Monday, 28 December 2015

Review: Motorola Moto G 3rd Gen Smart-phone


Motorola Moto G 3rd GenThree months with Motorola's SIM-free smart-phone - £129 as at Dec 2015 - and one thing's for sure: there's no going back to contract phones filled with telecoms carriers' bloat-ware crap.

With a fine, full HD screen, good performance, a pure, unsullied Android experience with automatic updates, it's a reminder of Motorola's place as a maker of quality handsets.

Saturday, 5 December 2015

Full Circle Magazine Issue 103 Out now


In Full Circle this month:
  • Command & Conquer
  • How-To : Python in the Real World, LibreOffice, LaTeX and Practice Programming
  • Graphics : Inkscape.
  • Chrome Cult
  • Linux Labs: 3D Printer Building
  • Ubuntu Phones: OTA-8
plus: Ubuntu Games, News, Arduino, Book Review, Q&A, Security, and so much more.

Thursday, 15 October 2015

Opinion: Flipping heck! Adobe Flash and HTML5


When we tried to kill our usage of Flipping Book document previews, I realised with horror that it's more than four years since I declared in a podcast that Flash would be dead within eighteen months. Not only is it still here, but there's no end in sight to the long tail of Flash.

And that long tail is causing us problems; as an independent publisher on the web, my current client is struggling not only with a reliable preview technology, but also wants to sell read-only resources via it's website. Welcome to the digital realm...

Wednesday, 14 October 2015

How-to: Compliance with EU Cookie Regulation


As previously stated in an earlier blog post, the contents of this column should in no way be taken as sound legal advice. Or legal advice of any kind.

In an attempt to demonstrate that it was serious about data privacy (and having nothing to do with court proceedings against Google in the EU), over the Summer, Google sent out a letter to users of its AdSense, DoubleClick for Publishers, and DoubleClick Ad Exchange products:

Dear Publisher,
We want to let you know about a new policy about obtaining EU end-users’ consent.

Tuesday, 13 October 2015

How-to: What are Cookies? (re-post)


Final word on the cookie topic (until the next time...): this is a straight repost of the guidance from the UK Information Commissioners' Office summarising cookie controls by major browser and some additional information on controlling and opting-out of cookie placement. RC
 

What are cookies?

A cookie is a small file of letters and numbers that is downloaded on to your computer when you visit a website. Cookies are used by many websites and can do a number of things, eg remembering your preferences, recording what you have put in your shopping basket, and counting the number of people looking at a website.

Opinion: Cookie's Law


NOTE: the contents of this column should in no way be taken as sound legal advice. Or even unsound legal advice.

I've got another email in my in-box from our software house about cookie compliance, suggesting we spend money upgrading the compliance statement to a full 'explicit consent' opt-in. But with 'enforcement' of the 'cookie laws' in such a mess and talk of further reform in 2016, should we really be spending money on this?

Saturday, 10 October 2015

Full Circle Issue 101 is here!


This month:
  • Command & Conquer
  • How-To : Install Newer Software Versions, LibreOffice, and Website With Infrastructure
  • Graphics : Inkscape.
  • Chrome Cult
  • Linux Labs: Drupal 7
  • Ubuntu Phones
  • Ubuntu Games: Retro Games Emulators, and The Talos Principle
plus: News, Arduino, Q&A, Security, and so much more.

Thursday, 8 October 2015

Review: CSI Cyber Season 1


CSI Cyber poster
Show runners Zuicker, Mendelson and Donahue give up on CSI-cities (they missed CSI Cricklewood) to give themselves free reign with the FBI's glossed-over cyber-crimes team. Two lurid opening episodes fail to produce anything other than another glossy TV franchise behemoth assembled in expensive kit-form. Including yet another theme tune by The Who.

The CSI Cyber team looks to have been pulled from a deck of TV Cop Show Top Trumps cards; Medium's Patricia Arquette, glossed and plastered to the point she looks like someone else (Marg Helgenberg) is the troubled psychologist turned FBI agent; Dawson's Creek lead James Van Der Beek is now the running, jumping, shooting action man.

The rest of the team includes schlubby fat beardy hardware geek, lippy African-American software hacker geek, and oriental hottie forensic geek; all overseen by the ever-watchable, but so far scarce, Peter McNichol (Numbers, Ally McBeal).

Wednesday, 30 September 2015

Humour: Alternative Cookie Policy


Reviewing the website 'small print' finally caused us to flip, somewhere around page 80 of the document....

