2000 Readers' Choice Awards
“What else but Gnomeicu?”
A new category to the Readers' Choice Awards, just under half of all voters picked a favorite IM client. Xchat garners the most votes, picking up 20% of the total. Chomping on Xchat's heels, however, is Jabber; a mere 15 votes separate them. BitchX comes in third with 14. As for write-ins, gnomeicu is the most popular. Will everybody have a favorite next year?
“Plain C (without the ++).”
The perennial C/C++ wins 40% of your votes this year. To everyone who took the time to remind us that C and C++ are not the same language, we hear you loud and clear. Second and third place go to Perl and Java, while Python continues to expand its fan base by claiming 8%.
“Amiga :) Running RH 5 and NetBSD 4.x.”
“Platforms that are really tall.”
While some of you claim to use it under protest, Intel x86 is the clear winner with 60% of your votes. The clone AMD, a popular write-in last year, made it to the official ballot this year and received just under 20%. Rounding out the top picks are PowerPC and Alpha. As a write-in, Transmeta makes its debut in the platform category—a preview of next year, perhaps?
“Pathetic, Hollow Shell (of a Man).”
Bash won? It wasn't even close? You don't say. For the third year, the Bourne Again Shell demonstrates its hold over voters (and users), claiming 78% of your responses. In the distance are tcsh with 10% and ksh with 4.5%. A few write-ins express the preference to use bash for scripting while using another shell for everyday use. As for all the shell pun write-ins, who says geeks can't make a (bad) joke?
“VIM rules forever!”
Development tool is one of several categories this year where the distance between first and second place is more than substantial. GCC, at 71%, received almost ten times the number of votes as the second-place tool, Code Warrior. And really, where would any of us be without GCC? An up-and-comer, KDevelop, grabbed third place through the power of write-ins. We'll add it the list next year, guys.
“My plain old radio.”
“One that works would be nice!”
Things sure can change in a year. In the 1999 Awards, XMMS appeared a few times as a write-in; this year, it's the clear and away winner. Receiving just under 50% of your votes, it wins by a healthy margin, too. In the closest finish of any category, second and third place were determined by a single vote—Real Audio and mpg123, respectively. And some of you are still gladly using your CD players.
“My girlfriend says GIMP because she uses it (and is looking over my shoulder).”
“Photoshop...sob sob. Why won't they port this thing?!”
So this new graphics tool came out of nowhere...maybe next year. For now, the GIMP has a strong-hold on this category; this year it wins with 72% of the total votes. The next closest favorite tools are xv with 10% and CorelDRAW with 7%. Voters are pleased by the GIMP's versatility and its ease-of-use, especially for the less artistically gifted among us.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- The Qt Company's Qt Start-Up
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide