I find it sad that most people don't realize how many options there are for photography software on Linux. While most Linux users are aware of GIMP, their knowledge beyond that is sorely limited. Surprising to many is the fact that professional photography on Linux is such a serious business that there are even closed source proprietary programs that are developed and sold to run on Linux.
The ability to work with RAW files from a camera is a must for professional and amateur photographers alike. While this initially may seem like a very specific niche where the options would be limited, the open source philosophy has helped create many options. Darktable, Lightzone, Shotwell, RawTherapee, digiKam, Photivo, UFRaw, and Fotoxx are all open source options that a Linux user can choose from.
Fortunately, there are many great open source alternatives. Depending on exactly what your objective is, you may find one or another to more aptly fit your specific needs. Here are three to consider:
We've said it before, and we'll say it again: the DevOps mode of software development is fast becoming one of the new big forces in the channel. Here's a look at some of the key projects and products in the open source DevOps space, and an explanation of how each one will change the way organizations create and VARs integrate software.
But that was then and this is now. Enfeebled beyond practicality in its current condition, I gave the old machine a choice: take its place among the other dusty monuments to obsolescence in my office closet, or volunteer for a potentially revitalizing project that could ensure its most exciting days were yet to come. Admittedly, it wasn’t enthusiastic about either option, but that was hardly a surprise. It had been ages since it could muster enthusiasm about anything. I aimed to turn that situation around with the power of Linux!
Today, June 9, 2016, Canonical has pushed a new major milestone of the Snapcraft tool for the Ubuntu 16.04 LTS (Xenial Xerus) operating system, version 2.10, which users can use to package their apps as Snaps.
The best budget Android phones you can buy right now [June 2016]
There are new smartphones hitting the market constantly, but which is the best buy when you’re trying to save a buck or two (or hundred)? We’ve seen some great launches this year and we’re only expecting more over the coming weeks, but for now, let’s go over the best budget Android smartphones you can go pick up today…
Why does an Android keyboard need to see your camera and log files – and why does it phone home to China?
Security biz Pentest is sounding alarms after it found an Android app it says has been downloaded 50 millions times despite being "little more than malware."
UK-based Pentest said a whitepaper study [PDF] of the popular Flash Keyboard found that the Android app is "abusing" OS permissions, inserting potentially malicious ads, and tracking user behavior, then sending data to servers in China.
- Google focuses on hardware components in this month's Android patches
- Android N may usher in a new era of smartphone security
BlackBerry reportedly “really struggling” in Android market
BlackBerry is reportedly having some issues in its transition to Android. A report from CNET quotes a "high-level executive" at AT&T as saying "The BlackBerry Priv is really struggling."
Xiaomi Mi Max To Be Available In India
As we know that Xiaomi has launched its new phone in India in May 2016. We all know about the Xiaomi devices and so far this Chinese company has done a tremendous job in making smartphones and some wearable technology. We have used Xiaomi devices and they run very well and the best part of buying and using Xiaomi devices is that they are really cheap. Well, don’t be negative when I say Cheap because I used that word because of the cost of the device and that has nothing to do with the overall quality and functionality of the device. They have been doing it for a while now and they are matured in this business and now they make really good device those can be compared with flagship devices made by some giants such has Samsung, Apple, Microsoft, Sony and others.
- Five ways Google can make the Chrome browser and Android work closer together
- Android Marshmallow adoption passes 10% after 8 months
- Android Marshmallow Finally Hits 10% Adoption
- Android Marshmallow Adoption Barely Passes 10 Percent Mark, 8 Months In
- Android in prisons: Meet the man who put Galaxy Tab S2s in Rikers Island
- The best Android phones you can buy [June 2016]
- Samsung Galaxy Owners Report Lock Issues With Android Marshmallow: Hold Off From That Update For Now
- Snapchat For Android Gets Significant UI Update, Overhauls Stories, Discover, Adds Navigation Bar
- This phone case lets an iPhone run Android
- Galaxy Note 6: Not expected to launch with Android N
- A Bunch Of Jeopardy Nerds Have Never Heard Of Android Or Marshmallow
- How to back up Android for free: Back up your phone or tablet - back up photos, video, app data, contacts and more
- For Sony, Android 6.0’s Doze Mode Marks a Battery Life Regression
- Android N Update: New Features & Tweaks For Google's 2016 Android Update
- Get ready for Google's proprietary Android. It's coming – analyst
- Paranoid Android 2016 hits the scene with slew of new features and improvements
- Asus ZenFone Max ZC550KL Gets Android Marshmallow Update
- Android N vs Android 6.0 Marshmallow: What’s New
University gives in to $20,000 ransomware demand
Calgary officials agreed to pay the ransom but it will take some time for the encryption keys to be used on all of the university's infected machines, of which there are over 100. The process is time-consuming and it is not yet known if the keys will even work.
University of Calgary pays hackers $20,000 after ransomware attack
A chain of hospitals in Washington, D.C., was hit in March, while a Los Angeles medical centre shelled out $17,000 earlier this year to hackers following a ransomware attack.
Unintended Consequences Of Slavery In IT
Obviously many use That Other OS for valid purposes but few would do so if this incident was on their radar. There are hundreds of such malwares. How many times will the university pay up for permission to use the hardware they own? They’ve already likely paid Intel double the value for their chips, M$, even more for permission to use Intel’s chips and now a steady stream of cyber-criminals.
Mikko Hypponen: Real Hackers Don't Wear Hoodies (Cybercrime is Big Business)
I'll be discussing these topics, and how they apply to open source systems and to service providers further in my keynote ("Complexity: The enemy of Security") at the OPNFV Summit in Berlin on June 22-23. See you in Berlin!
Password Re-user? Get Ready to Get Busy
In the wake of megabreaches at some of the Internet’s most-recognized destinations, don’t be surprised if you receive password reset requests from numerous companies that didn’t experience a breach: Some big name companies — including Facebook and Netflix — are in the habit of combing through huge data leak troves for credentials that match those of their customers and then forcing a password reset for those users.
Your mobile phone account could be hijacked by an identity thief
A few weeks ago an unknown person walked into a mobile phone store, claimed to be me, asked to upgrade my mobile phones, and walked out with two brand new iPhones assigned to my telephone numbers. My phones immediately stopped receiving calls, and I was left with a large bill and the anxiety and fear of financial injury that spring from identity theft. This post describes my experiences as a victim of ID theft, explains the growing problem of phone account hijacking, and suggests ways consumers and mobile phone carriers can help combat these scams.
Linux users tend to pride themselves on their position at the leading edge of a fast-moving development community. But, in truth, much of what we do is rooted in many decades of Unix tradition, and we tend to get grumpy when young developers show up and start changing things around. A recent change of default in systemd represents such a change and the kind of response that it brings out; as a result, Linux distributors are going to have to make a decision on whether they should preserve the way things have always worked or make a change that, while potentially disruptive to users, is arguably a step toward more predictable, controllable, and secure behavior.