Xfce Wiki

Sub domains
 

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Last revision Both sides next revision
gsoc15 [2015/02/17 20:02]
steve [Anonymous collection of user preferences]
gsoc15 [2015/02/20 15:15]
steve
Line 13: Line 13:
   - A dialog to ask for user consent and store their reply, and negotiates a unique, random ID following a specific pattern for the user (for spam protection)   - A dialog to ask for user consent and store their reply, and negotiates a unique, random ID following a specific pattern for the user (for spam protection)
   - A client application that, when launched, looks up the Xfconf settings of the user (and a few things like locale,​timezone) bundles all the data in a convenient format e.g. YAML, and sends it the server over an encrypted connection   - A client application that, when launched, looks up the Xfconf settings of the user (and a few things like locale,​timezone) bundles all the data in a convenient format e.g. YAML, and sends it the server over an encrypted connection
-  - A patch for Xfce4'​s settings daemon to spawn the dialog at a sensible time and to launch the client every month+  - A patch for Xfce4'​s settings daemon to spaw tadtacdig45~n ​the dialog at a sensible time and to launch the client every month
   - A server application that waits for new clients to negotiate IDs with, and that waits for existing clients to send their settings file every month; that stores these files and provides an authenticated interface for Xfce developers to access them   - A server application that waits for new clients to negotiate IDs with, and that waits for existing clients to send their settings file every month; that stores these files and provides an authenticated interface for Xfce developers to access them
 +  - Optional: build hooks in the Whisker menu, Thunar and Appfinder to help us identify how people start new applications,​ and which applications they use the most.
  
 **Skills required:** **Skills required:**
Line 21: Line 22:
   * More programming:​ The client bit should have a GTK+ UI, but could be done in C, Python, Vala, etc. as long as you know you have access to the libraries you need.   * More programming:​ The client bit should have a GTK+ UI, but could be done in C, Python, Vala, etc. as long as you know you have access to the libraries you need.
   * Correct understanding of encryption and computer security   * Correct understanding of encryption and computer security
- 
-==== Anonymous collection of how users launch applications and which applications they use ==== 
- 
-Description:​ TODO. See above