Cookie policy
Please can we replace ALL of this wording with this instead: https://www.youtube.com/watch?v=gPytoa--430

How to control and delete cookies
You can’t control cookies – they have no brains and just sit there waiting to be eaten – similarly, the only way to delete them is to eat them.

Friday, 18 September 2015

Opinion: The SEO Snake Oil Salesmen


"Dear X,

Hope you are doing well.

I thought you might like to know some reasons why you are not getting enough website hits/visitors and conversion.

My name is x.x. and I am the SEO and Digital marketing expert of a leading SEO service provider company. As per my analysis, your website is not performing well in the Google, Yahoo and Bing organic searches..."

Oh, really?

Thursday, 17 September 2015

Full Circle Issue 100 is unleashed


At 100 pages this is the biggest issue EVER!

This month:
  • Our Great Ancestor: Warty Warthog
  • Command & Conquer
  • How-To : Python, LibreOffice, Website with Infrastructure, and Programming COBOL
  • Graphics : Inkscape.
  • Survey Results

Monday, 27 July 2015

How-to: Engage or Enrage? Powerpoints to Remember [Guest Post]


Magic Lantern By Andrei Niemimäki (Flickr) [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia CommonsOriginally posted Sep 18, 2014 via LinkedIn Pulse - Engage or Enrage? Powerpoints to Remember.

"Power-Point is only a glorified slide-show; the point of power in the room should be the speaker." Thomas Everchild

Powerpoint for presentations, briefings, speeches, pitches … friend or foe? The pros and cons, and how to get the best out of your slideshows...

Or - how to engage not enrage your audiences.

Any speaker wants more than anything else to capture the audience's attention, keep it, and get that message across.

Monday, 29 June 2015

Opinion: Is the RSS feed Extinct?


RSS: according to which definition you prefer, it's either Rich Site Summary, RDF Site Summary, Really Simple Syndication or Rarely Seems Synchronised (OK,  I made that one up). Essentially it's a family of standard web feed formats to publish frequently updated information: blog entries, news headlines, audio, video.

RSS has been around since 1991, first used for the Netscape Portal, so is coming up for a quarter-century old. The question then, is RSS extinct?

Thursday, 25 June 2015

How-to: Create Accessible Web Tables Part I


Image: wooden table If you look back at the first twenty-five years of HTML mark-up for tables on the web, you will see the original mark-up was quite basic, with little regard for assistive technologies such as screen readers; at the beginning they didn't exist.

Add to this the difficulties of laying out information and graphics on a screen. In the early days before proper styling of HTML, web designers would obsessively render whole sites using tables for every page because that was the only way to consistently reproduce their artistic masterpieces in different web-browsers. Mostly.

Thursday, 18 June 2015

How-to Understand Access Keys Part II - Yes or No?


In How-to Understand Access Keyes part one, we looked at Access Keys, what they are for, how they work and th UK government recommendations for standard Access Keys.

In 2004, a standard emerged using numbers, which promotes consistency for users, and the
increased predictability of keyboard shortcuts on different sites. These include, for example, 1 to go to the homepage, 4 for search, 9 for contact, and others.

Now things get more lively; are they a good idea and should you implement them? This is exactly what I found myself asking in an accessibility review this week.

Tuesday, 16 June 2015

How-to: Understand Access Keys Part I - Usage


Access keys enable a user to navigate a site using keyboard short-cuts, improving both the usability and accessibility of a website. Or so the theory goes.

The access key attribute, introduced in HTML4.0 and promoted as a government standard, provides for keyboard short-cuts as an alternative form of navigation. This addition allows users with limited physical capabilities to navigate a website more easily.

Also known as "Accelerator Keys", "Shortcut Keys" or "Accesskeys", they can be used in most browsers, and work as short-cuts to enable people to navigate a site using a keyboard. Every browser treats these differently, some shifting focus to the link specified, and some activating the link as though it were clicked on... so the theory goes. You know what's coming next...

Tuesday, 9 June 2015

How-to: Team Building the Inclusive Way


Baboons on a fence by Meneer Zjeroen (Creative Commons) via FlickrTeam Building used to consist of everyone piling into a room, death by PowerPoint from our Glorious Leaders and thinly veiled threats of what would happen if we didn't shut up, get on with it and meet the expected Mission Impossible revenue/savings/productivity/overtime targets.

These days we have to be more inclusive.

