new five-day course designed for stable base, and as such, it comes volume control applet that intermediate-to-advanced system packed with a boatload of new makes full use of PulseAudio's administrators working in features. advanced audio features. The organisations which are about to old Gstreamer mixer is still GNOME 2.26 includes the Brasero deploy, or have already deployed, available to those who aren't CD/DVD burning tool as the default Ubuntu desktops and servers in using PulseAudio. the office, Canonical said. burning application. Even though GNOME already supported burning Other new features include, “Participants will acquire the capabilities, Brasero brings new among others, video chat in skills they need to deploy, features to GNOME such as audio Empathy, better multi monitor configure and maintain Ubuntu track preview, track splitting, volume support, and fingerprint reader Server Edition within an normalisation, full multisession support. enterprise infrastructure.” support, integrity checks, a cover : http://www.osnews.com : http://www.tectonic.co.za editor, and support for multiple 5 to see if they show any CCOOMMMMAANNDD AANNDD CCOONNQQUUEERR indication of having recognized Written by Lucas Westermann your USB stick. If the drive is recognized by the system you 've noticed that there were to find out what you need to do to can, for a more specific error quite a few posts on Ubuntu resolve the issue. message, try mounting the USB Forums in the last couple of stick manually, and see why it is I A more difficult problem to weeks about how to troubleshoot failing. troubleshoot is if, for example, you errors that occur. Therefore, I insert a USB stick and it isn't decided I'd cover some basic The above commands and recognized by Nautilus. The first things I do when trying to find ideas can apply to almost any command that should be run is: where a problem is occurring, so issue that you might encounter, that I can google for a solution dmesg|tail as long as you have a basic (unless I can fix it without that). understanding of where to look. For general knowledge, logs are See if the output of that refers to The next suggestion, however, is stored under /var/log/, and there the insertion of a USB stick, or for slow boot times and to see are system logs (for everything), anything that relates to your specific what exactly is going on when and then a collection of logs for problem. If it doesn't appear in the you start the computer - in case applications or processes. output you can try either extending something is hanging and the amount of output you see by causing a large delay. The first thing that should be adding the -n argument to tail, and This is done by a program done - if an application crashes on the number of lines you want startup (e.g.
Recommended publications
  • Android Firefox Remove Recommendations by Pocket
    Android Firefox Remove Recommendations By Pocket Ramiform Win usually overate some deoxyribose or hepatising divergently. Biannual Mikel pulp nor'-west or conglobating suppositionally when Percy is unofficial. Is Washington always stenotropic and dimensional when mantle some ventilation very seventhly and reflectively? Google Mail Checker is extension for chrome to know the status of the number of unread messages in Google Mail inbox. If you choose to upgrade, Pocket will create a permanent copy of everything in your library. University of North Carolina shuts down athletic programs through Thursday. This is particularly surprising since it was Firefox that made browser extensions mainstream. Not all VPNs have an extension for Firefox though, and some of them work differently. When I launched App Center, it just brought up a small Live Update screen, then listed a BIOS update, so I clicked that, it installed, and restarted. When you open a new tab, Pocket recommends a list of articles based on the most popular items saved that day. The next command should remove two directories. While the Safari browser does come standard on all Apple devices able to connect to the internet, an update might be needed every once in awhile. Instead, it basically learns as you use it. When it easy and remove firefox recommendations by pocket considers to emulate various changes. Then, click Save to save your changes. And the respect is just as prevalent as the accolades and ability. Change the mode from Novice to Advanced. Vysor puts your Android on your desktop. It can download and organize files, torrents and video in fast mode.
