Language Selection

English French German Italian Portuguese Spanish

New Customized KDE Software Compilations

Filed under
KDE
Humor

KDE has enjoyed great success over the years and today marks another important step in the evolution of our growing community. Many years ago when KDE was just beginning we had a small user base and similar expectations of how the software should work. But with growth and success also comes new users and new expectations. As an effort to meet the growing demands of our user community KDE has identified 3 key areas in which we would like to better cater to users' needs. In order to achieve this it has been determined that there will be, going forward, 3 separate releases of each Software Compilation tailored to these areas.

Ultimate Freedom Edition

The first focus area is geared towards users who prefer the ultimate in customization. KDE has long been unmatched in its ability to give the user full control of their software and we would like to take that to the next level. Starting with KDE SC 5 we will be creating a KDE SC "Ultimate Freedom Edition". This compilation will include one hundred percent customization of every option, including full maintenance of backports of every feature ever supported by KDE back to v3.0. For quick access, all menu options will be provided on the toolbar and the settings screens have been enhanced with double, tripple and quadruple tabbars to make it contain more settings.

Dwarfed Freedom Edition

The second focus area is aimed at users who enjoy the freedom of open source, but prefer a simple set of default behavior from their software so that they are not bombarded with constant decision making and choices when setting up their software. This version of the KDE SC has been code named "Dwarfed Freedom Edition". This compilation will bring all of the normal KDE software you've come to love, but with scaled back numbers of options in all desktop environment and application menus so as to make life a little bit simpler for our users.

rest here




More in Tux Machines

Boards With Linux

  • Latest Linux Maker Boards Gamble on Diversity
    As usual, last week’s Embedded World show in Nuremberg, Germany was primarily focused on commercial embedded single board computers (SBCs), computer-on-modules, and rugged industrial systems for the OEM market. Yet, we also saw a growing number of community-backed maker boards, which, like most of the commercial boards, run Linux. The new crop shows the growing diversity of hacker SBCs, which range from completely open source models to proprietary prototyping boards that nevertheless offer low prices and community services such as forums and open source Linux distributions.
  • Rugged, expandable 3.5-inch Skylake SBC supports Linux
    Diamond’s 3.5-inch “Venus” SBC offers an Intel 6th Gen CPU, -40 to 85°C support, up to 20GB of ruggedized RAM, and mini-PCIe and PCIe/104 OneBank.
  • How enthusiasts designed a powerful desktop PC with an ARM processor

    The purpose of the gathering was to get the ball rolling for the development of a real desktop based on ARM. The PC will likely be developed by 96boards, which provides specifications to build open-source development boards.

Has Interest in Ubuntu Peaked?

This graph represents Google search volume for Ubuntu (the OS) from 2004 until now, 2017. Looking at the image it us hard to not conclude one thing: that interest in Ubuntu has peaked. Read more Also: Ubuntu splats TITSUP bug spread in update

Leftovers: OSS

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.