How do you balance a productive day of activities to encourage collaboration, discipline and commitment to shared values, with some element of fun that will suit everyone? And how, without a three-line whip and the threat of penalties for die-hard opters-out, do you avoid ritually humiliating one or several members of staff with an experience akin to a mandatory fourth-grade cross-country run in your underpants?

Humour: Facebook wish-list


Facbook wish-list

We can but dream… RC

Monday, 1 June 2015

New: Full Circle Magazine issue 97 out now


The team at Full Circle magazine is pleased to announce the release of Issue 97.

This month:
  • Command & Conquer
  • How-To: Run Android Apps in Ubuntu, LibreOffice, Using LaTeX, and Programming JavaScript
  • Graphics: Inkscape. 
  • Chrome Cult
  • Linux Labs: IP Camera with Powerline Adapter 
  • Ubuntu Phones
  • Review: KDE Plasma 5 
  • Ubuntu Games: This War of Mineplus: News, Arduino, Q&A, and so much more.

Sunday, 31 May 2015

Review: The Imitation Game (2014)


The Imitation Game movie poster This unassuming biopic of British scientist and father of modern computing, Alan Turing, is warmly and delicately told from his time as a schoolboy prodigy to his last days as a convicted, chemically castrated outcast.

Benedict Cumberbatch (Star Trek Into Darkness, The Fourth Estate) brings his other-worldly strangeness to the obsessive cryptographer and builder of the code-breaking Colossus machine at Bletchly Park.

British war-time period drama it may be, but there's invention enough to lift it out of the ordinary, adding drama to the tragedy of the man who broke the German Enigma code.

Sunday, 24 May 2015

Review: Ex Machina (2015)


Ex Machina movie posterShy, awkward programmer Caleb wins the company lottery; a week with his reclusive boss Nathan, the brilliant, billionaire founder of the world's largest search engine, at Nathan's isolated private estate in the wilds of Alaska.

On arriving, Caleb finds his prize is in fact to run the Turing Test on Nathan's ground breaking artificial intelligence, to discover if it is truly a sentient being. Not an easy task; the AI is the alluring android-shaped Ava; former programming prodigy Nathan, the Mozart of the Internet, is a manipulative sociopath; and Caleb himself may not be quite the innocent he appears.

Screen writer Alex Garland's directorial début is a chilly, tense, claustrophobic sci-fi drama of subtle performances concerning the moral and ethical questions of creation, conciousness and free-will. From the very first power-cut in Nathan's total-surveillance bunker, you know that this is not going to end well...

Monday, 18 May 2015

Full Circle issue 95 out now


The creators of Full Circle Magazine are pleased to announce the release of Issue 95.

This month:
  • Command & Conquer
  • How-To : Program in Python, LibreOffice, and Using LaTeX
  • Graphics : Inkscape
  • Linux Labs: Syncthing
  • Review: BQ Aquaris E4.5 Ubuntu Phone & Able2Extract Pro 9
  • Competition: WIN a copy of Able2Extract Pro 9
  • Ubuntu Games: Penumbra Necrologue & Perfect Golf
  • My Story special on handling molecules in Linux
plus: News, Arduino, Q&A, and much more.

Friday, 15 May 2015

How-to: Generate Good Passwords Part II



For those of you on the front-line dealing with user accounts and password resets in large organisations, we return to the thorny issue of passwords.

We will soon be implementing a tougher security standard for encrypting passwords within the our events database. It should occur invisibly behind the scenes and I won’t bore you with the technical stuff, but if we do have any glitches, I'm going to honestly advise this is going on and quietly iron those out. Everybody loves a bit of improved security.

Tuesday, 12 May 2015

Review: Blackhat (2015)


Blackhat movie posterThe question is, can master of style over substance Michael Mann (Heat, Miami Vice) overcome the worst movie title this decade as well as make computer hacking gripping and exciting? The answer is - no. So instead he churns out a third-rate Bond movie in his his favourite cop-show format.

Redoubtable Chris Hemsworth (Rush, Thor) makes the least convincing hacker since Angelina Jolie (Hackers) and is acted off-screen by Chinese leading lady Tang Wei.

Friday, 24 April 2015

How-to: Make a drop-down list in Excel


If you're wanting data validation in spreadsheet forms and template documents, a drop-down list remains the most common way to achieve it.

Skipping over the question why am I covering a Microsoft product when there's a perfectly good LibreOffice alternative, let me just say; 'because someone asked me.'