    [Show full text]
  • Private Browsing
    Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University https://www.usenix.org/conference/soups2018/presentation/habib-prying This paper is included in the Proceedings of the Fourteenth Symposium on Usable Privacy and Security. August 12–14, 2018 • Baltimore, MD, USA ISBN 978-1-939133-10-6 Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor Carnegie Mellon University {htq, jcolnago, vidyag, spearman, thomasjm, acquisti, nicolasc, lorrie}@andrew.cmu.edu ABSTRACT Prior user studies have examined different aspects of private Previous research has suggested that people use the private browsing, including contexts for using private browsing [4, browsing mode of their web browsers to conduct privacy- 10, 16, 28, 41], general misconceptions of how private brows- sensitive activities online, but have misconceptions about ing technically functions and the protections it offers [10,16], how it works and are likely to overestimate the protections and usability issues with private browsing interfaces [41,44]. it provides. To better understand how private browsing is A major limitation of much prior work is that it is based used and whether users are at risk, we analyzed browsing on self-reported survey data, which may not always be reli- data collected from over 450 participants of the Security able.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • 'Building' Architects and Use of Open-Source Tools Towards Achievement of Millennium Development Goals
    'Building' Architects and Use of Open-source Tools Towards Achievement of Millennium Development Goals. Oku, Onyeibo Chidozie Department of Architecture Faculty of Environmental Sciences Enugu State University of Science and Technology Email: [email protected] ABSTRACT Millennium Development Goals (MDGs) were established by the United Nations to improve the well-being of humans and their habitat. Whether they are the target beneficiaries or amongst the parties administering services for achieving the MDGs, humans must carry out these activities in a physical environment. Hence, the Seventh Goal of the MDG has an indirect and far-reaching relationship with the others because it deals with the sustainable development of the built environment. Architects deliver consultancy services that span the design, documentation and construction supervision of the built environment. This study sought to determine the extent to which these professionals can do this, with respect to the Seventh Millennium Development Goal, using mainly open-source tools. The study draws from literature reviews, end-user feedback or reports, interviews with developers of applicable open-source products, and statistics from a survey, launched in 2011, for capturing how architects use ICT in their businesses. Analysis of popular open-source technologies for the Architecture, Engineering and Construction (AEC) industry show a concentration of resources in favour of the later stages of the Architect's role, rather than the design and contract-drawing stages. Some of the better-implemented tools are either too cryptic for professionals who communicate in graphical terms, or heavily biased towards software engineering practices. The products that promise Building Information Modelling (BIM) capabilities are still at an early developmental stage.
    [Show full text]
  • Non Basta Avere Un Computer Potente, L'ultimo Modello Di Tablet O
    Non basta avere un computer potente, l’ultimo modello di tablet o il sistema operativo più aggiornato; 100 per sfruttarli al massimo servono anche applicazioni, servizi e utility capaci di semplificare e velocizzare le operazioni quotidiane. 78 PC Professionale / Settembre 2017 078-117_Art_Freeware_318.indd 78 30/08/17 12:04 100FREE WARE APP E SERVIZI GRATUITI ● Di Dario Orlandi 078-117_Art_Freeware_318.indd 79 30/08/17 12:04 PROVE / FREEWARE / IL TEMPO IN CUI I SISTEMI OPERATIVI SI DAVANO BATTAGLIA SUL FRONTE DELLE FUNZIONI INTEGRATE È ORMAI PASSATO: PERFINO I DISPOSITIVI MOBILE LASCIANO ORMAI ALL’UTENTE LA FACOLTÀ DI SCEGLIERE GLI STRUMENTI E LE APPLICAZIONI PREFERITE, SCEGLIENDOLE TRA QUELLE DISPONIBILI, ANCHE GRATUITAMENTE, NEI RELATIVI STORE. MA PER TROVARE GLI STRUMENTI MIGLIORI BISOGNA CONOSCER- LI, PROVARLI E CONFRONTARLI. ED È PROPRIO QUELLO CHE ABBIAMO FATTO PER PREPARARE QUESTO ARTICOLO: ABBIAMO INSTALLATO E TESTATO MOLTE DECINE DI APPLICAZIONI, UTILITY E SERVIZI, ALLA RICERCA DELLE SOLUZIONI MIGLIORI PER SODDISFARE LE ESIGENZE DELLA FETTA DI UTENTI PIÙ AMPIA POSSIBILE. ABBIAMO CONCENTRATO L’ATTENZIONE SOLO SUI SOFTWARE GRATUITI, PER PROPORRE UNA COLLEZIONE COMPLETA CHE NON INCIDA SUL PORTAFOGLIO. La diffusione dei sistemi opera- un forte ritardo nei confronti di Lo Store che Microsoft di Windows sono ancora in gran tivi mobile ha reso evidente uno tutti gli altri sistemi operativi: le parte abbandonati a loro stessi: dei difetti storici di Windows: distribuzioni Linux offrono da ha creato per le devono individuare, selezionare l’assenza di un sistema di distri- decenni funzioni dedicate alla ge- applicazioni Windows si e installare i programmi senza buzione e aggiornamento auto- stione dei pacchetti, affiancate in sta lentamente popolando, alcun aiuto da parte del sistema matico per i software di terze seguito da interfacce di gestione operativo.
