Language Selection

English French German Italian Portuguese Spanish

Ubuntu Rescued My Laptop

Filed under
Ubuntu

A few weeks ago I started seeing the “Blue Screen of Death” on my Sony Vaio PCG-K35 laptop every 10 minutes or so, making the computer nothing more than an overpriced 7 lb. brick. Because my laptop is more of a convenience and I’m in the middle of a large project, it got put up in the closet until I found time to deal with it.

I pulled it out last week and was unable to find the activation keys to Windows XP Pro and Microsoft Office that came with the laptop from the OEM. This pretty much made reinstalling it with Microsoft software impossible, and I’m not about to drop $500-700 on new keys to get it all running again- I don’t even like Microsoft.

This weekend while driving to South Carolina to meet with my fiance’s brother (who also happens to be a minister and is going to marry us), I installed the Ubuntu Linux 6.10 (Edgy Eft) distribution that I downloaded and burnt to CD on my desktop.

Installing Ubuntu

Wow. That’s all I can say- Wow. Ubuntu installed like a dream in less than 30 minutes, and everything just worked. My wireless card worked, power management worked, and the DVD burner worked with no tweaking, fidgeting, or fussing.

I’m no stranger to Linux- All the dedicated servers I lease are always powered by a Red Hat or some other Linux distribution. However, all my experiences with graphical interfaces on desktops for the open-source operating system have been painful at best. Every other distribution I have tried always required me to compile drivers, tweak settings, and generally get pissed off trying to make things work.

Ubuntu just does, right “out of the box”.

Ubuntu vs. XP… No Adobe, but Everything Else Rocks

Full Story.

re: Ubuntu

Article should be titled: "I'm a dumbass and can't file simple registration numbers safely away or figure out how to image my laptop harddrive".

Apparently finding the license sticker that's welded to the bottom of her laptop is also too hard.

She's "no stranger to Linux" (with her vast hosting experience) but this is the first (THE FIRST) distro she tried that actually works??? Time to get out of the house a bit more, there are dozens of distro's that work on the desktop.

But the story does have a happy ending as yet another Ubuntu fanboy is born.

Your comment.

To comment in kind:

Your comment should be titled: "I'm a rude and arrogant jerk who can't post a comment without a nasty insult."

re: Your Comment

Possibly.

Assuming you read the article, which part of my comment is untrue?

To me, it looks like the author is jumping on the Ubuntu fan club to garner free exposure to her site where she just happens to be promoting the launch of a new service.

Commenting style.

Didn't say it was untrue--accuracy is not my issue. It's a matter of style and attitude--I just don't care for your arrogant, in-your-face rudeness.

Commenting is not a nasty contest. You don't need to win any points, or establish yourself as a put-down artist in order to comment disfavorably on something. To quote one of my favorite science fiction authors, "90% of nearly everything is crap", so it's easy to find lots to be critical about, and that's fine. Showing some grace while doing it is a real art.

re: Style

Luckily, I'm a scientist and not an artist (graceful or otherwise), so I favor facts over political correctness.

Style is relative, so one persons rude and arrogance is another's direct and to the point.

Publishing anything on the internet (a mostly global public media) is not for the weak willed or thin skinned.

Gook luck with that.

"I argue very well. Ask any of my remaining friends. I can win an argument on any topic, against any opponent. People know this, and steer clear of me at parties. Often, as a sign of their great respect, they don't even invite me."
-- Dave Barry

I could go into a major slash and burn here, but it's pointless. A simple Google Search shows that you've annoyed many, many others (must all be "weak-willed, thin-skinned" folk) in other forums around the Internet.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Programming: Go, Bugs and LLVM

  • 3 ways to copy files in Go
    This article will show you how to copy a file in the Go programming language. Although there are more than three ways to copy a file in Go, this article will present the three most common ways: using the io.Copy() function call from the Go library; reading the input file all at once and writing it to another file; and copying the file in small chunks using a buffer.
  • The life cycle of a software bug
    During the process of testing, bugs are reported to the development team. Quality assurance testers describe the bug in as much detail as possible, reporting on their system state, the processes they were undertaking, and how the bug manifested itself. Despite this, some bugs are never confirmed; they may be reported in testing but can never be reproduced in a controlled environment. In such cases they may not be resolved but are instead closed. It can be difficult to confirm a computer bug due to the wide array of platforms in use and the many different types of user behavior. Some bugs only occur intermittently or under very specific situations, and others may occur seemingly at random. Many people use and interact with open source software, and many bugs and issues may be non-repeatable or may not be adequately described. Still, because every user and developer also plays the role of quality assurance tester, at least in part, there is a good chance that bugs will be revealed.
  • LLVM's OpenMP Offloads Liboffload Into Oblivion
    The liboffload library has been dropped from LLVM's OpenMP repository. Liboffload is/was the Intel runtime library for offloading and geared for supporting the Xeon Phi co-processors. But liboffload within LLVM hasn't been receiving updates, it wasn't properly integrated within the LLVM build system, and unfortunately Xeon Phi co-processors appear to be discontinued. The liboffload library has also confused some with LLVM's libomptarget library for OpenMP support that is in much better shape.

Games and Wine (Staging) Leftovers

Free Software: Kiwi TCMS 4.2, PeerTube in the News

  • Kiwi TCMS: Kiwi TCMS 4.2
    We're happy to announce Kiwi TCMS and tcms-api version 4.2! This is a security, bug-fix and enhancement update which upgrades to the latest Django version under Python 3.6. We've pushed new kiwitcms/kiwi:latest docker image to Docker Hub and updated the demo instance at https://demo.kiwitcms.org! This version also includes GDPR related changes which affect our project. Read below for the details.
  • PeerTube: An Open Source YouTube Alternative To Beat Censorship
    When it’s about watching videos online, YouTube is the first thing that comes to our minds. But the popular video sharing platform is often subjected to censorship in many countries. There are many countries including China and North Korea that ban YouTube from time to time. Leave the others, recently, even YouTube ended up blocking many legitimate Channels as a collateral damage of its copyright crackdown. Ultimately, the content creators are the ones who get affected due to all of this blocking.
  • PeerTube: A ‘Censorship’ Resistent YouTube Alternative

    YouTube is a great video platform that has a lot to offer to both consumers and creators. At least, those who play by the rules. For creators, there is a major drawback though, one that put a spotlight on the alternative 'free-libre' software PeerTube this week.

OpenBSD chief de Raadt says no easy fix for new Intel CPU bug

Recompiling is unlikely to be a catch-all solution for a recently unveiled Intel CPU vulnerability known as TLBleed, the details of which were leaked on Friday, the head of the OpenBSD project Theo de Raadt says. The details of TLBleed, which gets its name from the fact that the flaw targets the translation lookaside buffer, a CPU cache, were leaked to the British tech site, The Register; the side-channel vulnerability can be theoretically exploited to extract encryption keys and private information from programs. Read more