Wednesday, 22 April 2015

How-to: Protect your web downloads. Not.


Portcullis by Kevin King on imgbuddy I started this under the banner “Web-accessible e-publications NOT as PDF's” in light of the membership products discussion that happened this morning. Thinking about the delivery of web-accessible e-publications (our bread-and-butter) which are NOT downloadable and NOT printable for certain classes of registered web users, this is as much of a minefield today as fifteen years ago in a previous life.

This is all about balancing ease of access and customer service against the admin/IT cost of providing material via a robust delivery mechanism. Before you ask, I have no recommendation at this point.

Monday, 20 April 2015

How-to: Use Dashes and Hyphens on the web


A note for the  punctuationally-challenged.

There's a brilliant article on A List Apart: The Trouble With EM ’n EN (and Other Shady Characters) by This article, while brilliant for its time, is now obsolete."

However the topic doesn't go away and we're still struggling, not only with the style guide but how to render these shady characters for the web when there are all sorts of technical issues.

First of all, what’s the Difference Between an Em Dash, En Dash & Hyphen? And what has happened to them online?

Friday, 10 April 2015

How-to: Meet Web Accessibility Guidelines


Una puerta abierta. (An open door).  Photo by William Murphy; licensed via Creative Commons.
Two things converged this week; we are revising our in-house style guide which necessarily includes print and online, whilst on the development front, I have a team (well, Dave, actually - it's always a 'Dave') producing wireframes and mockups for our web-based CRM front end.

Accessibility remains a hot topic. It never ends and complacency is our worst enemy.


Which led me to revisit the Web Accessibility Guidelines, particularly the section on making content readable and the wisdom contained therein:

Thursday, 9 April 2015

Review: Codes that Changed the World (BBC R4)


Codes that Changes the World - BBC R4Aleks Krotoski explores the history of programming languages. The history of computing is dominated by the hardware; the race for speed and power has overshadowed how we've devised ways to instruct these machines to do useful tasks.

All this week on BBC Radio 4, Aleks Krotoski tells the story of the languages that have been used to talk to machines.

Krotoski, journalist and presenter of the Guardian Tech Weekly Podcast and soon the seventh series of The Digital Human, looks at computer programming languages in five 15-minute shows. Presented in the style of BBC-Popular-Science-Lite, these are whistle-stop tours for the mildly interested lunchtime listener.

Monday, 23 March 2015

Full Circle Magazine issue 94 out now


Full Circle Magazine issue 94
Full Circle Magazine is pleased to announce the release of issue 94.

This month:
  • Command & Conquer
  • How-To : Block Calls, LibreOffice, and Using i2P
  • Graphics : Inkscape.
  • Linux Labs: BTRFS
  • Book Review: Practical Data Science Cookbook
  • Ubuntu Games: War Thunder
plus: News, Arduino, Q&A, and much more.

Get it while it’s hot!
http://fullcirclemagazine.org/issue-94/

Share it now!

Full Circle is a free, independent, monthly magazine dedicated to the Ubuntu family of Linux operating systems. Each month, it contains helpful how-to articles and reader submitted stories.

Sunday, 22 March 2015

Opinion: Goodbye Google Plus [Guest Post]


Google Plus: image Creative Commons by West McGowan 
It’s true: Google is breaking it’s heavily embedded but failed social networking product Google Plus into separate products – Streams and Photos, new head of Social Bradley Horowitz announced on Google+ earlier this month.

It was telling that Horowitz didn’t specifically mention Google Plus, which pretty well signals the end of Google’s foray. Google Plus was supposed to be a one-stop shop for interactiing across all products and all users.

Clearly the vision has changed.

Friday, 13 March 2015

How-to: Develop a backup policy and procedure


You will find no end of statistics on the number of companies that fail and the people who get fired in the aftermath of a data disaster; fire, flood and electrical failures cause interruptions to normal business and if you can't avoid it, the key thing is how you recover and get back up and running.

Your various systems - sales, logistics, HR, payroll, accounts, membership, inventory - these are all databases that contain the data critical to the overall success of your organization; not only does that need to be backed up regularly, but you also need to test the restore process.

That does not change whether all of that resides on premises, at a third party or on-line in the Cloud.

Thursday, 26 February 2015

How-to: Start Planning your CRM Landscape


Tibet landscape by Luo Shaoyang from Beijing, China (Tibet) [CC BY 2.0 (http://creativecommons.org/licenses/by/2.0)], via Wikimedia Commons For its foundation stones, CRM requires some basic building blocks in terms of storing data.

