KOffice 2.0 does have new features that stand on their own, such as additional functions for KSpread and the option to encrypt files while saving them. However, such enhancements seem minor compared to those in the interface. While altering KOffice under the hood, its development team also has made serious efforts to enhance the interface—so much so that the user experience is almost completely different in 2.0 from that of earlier releases.
Some of these changes work better than others. In particular, some of the names could be better chosen, at least in English. Apart from the potential confusion from having two dockers called Styles, some, such as the shapes library called Funny, simply seem inappropriate. Then too, the name dockers itself is always going to set North Americans to thinking of business-casual pants.
Still, KOffice 2.0's final release is less likely to be met with the same hostility that KDE 4.0 encountered. True, the possibility of some missing features remains strong—barring a last-minute coding blitz—and some users will complain about any changes.
However, although KOffice 2.0's changes are impossible to miss, they are far less radical than KDE 4.0's. They are not so much changes in the basic concepts you need to use the office suite as improvements in usability. Provided users are not immediately intimidated by the array of dockers, they should find KOffice 2.0 more accessible and quicker and easier to use than those of previous releases. These improvements make KOffice 2.0 a joy to use and more than justify the long wait for the final release.
Bruce Byfield is a computer journalist who writes regularly for the NewsForge and Linux Journal Web sites.
-- Bruce Byfield (nanday)
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide