News & Tutorials

Android 2.3 Platform and Updated SDK Tools

Today we’re announcing a new version of the Android platform — Android 2.3 (Gingerbread). It includes many new platform technologies and APIs to help developers create great apps. Some of the highlights include: Enhancements for game development: To improve overall responsiveness, we’ve added a new concurrent garbage collector and optimized the platform’s overall event handling. We’ve also given developers native […]

Bringing the ‘social’ out of the operator walled gardens

A ‘walled garden’ is the term aptly applied to the last decade of mobile operator services. And Facebook is the generic name aptly applied to the social network revolution of our times. Wikipedia defines ‘walled gardens’ as referring “to a carrier’s or service provider’s control over applications, content, and media on platforms … and restriction of convenient access to non-approved […]

5 netbook-optimized desktop interfaces for Linux and BSD distributions

5 netbook-optimized desktop interfaces for Linux and BSD distributions

This article provides some information on five netbook-optimized desktop interfaces available for Linux and BSD desktop distributions. They are presented here in alphabetical order. Jolicloud: Jolicloud is the interface on the cloud-based Linux distribution that goes by the same name. Jolicloud 1.0, the first stable release, is based on the desktop edition of Ubuntu 9.04. The next stable release, Jolicloud […]

Amazon and WikiLeaks – Online Speech is Only as Strong as the Weakest Intermediary

The First Amendment to the Constitution guarantees freedom of expression against government encroachment – but that doesn’t help if the censorship doesn’t come from the government. The controversial whistle-blower website WikiLeaks, which has begun to publish a trove of over 250,000 classified diplomatic cables, found itself kicked off of Amazon’s servers earlier this week. WikiLeaks had apparently moved from a […]

Your Web Surfing History Is Accessible Without Your Permission

The Web surfing history saved in your Web browser can be accessed without your permission. JavaScript code deployed by real websites and online advertising providers use browser vulnerabilities to determine which sites you have and have not visited, according to new research from computer scientists at the University of California, San Diego. “JavaScript is a great thing, it allows things […]

Humanitarian Free and Open Source Software

The Relevance of IT for Humanitarian Response The humanitarian response domain aims to help save lives and alleviate human suffering in responding to: i) rapid-onset natural disasters, such as tsunamis, earthquakes, and pandemics; ii) slow-onset natural disasters, such as global warming, droughts, and famine; and iii) human-instigated disasters, such as civil wars. The humanitarian response domain consists of an ecosystem […]

FTC’s New Privacy Report Endorses “Do Not Track” Mechanism to Empower Online Consumers

This morning, the Federal Trade Commission released its long-anticipated privacy report. The report is the final result of a series of FTC privacy roundtables held earlier this year that solicited comments from leading scholars, industry figures and nonprofits including EFF about the consumer privacy challenges posed by new technologies. One of the main focuses of the FTC’s report is online […]

Location, Location, Location: Three Recent Court Controversies on Cell Phone & GPS Tracking

Welcome to the 21st century, where we all carry tracking devices in our pockets and where one morning you might find an FBI-installed GPS tracking device on your car. In this age of location-based-everything, the legal question of whether or not the government has to get a search warrant based on probable cause before secretly tracking you becomes all the […]

How to dual-boot Linux Mint 10 or Ubuntu 10.10 and Windows 7 on a computer with two hard drives

How to dual-boot Linux Mint 10 or Ubuntu 10.10 and Windows 7 on a computer with two hard drives

The first two articles on dual-booting Windows 7 and Linux distributions published here involved installation on a computer with a single hard drive. Those articles on dual-booting Fedora 14 and Ubuntu 10.10 with Windows 7 are available here and here. This article will cover a different use-case, dual-booting Windows 7 and Ubuntu 10.10 or Linux Mint 10 on a computer […]