As with any technical solution, using CRM successfully depends on storing data in the right place and in the right way, which can only happen with careful consideration and planning; mapping your data into a sensible structure that the CRM can support.

That means planning for the general rule and carefully corralling the exceptions; just because you can go wild with custom fields for any and every occasion, doesn't mean you should.

Wednesday, 25 February 2015

How-to: Develop an Implementation Plan


The user requirements are in; the specification and designs signed off; development ready to begin; then you realise you have no idea what the implementation looks like!

With a major programme such as CRM to run, a phased implementation plan, scheduling delivery of slices of functionality, over the life of the project, would be a good approach. We're aiming to get the foundation components in place - the database schema, frameworks, server infrastructure, then, while detailed design and development continues, identify some quick wins to provide business benefit early on.

There's no point  waiting for a monolithic development to complete if everyone has retired or died in the interim...

Thursday, 19 February 2015

How-to: Review a Data Design


"the code be more a set of guidelines than actual rules"
(Pirates of the Caribbean)

This is not the only way, nor is it drawn from any particular method; this is just a convenient set of hooks on which to hang our data design meeting this week. You could apply it to any kind of design review, and it works well in the context of much more formal methods.

So my agenda for tomorrow looks like this:

Wednesday, 18 February 2015

How-to: Understand Website 'Identity Information'


...or more precisely, when a reputable website such as Wordpress.com displays a warning triangle and the message: "this site does not supply identity information."

You may notice the warning triangle in the address bar on sites which use the HTTPS, SSL and TLS protocol and certificates, and get the message when you scroll over it. Wordpress? Really?

Let's replay Internet Security-101, with apologies to the technically 'ept' (not the 'inept').

How-to: Introduction To Git [Guest Post]


Command and Conquer: Introduction to Git by Lucas Westerman originally appeared in Full Circle Magazine Issue 84

I received an email from a reader of Command & Conquer, asking me to write an article on using Git – specifically things such as what a fork is, what pulling is, and what exactly a commit is. He also followed it up asking about auto-merge errors and how to fix them. I will do my best to cover each of these points in particular.

However, as most of my experiences with Git are via Github, which offers some extra functionality on their website that isn't the “vanilla” Git experience, there may be some aspects of my explanations that do not apply to a custom git server.

Thursday, 12 February 2015

How-to: Change your Firefox Update Channel


Firefox on the work desktop was not playing nice; realising it looked funny, I did a version check and discovered it was stuck on 24.0 ESR.

Normally Firefox updates automatically. To kick off the update process, go to Tools, About and the version checker usually appears below the version number.

As Mozilla has a number of update channels, each with differing frequency of software releases, ESR seemed like a poor choice given I hadn't updated in six months. Working as I do on the web, that's equivalent to 4.2 years.

Tuesday, 10 February 2015

How-to: Decide to Build or Buy CRM


Image credit: Building under Construction from Construction3 at Freefoto.com
Received wisdom over the last twenty years has concluded from a time/cost/quality perspective, if you need to deploy new software, you should buy not build. This is especially true of a big, complex item such as a CRM system.

In many vertical market applications, full-featured packages offer quick start-up with known costs, be it from an original vendor, a reseller, or via the Open Source route.

But while commercial packages may offer a standard approach to implementation, these proprietary systems, will most likely demand you use the software house that designed and wrote it, or their approved resellers (consultants) to help you implement it. So what options are there?

Monday, 2 February 2015

News: Full Circle Magazine Issue 93


Full Circle, the independent magazine for the Ubuntu community, is pleased to announce the release of our 93rd issue.

This month:
  • Command & Conquer
  • How-To : RTL-SDR Radio, LibreOffice, and Ubuntu Kiosk
  • Graphics : Inkscape.
  • Linux Labs: Compiling a Kernel Pt 6 and Trying FreeBSD
  • Review: Ubuntu Mate 14.10
  • Book Review: Official Ubuntu Book 8th Edition
  • Ubuntu Games: X-Plane & FSEconomy, and Unigine Heaven Benchmark
plus: News, Arduino, Q&A, and so much more.

Thursday, 29 January 2015

Review: HumHub Social Network



"HumHub is a free social network software and framework built to give you the tools to make teamwork easy and successful.

