Language Selection

English French German Italian Portuguese Spanish

openSUSE 10.2 RC 1 Report

Filed under
Reviews
SUSE
-s

We're in the homestretch now. The only planned release candidate of openSUSE 10.2 was released a few days ago and final is expected to be released to the public on December 7. From this point on only showstopper and security bugfixes get integrated, so we are able to get a real good idea of 10.2 from this rc. I must say, from what I've seen, this is going to be a great release.

This time around I thought it might be fun to test the upgrade procedure. Granted it was only from beta 2 to rc 1, but it went without a hitch (unless the few app glitches were due to the upgrade). With the system resulting from an upgrade, all hardware was already configured and as such, everything worked. This enabled the internet test and the downloading of release notes as well as the online update configuration to be successful. As stated in the changelog, ext3 is now the default filesystem.

The update process is much more simplified than a fresh install, only requiring a fraction of the steps. This time the selection splash screen presented at first boot of the install DVD was the old Pingus modification. I'd forgotten all about that one, but I guess it's fitting for the time of year. I booted the install disk several times, and it appeared each time. I gotta say, I think I prefer animated penguins in santa caps to the big lizard photo. The next busy splash is a bit updated from our last report, as are all the splash screens. There isn't a big change, but the ends of the wisps seem to diverge or flare out a bit more. The color scheme has remained the same.

Once at the desktop we finally see a new openSUSE wallpaper. As suspected, it does indeed match the new splash screens. It's not an exact copy and may not be the final incarnation, but at this point it's a non-distracting background with just a hint of pattern on top of the blue foundation. It's very typical of default wallpapers found in both KDE and openSUSE.

As this is the release candidate that incorporated only serious bug fixes and last minute documentation, we didn't find any surprises. Actually, that may not be exactly so. I was quite suprised at the performance increase experienced this release. I suppose it could be contributed to disabling verbose bug reporting, but it's quite noticeable. For example, OpenOffice.org opened too fast to catch a screenshot of its splash screen.

I did experience a couple of glitches with the apps. The first one was banshee would not open. It bailed out at the splash screen. Another problematic application was gnucash. Again, it just wouldn't open only giving a quick glimpse of the splash before its crash and burn. Everything else seemed to function well in the minimal testing received here. Both KDE and Gnome seemed to behave really well too. The software managers worked as designed as far as could be tested (by installing and uninstalling a few packages). We did experience some difficulty when trying to install iceWM due to conflicting files.

        

        

Andreas Jaeger said of this release, "The areas that we had to work hardest on were the bootloader configuration and our software management stack."

He further explains, "For our software management stack we now have two different user interfaces: The ZENworks Linux interface introduced in SUSE Linux 10.1 with the commands rug and zen-updater - and the new software management tools zypper and opensuse-updater. Zypper accepts most of the commands that rug does with the same syntax. The applet opensuse-updater can talk to the zmd daemon or use directly the package management library without a running daemon. During installation the ZENworks tools are installed by default with the "Enterprise Software Management (ZENworks Linux Management)" pattern, the other one is name "openSUSE Software Management" and can be used alternatively."



RPM Highlights:

  • kernel-default-2.6.18.2-23

  • xorg-x11-7.2-23
  • gcc-4.1.3-28
  • kdebase3-3.5.5-63
  • gnome-desktop-2.16.1-25
  • qt3-3.3.7-11
  • libqt4-4.2.1-17
  • gtk2-2.10.6-12
  • OpenOffice_org-2.0.4-35
  • MozillaFirefox-2.0-19
  • gimp-2.2.13-26
  • amarok-1.4.4-27
  • blender-2.42a-23
  • gaim-1.5.0-84
  • dbus-1-1.0.0-6
  • Full RPMList


Changelog Highlights:

++++ release-notes:

- 10.2.9:
* New Default File System: ext3. .

++++ gnome-main-menu:

- Use package-manager instead of zen-updater.
- Dropped recommends: zen-updater.

++++ compiz:

- Patch gnome-xgl-settings to use the new package-manager
abstraction.