How to install and configure a parental control system on Linux Mint 10

How to install and configure a parental control system on Linux Mint 10

Linux Mint 10 comes pre-installed with a very simple application that could be considered a parental control tool. Other than being a basic, uni-directional domain blocker, it is does not provide any other feature. So, if you want a parental control tool, one that provides all the features you expect in an application of that sort, you will have to […]

How to create and manage a guest user account on Linux Mint 10

How to create and manage a guest user account on Linux Mint 10

Say, you have a Linux Mint 10-powered computer that you share with a friend or family member you do not completely trust. How do you continue to give this friend or family member access to your computer and still keep your data private? You have two options. The first is to let your guest use the built-in guest session. The […]

Wikileaks: Lessons For Consumer Privacy

The website Wikileaks recently published hundreds of thousands of confidential State Department cables. These communications apparently reveal the details of conversations with, and personal impressions and assessments of, foreign leaders and diplomats. Many fear that the leak will undermine international relations in profound and unknowable ways. One of the unintended consequence of the leak, however, may be to strengthen the […]

U.S. Government Seizes 82 Websites: A Glimpse at the Draconian Future of Copyright Enforcement?

Over the past few days, the U.S. Justice Department, the Department of Homeland Security and nine U.S. Attorneys’ Offices seized 82 domain names of websites they claim were engaged in the sale and distribution of counterfeit goods and illegal copyrighted works. Setting aside the due process concerns inherent in seizing any website without notice or appropriate recourse for the owner, […]

Supreme Court to Decide Standard for Proving Invalidity of a Patent

Today the U.S. Supreme Court agreed to hear Microsoft’s appeal in a case that could make it easier to invalidate a patent. If successful, Microsoft’s challenge should help in the fight against bad patents by leveling the playing field for showing that a patent is invalid. A Microsoft win in the case would benefit not only Microsoft, but also the […]

Cloud Computing: New Way to Patch Holes in the ‘Cloud’

Researchers from North Carolina State University and IBM have invented a way to update computer systems packaged in virtual machines in a computer “cloud” — even when those programs are offline. The new cloud computing patch tool developed by NC State and IBM is called Nuwa and protects virtual machines (VMs) from cyber-attacks by ensuring that they always receive important […]

ownCloud 1.1 released

ownCloud 1.1 has been released. I´m really happy with this release. Not only because we have a lot of new features and bugfixes but also because the ownCloud development team is growing and more and more people are contributing to ownCloud. I gave several presentation about ownCloud in the last few month and I´m trilled by the positive reactions I […]

How to customize Linux Mint 10

How to customize Linux Mint 10

After a review of Linux Mint 10, the next logical step is to write a few tutorials and tips for those that might need it. The first of these tutorials is a very basic one: It will present several steps you can take to customize a new installation of Linux Mint 10. The list of tips that will be presented […]

All regions and nearly all municipalities in Norway now use open source

Public administrations in Norway are increasingly turning to open source, says Martin Bekkelund, business developer at Friprog, the country’s open source competence centre. This year, all ninenteen county administrations are using open source in some form, compared to 76 percent in 2005. Uses varies from server operating systems , content management systems to OpenOffice. A recent example is procurement of […]

Open source database new engine of France’s social security

The open source database management system (DBMS) Postgresql is the new engine for France’s Caisse Nationale d’Allocations Familiales (CNAF). The organisation, responsible in 2009 for some 69 billion Euro in benefits distributed to 11 million claimants, earlier this year replaced its proprietary DBMS with the open source alternative. According to a statement published in September by IT company Bull, assisting […]

Common Sense and Security: Body Scanners, Accountability, and $2.4 Billion Worth of Security Theater

The Transportation Security Administration is feeling public heat these days over its combination of whole-body-image scanners and heavy-handed pat-down searches, and deservedly so. There’s no question that reform is needed to curtail TSA’s excesses. We especially applaud the Electronic Privacy Information Center’s efforts to increase public awareness about the body scanners. But will the heat now being generated produce the […]