Language Selection

English French German Italian Portuguese Spanish


Enter your Tux Machines username.
Enter the password that accompanies your username.

More in Tux Machines

Linux Foundation Initiatives for or With Involvement of IBM and Intel

  • IBM OpenPOWER to Join Open Source Linux Foundation

    IBM has announced it was contributing the instruction set (ISA) for its Power microprocessor and the designs for the Open Coherent Accelerator Processor.

  • IBM joins Linux Foundation AI to promote open source trusted AI workflows

    "AI, as it matures, needs to mature in a way that is something that the general public can put their confidence and trust in," Todd Moore, IBM's VP of Open Technology, told ZDNet. "Too often, what we hear is the AI is a black box, they don't understand how it got to its results, there's bias in the models, there needs to be more fairness... We've heard that loud and clear, and we felt it was time to help the industry move forward."

  • Intel, Microsoft, Red Hat Open Source Tools for 'Confidential Computing'

    Members of the Linux Foundation, including Arm, Baidu, Google Cloud, Intel, Microsoft, Red Hat, Swisscom and Tencent, will start promoting the use of Trusted Execution Environments (TEEs), also called secure enclaves, for both cloud computing and PC applications. The participants in the newly formed group, called the Confidential Computing Consortium, plan to make open source multiple projects related to securing data in use. Intel will open source the SDK for its Software Guard Extension (SGX) chip feature. The SGX solution protects sensitive code and data of an application from being stolen or modified by malicious actors that may have taken over the operating system or virtual machine. Applications such as the end-to-end encrypted messenger Signal use SGX for private contact discovery without the need for the server to store users’ contacts in plaintext and unprotected. Microsoft also contributed the Open Enclave SDK, a framework for building app enclaves that work across various Trusted Execution Environment (TEE) architectures to the CCC. Each application that uses the Open Enclave SDK can be split into two components, an untrusted one that runs on the untrusted operating systems and a trusted one that’s protected from operating system malware.

Akaunting: a web-based accounting system

One of these years, LWN will have a new accounting system based on free software. That transition has not yet happened, though, despite the expending of a fair amount of energy into researching alternatives. Your editor recently became aware of a system called Akaunting, so a look seemed worthwhile. This tool may have the features that some users want, but it seems clear that your editor's quest is not done yet. As an aside, additional motivation for this effort came in the form of an essentially forced upgrade to QuickBooks 2019 — something that QuickBooks users have learned to expect and dread. There appear to be no new features of interest in this release, but it does offer a newly crippled data import mechanism and routine corruption of its database. If your editor didn't know better, he might just conclude that proprietary software is buggy, unreliable, and unfixable. [...] The system is written in PHP and JavaScript; the code is licensed under GPLv3. Akaunting is able to use MySQL, PostgreSQL, or SQLite to store the actual data. It is, as one might expect given the implementation languages, designed to run as a web application; one can install it on a handy machine, but Akaunting (the company) also offers to host accounts free of charge on its own servers. The company promises "we cover it, for free, forever" — a pretty big promise for a free-software startup with a minimal track record. Read more

GNOME 3.33.91 released

Hi developers,

GNOME 3.33.91 is now available. This is the second beta version towards 3.34.

If you want to compile GNOME 3.33.3, you can use the official
BuildStream project snapshot:

The list of updated modules and changes is available here:

The source packages are available here:

This release is a snapshot of development code. Although it is
buildable and usable, it is primarily intended for testing and hacking
purposes. GNOME uses odd minor version numbers to indicate development

For more information about 3.33, and the full schedule, please see our
3.33 wiki page:


Abderrahim Kitouni
GNOME Release Team
Read more Also: GNOME 3.34 Beta 2 Brings Last Minute Improvements To GNOME Shell, Mutter & Friends

today's howtos