Released just a few days ago, GNOME 3 is the latest major version of the GNOME desktop environment. If you are currently running a GNOME-based Linux or BSD distribution, you are probably using version 2.30 or 2.32, but that should change in the upcoming release cycle when many of the distributions will be shipping with GNOME 3 as the default. So while we wait, this article will attempt to give you an idea of what to expect. Rather than discuss the difference between old and new GNOME from the development angle, the article presents information from a lay user’s perspective. Can I find my away around the new desktop without consulting a manual or documentation?

If you are interested in how GNOME 3 came to be, try this link, and this.

GNOME will not run on just any computer, so if your computer does not meet the hardware and driver requirements, you will see the message below. Now we know that GNOME can run in two modes – the Standard GNOME 3 mode, and in Fallback Mode. In Fallback Mode, you get a desktop experience very close to the GNOME 2 desktop. In a sense, it is an hybrid mode, not quite GNOME 2 and certainly not Standard GNOME 3.

Related Post:  Create and manage user accounts in Chakra Linux 2011.11

Here’s is what the GNOME desktop looks like in Fallback Mode. The Top and bottom panels are still in place, and the Applications and Places menu still occupy their usual place on the top panel. You can see that the administrative tools which used to be under System > Administration, right next to the Places menu, are now accessible from Applications > System Tools. What about all the administrative tools that used to be under System > Preferences?

Well, those are now accessible from System User > System Settings. More on System Settings tools further down.
Fallback Mode

If your computer can run GNOME 3 in all its glory, your desktop will look just like the image below shows. Notice that the Applications and Places menu have been replaced by the Activities menu. The “Displays” entry right next to it is for an open application, and not a permanent entry on the top panel. Did you notice that there is no bottom panel? Did you also notice how snazzy and cool the menus look.

Related Post:  How to install and configure Gufw on Linux Deepin 11.12.1

Clicking on Activities reveals real side of the desktop. All open windows are visible on the main part of the desktop. To the left is the favorites and open applications dock. The right “panel”, which is retracted by default, and visible on mouseover, is like the virtual workspace switcher.

Clicking on Applications takes you to what you might call the menu. From here, you can use the search box to locate applications or just look in the applications categories. You add applications to the Dock by right-clicking on an application’s icon and selecting “Add to Favorites.”

This is just to show how to add an application to the Dock.

You can see the accessibility features enabled by clicking on the Assistive Technologies icon on the top panel. This is not available on the top panel in Fallback Mode.

While in the Windows view, you can open the controls of Rhythmbox or any other application applet in the Messaging Tray.


Share on facebook
Share on twitter
Share on pinterest
Share on linkedin

Hola! Did you notice that no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

One Response

  1. This provides stronger security compared to Gmail because even if ProtonMail were somehow breached, user messages remain secure because ProtonMail only stores encrypted messages. In other words, if an attacker steals emails from ProtonMail, the attacker would not have the ability to decrypt them, as even ProtonMail cannot decrypt them. The use of Zero Knowledge Encryption therefore adds a strong layer of resiliency against catastrophic data breaches.

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.


The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.