It's lightweight, powerful and comes with an user-friendly interface. With HumHub you can create your own customized social network, social intranet or huge social enterprise application that really fits your needs."


When we lapsed our Saleforces licences, the Chatter facility went, too. What we needed was an IM replacement for internal use. Very few fitted our constraints.

It had to be:

Sunday, 25 January 2015

How-to: Code of Conduct and Community Rules for the Forum



"Where would we be if we didn't have rules? France. Where would we be if we had too many rules? Germany."
- Al Murray, the Pub Landlord.

Our current forum has been running just over a year and I realised only this week, there was no formal Code of Conduct and Community Rules. Fortunately, we have a considerate, polite, but small number of engaged users, so this hasn't been a problem. But there may come the unruly day when someone decides not to play nice with the other kids.

Friday, 23 January 2015

How-to: A New CRM


[NOTE: some of what follows is actually true. Some is invented for the case study. You can decide which...]

Sometime last year, the current client got serious about the need for a new Customer Relationship Management (CRM) system. Having jumped at Salesforce without really having the skills or the vision to implement it properly, and despite two project re-starts, it had fallen by the wayside.

So we went through the exercise of deciding 'what next': a third restart, to get it right? Buy in another commercial package, go Open Source, or build something in-house?

Trouble is, everyone already knew the answer was '42' but didn't necessarily know what the question was...

Wednesday, 21 January 2015

How-to: Enable Cookies and Javascript


It goes against the grain, it really does; but sometimes, there is no alternative, some websites just insist on Javascript and cookies in order to work properly - sometimes to work at all.

Which is fine, no one forces you to sacrifice your privacy and security any more then they force you to step off the kerb to cross the street. My beef is that the options to do this are all tucked away in different places in different browsers. And don't get me started on the movable feast of browser versions.

So, as much of a mental note as anything ...

Thursday, 15 January 2015

Opinion: A Dangerous Proposition


And for once, not my opinion, but Cory Doctorow over on Boing Boing, which I simply had to highlight: 'What David Cameron just proposed would endanger every Briton and destroy the IT industry.'

An essential item, from the very opening 'David Cameron says there should be no "means of communication" which "we cannot read."'

I give you Doctorow's logical summary of the PM's programme.

 This, then, is what David Cameron is proposing:

How-to: Help! My IP address has been hacked!


Tool - Hacksaw - Evan Amos, Public Domain That was a genuine call for help recently, a friend-of-a-friend thing where I happened to be the closest thing to an IT expert they knew.

Rather than contemptuously asking "what do you mean your IP address has been hacked" my first question was - what are the symptoms, how do they know they've been 'hacked'? This covers a multitude of sins, very few of which have to do with a discoverable fixed IP address.

And at risk of boring everybody with another Security-101, I'm going to outline my first thoughts.

Wednesday, 14 January 2015

How-to: Maintain a good e-mail server reputation


Reputation management

If you recall, we were having trouble with outbound emails from our event management application, and I described measures around Sender Policy Framework (SPF) records to make us look a little more trustworthy. Only I dived right into SPF without covering some of the basics.

Well, we're still having trouble with Hotmail/Outlook.com just swallowing, not even bouncing or marking as spam, our outbound mails to clients. So, it's back to server reputation management to see what more can be done.

Monday, 5 January 2015

How-to: Fix Untrusted Connections in Firefox Pt 2


In part 1, I outlined a fix for this, which for the most part, works a treat. 

Except when it doesn't work, of course... Which, as has been pointed out, it sometimes doesn't. You can delete cert8.db and not fix it, getting sec_error_unknown_issuer and the Add Exception button not available.

Which is frustrating when all other Browsers (Chrome, Safari, IE11) are working as normal on the same device. Assuming your system date and time are set correctly (check all certificate expiry dates versus your clock), it could be either of two things.

Friday, 2 January 2015

Full Circle Magazine Issue 92 with a Happy New Year


Full Circle, the independent magazine for the Ubuntu community, is pleased to announce the release of our 92nd issue.

This month:
  • Command & Conquer
  • How-To : Make a Special Edition, LibreOffice, and Bulk Print with Nautilus
  • Graphics : Inkscape.
  • Linux Labs: Compiling a Kernel Pt 5 and Graphically Renaming Files Over SSH
  • Review: Scilabs
  • Book Review: Build Your Own Web Site
  • Ubuntu Games: X-Plane Flight Plans
plus: News, Arduino, Q&A, and so much more.