    [Show full text]
  • Anti-Mapa De Privacidade
    Anti-mapa de privacidade Feito para você não ser rastreado Organização: Bárbara Simão e Rafael Zanatta Pesquisa e produção de textos: Bárbara Simão, Juliana Oms, Livia Torres e Rafael Zanatta Revisão: Rafael Zanatta Revisão de texto: Bárbara Prado Simão Design: Talita Patricio Martins Realização Supervisão: Carla Yue e Teresa Liporace Coordenação executiva: Elici Bueno Idec - Instituto Brasileiro de Defesa do Consumidor Rua Desembargador Guimarães, 21 - Água Branca CEP 05002-050 - São Paulo-SP Telefone: 11 3874-2150 [email protected] www.idec.org.br Por que um anti-mapa? Há quem diga que dados O mercado de dados funciona Esta situação gera sérias pessoais são o “petróleo assim: empresas desenvolvem consequências para o modo da era digital”. Enquanto modelos para prever nossos como vivemos e nossa isolados, não representam comportamentos, identificar democracia. Por isso, a muita coisa nem possuem nossas preferências e nos aprovação da Lei Geral tanto valor, mas quando influenciar com propagandas de Dados Pessoais foi tão integrados e analisados em especialmente direcionadas importante: nossos dados conjunto revelam perfis de para nós, pois sabem deixarão de ser objetos consumo, de crédito, hábitos aquilo que nos sensibiliza a passíveis de extração, pois recorrentes e até padrões de partir de nosso padrão de são parte de nós e de quem personalidade. comportamento - situação somos. Ao prever princípios muitas vezes despercebida. éticos e direitos básicos aos Estes perfis que criam de nós cidadãos, a lei nos devolve podem até gerar discriminação o controle sobre todas as com preços diferenciados, por informações que produzimos exemplo, a partir do local onde - é como o Código de Defesa realizamos a compra ou da do Consumidor para as novas renda obtida.
    [Show full text]
  • General Characteristics of Android Browsers with Focus on Security and Privacy Features
    BÁNKI KÖZLEMÉNYEK 3. ÉVFOLYAM 1. SZÁM General characteristics of Android browsers with focus on security and privacy features Petar Čisar*, Sanja Maravic Cisar**, Igor Fürstner*** Academy of Criminalistic and Police Studies, Belgrade, Serbia, **Subotica Tech, Subotica, Serbia, ***Óbuda University, Bánki Donát Faculty of Mechanical and Safety Engineering, Budapest, Hungary, [email protected], [email protected], [email protected] • Incognito browsing mode - offers real private Abstract —Satisfactory level of security in the use of the browsing experience without leaving any historical Internet in mobile devices depends on several factors. One of data. them is safe browsing. A key factor in providing secure • Using of HTTPS protocol - enforces SSL (Secure browsing is the application of a browser with the appropriate Socket Layer) security protocol (using of certificates) methods applied: clearing cookies, cache and history, ability wherever that’s possible. of incognito browsing, using of whitelists and encryptions and others. This paper presents an overview of the various • Disabling features like JavaScript, DOM (Document security and privacy features used in the most frequently Object Model) storage used Android browsers. Also, in the case of several browsers • Using fingerprinting techniques and types of mobile devices, the use of benchmark tests is Further sections of this paper provide an overview of the shown. Bearing in mind the differences, when choosing a applied security and privacy methods for more popular browser, special attention should be paid to the applied Android browsers. Also, in order to compare the adequate security and privacy features. features of browsers, the use of benchmark tests on different mobile devices will be shown.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Alcohol Dvd Ripper Free
    Alcohol dvd ripper free click here to download Download Alcohol FREE EDITION. Totally Free For You Forever. Please be aware that Alcohol % FE (Free Edition) is for personal use only and may not. Alcohol is CD / DVD burning copying backup recording duplication emulation and creation software. Free to try Alcohol Soft Windows NT//XP/Vista/7 Version Users can copy CDs and DVDs to CD-R, CD-RW, DVD-R, DVD+R. Alcohol %, free and safe download. Alcohol % latest version: CD and DVD recorder that can also create virtual drives. Download Alcohol % Alcohol % is a CD and DVD emulation piece of software which also offers you burning capabilities. Free Download Alcohol 52% Free - Emulation software application disc drive every time you want to load a CD / DVD, then, Alcohol 52% is a. Free DVD copying software running on a Windows laptop. There are lots of great free tools around for ripping videos from DVDs, but when including those made with Nero and Alcohol % – ideal if you need to burn an. If you need a free DVD ripper, then visit FileHippo today. We offer a wide range of safe freeware, demo and software programs to download, for free. It is a free DVD Decrypter and Blu-ray Decrypter that can work with any software that Passkey for DVD and Passkey for Blu-ray Alcohol % CD DVD Audio Extractor is a powerful software DVD audio extracting / ripping tool. It can be used to rip DVD movies and to create backups of data disks. Alcohol 52 %. Allows users to play CDs DVDs without the need for the physical disc.
