Home Search

element os - search results

If you're not happy with the results, please do another search

Linux Mint Is Getting Its Own Apps Starting with the 18.x Branch

The Linux Mint project is about to get a lot more interesting because, with the 18.x branch, the developers are going to introduce the...

Best Linux Desktop Environments for 2016

Linux creates a friendly environment for choices and options. For example, there are many Linux-based distributions out there that use different desktop environments for...

IT Skills Shortage Slowing OpenStack Adoption

Companies see a real business advantage to using an open source private cloud, but a shortage of IT professionals and business managers skilled in...

How to convert packages between .deb and .rpm

Unfortunately, and after years of development in every part of the free software that we enjoy, there are still two primary types of software...

Linux Mint 17.3 Cinnamon Review

Linux Mint is among the most popular GNU/Linux-based operating systems. Although DistroWatch is not a metric of popularity, Linux Mint has claimed the #1...

Pi Zero and CustomPi: More Flexibility for Open Embedded Hardware

Despite the temptations of success, the Raspberry Pi Foundation has admirably stuck to its mission of improving computer education in public schools. Yet, the...

Best in Breed Twitter Clients for Linux

Twitter is a social networking service that is a bit of a conundrum to many. At any given time it can be used to...

Why NUT

Expectation doesn't always match actuality; which is a shame. But sometimes we can do something about it. This is a tiny tale of my...

How to Manage User Permissions From the GUI on Linux

User permissions tend to center around UGO and +rwx. If you understand that, you’re in good shape...if you only need the basics. But using...

Open Source Security Process Part 2: Containers vs. Hypervisors – Protecting Your Attack Surface

In part two of this series, Xen Project Advisory Board Chairman Lars Kurth discusses the different security vulnerabilities of containers and hypervisors. Read Part...