    [Show full text]
  • Aprende Fedora 12
    Aprende Fedora 12 Aprende Fedora 12 Guía de usuario no oficial de Fedora. Ultima actualización Noviembre de 2009 Piensa en Binario – Diego Escobar Embajador Fedora para Colombia http://proyectofedora.org/colombia http://piensa-binario.blogspot.com http://proyectofedora.org/wiki 1 Aprende Fedora 12 La vida es una oportunidad, aprovéchala. La vida es belleza, admírala. La vida es beatitud, saboréala. La vida es un sueño, hazlo realidad. La vida es un reto, afróntalo. La vida es un deber, cúmplelo. La vida es un juego, juégalo. La vida es preciosa, cuídala. La vida es riqueza, consérvala. La vida es amor, gózala. La vida es un misterio, desvélalo. La vida es promesa, cúmplela. La vida es tristeza, supérala. La vida es un himno, cántalo. La vida es un combate, acéptalo. La vida es una tragedia, domínala. La vida es una aventura, disfrútala. La vida es felicidad, merécela. La vida es la vida, defiéndela. Madre Teresa de Calculta. 2 Aprende Fedora 12 Presentación La presente es una pequeña guía de usuario simplificada que pretende hacer el mundo del software libre, Linux y en particular Fedora más fácil y cercano al usuario promedio. Aprende Fedora nació de recopilación en un solo documento de todos los tutoriales publicados en el antiguo blog bautizado Su Servidor WP (http://suservidorwp.blogspot.com) y que ahora se ha renovado convirtiéndose en Piensa Binario (http://piensa-binario.blogspot.com). Luego de unirme a la comunidad Fedora, acepté el compromiso de lograr una documentación centralizada y más amplia en la Wiki de Proyecto Fedora Latinoamérica (http://proyectofedora.org/wiki/index.php/Portada) junto con muchos más tutoriales, consejos y documentación que esperamos sea de utilidad para usted.
    [Show full text]
  • Linux Vs Windows 7 Posted at 4:16Pm on Thursday August 20Th 2009
    • Latest News • Podcast • Features • Distros • Code • Apps • Web • Hardware Top of Form 14cab29049c5e99797search_formb5ab2750af718b Search Bottom of Form Listen to this: our Linux podcast kicks ass. Subscribe for free! Linux vs Windows 7 Posted at 4:16pm on Thursday August 20th 2009 It's something of a tradition that we pit the latest version of Windows against our trusty old operating system. This isn't because we want to raise the profile of Windows, or ignite further flamewars on which is better or worse. It's about understanding the market and understanding the competition. Microsoft Windows is by far the most dominant operating system on the planet, and as Linux users, we need to keep on top of new developments, new technologies and new ideas. This gives Linux the best possible chance to grow and remain relevant. So, if you read our benchmarks comparing Windows 7, Vista and Ubuntu and are looking to find out more on what separates Windows 7 and Linux on the features front, read on... Both operating systems now occupy a distinctly different part of the market. Microsoft has taken Windows down a purely proprietary route, forging relationships with content providers and hardware vendors that keep full control from the user. Linux is completely open. Out of the box, Linux even boasts better media format support than Windows, and it can be the only way to run older hardware at its fullest potential, especially if there isn't a new driver for Windows 7. Forewarned is forarmed Over the life span of Windows 7, public concern for privacy, digital rights management and locked-in upgrades should help Linux to grow as an alternative when users want to keep complete control over their own hardware and software.
    [Show full text]
  • Indicators for Missing Maintainership in Collaborative Open Source Projects
    TECHNISCHE UNIVERSITÄT CAROLO-WILHELMINA ZU BRAUNSCHWEIG Studienarbeit Indicators for Missing Maintainership in Collaborative Open Source Projects Andre Klapper February 04, 2013 Institute of Software Engineering and Automotive Informatics Prof. Dr.-Ing. Ina Schaefer Supervisor: Michael Dukaczewski Affidavit Hereby I, Andre Klapper, declare that I wrote the present thesis without any assis- tance from third parties and without any sources than those indicated in the thesis itself. Braunschweig / Prague, February 04, 2013 Abstract The thesis provides an attempt to use freely accessible metadata in order to identify missing maintainership in free and open source software projects by querying various data sources and rating the gathered information. GNOME and Apache are used as case studies. License This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0) license. Keywords Maintenance, Activity, Open Source, Free Software, Metrics, Metadata, DOAP Contents List of Tablesx 1 Introduction1 1.1 Problem and Motivation.........................1 1.2 Objective.................................2 1.3 Outline...................................3 2 Theoretical Background4 2.1 Reasons for Inactivity..........................4 2.2 Problems Caused by Inactivity......................4 2.3 Ways to Pass Maintainership.......................5 3 Data Sources in Projects7 3.1 Identification and Accessibility......................7 3.2 Potential Sources and their Exploitability................7 3.2.1 Code Repositories.........................8 3.2.2 Mailing Lists...........................9 3.2.3 IRC Chat.............................9 3.2.4 Wikis............................... 10 3.2.5 Issue Tracking Systems...................... 11 3.2.6 Forums............................... 12 3.2.7 Releases.............................. 12 3.2.8 Patch Review........................... 13 3.2.9 Social Media............................ 13 3.2.10 Other Sources..........................
    [Show full text]