++++ kdebase3-SuSE:

- don't start greeter on every login
- update splash screen preview picture
- invalidate splash screen cache to ensure new one gets shown
- update of splash screen artwork for 10.2
- trigger the kmenu when the greeter closes to avoid focus handling
locks

++++ sax2:

- sometimes usb mice were missed

++++ qtcurve-gtk2:

- fix gtk-window-decorator crash

++++ xorg-x11-driver-video:

- updated (optional) intel modesetting driver (git_2006-11-21)
* Enable second SDVO channel. Rework SDVO support so that it
can deal with two channels correctly, also save/restore all
connected output timings.
* Set configured values for screen virtual size and initial
frame. Computation for virtual size and initial frame origin
is quite broken in xf86 common code.

++++ yast2-printer:

- remote printers are allowed to modify

++++ OpenOffice_org:

- updated ooo-build to version 2.0.4.7:
* wrong calculation in Calc, r1c1 stuff
* searching for JREs

++++ evolution:

- update to version 2.8.2
- translation updates

++++ f-spot:

- Fix picasa web export.

++++ openSUSE-release:

- Not anymore beta...

++++ suseRegister:

- fix parameter List when --no-hw-data is given

++++ planmaker:

- Update to latest version from Softmaker

++++ xcdroast:

- fix dvd burning

++++ yast2-scanner:

- V 2.14.9
- Fixed creation of interface_and_usbid_string in the model_items
list (set interface_and_usbid_string to the empty string if
the scanner has neither SCSI nor USB).
- Using better syntax for the model preselection code
(regarding access integer values in term types).

++++ cups:

- Upgrade to 1.2.7 (another bugfix version)

++++ Full Changelog


Most Annoying Bugs:

  • opensuseupdater opens its window on every desktop login. fix, as root: 'echo "NotShowIn=KDE;" >>/opt/kde3/share/autostart/opensuseupdater.desktop'

  • grub crashes with default proposal & dmraid

Release Notes Highlights:

  • Switch from Firefox version 1.5 to version 2 is a major update. Some themes and extensions will not work anymore. Default keybindings are changed.

  • The "cdrecord" package has been dropped from the distribution. The new "wodim" package can be used.
  • The update of CUPS from version 1.1 to 1.2 carries incompatible changes. It is not possible to convert the printer configuration from the previous CUPS versions automatically.
  • Experts can now rely on YaST for configuring LVM (Logical Volume Manager) and EVMS (Enterprise Volume Management).
  • The X.Org system is installed in /usr. Adjust your programs if needed.
  • The suspend framework switched from powersaved to pm-utils.
  • Full Release Notes


As you can see things seem to be shaping up quite nicely. The Most Annoying Bug list consists of only two items. The changelog contained many bug fixes and also a few version upgrades. The Release Notes are practically complete for the 10.2 release. System operations are becoming more refined with only minimal problems and the glitches of previous final release are just about massaged out of the new software manager. The system itself is looking very slick as well. It appears we are in for a great release this time. No matter your stance on the political issues with Novell lately, the efforts of the openSUSE developers are very apparent and are worthy of note. I find this release candidate looking great and functioning even better. I'm very much looking forward to the final due in just about two weeks. We at Tuxmachines plan on reporting our experiences upgrading from 10.1 as well as a fresh install.

openSUSE 10.2 Beta 2 Report

More in Tux Machines

Tizen News

OSS Leftovers

  • How Open Source Tech Helps Feds Solve Workforce Turnover Issues
    Just as a mainframe from decades ago might be ready for retirement, the IT staff who originally procured and installed that system might also be preparing for a new phase in their lives. It’s up to the current and next generation of government IT employees to prepare for that eventuality, but there are indications they may not be ready, despite evidence that older IT professionals are retiring or will soon be leaving their positions. Unfortunately, a skills gap exists even among younger generation IT workers. Agencies are scrambling to find personnel with expertise in cloud service management, cybersecurity, technical architecture and legacy technologies, such as common business-oriented language (COBOL) and mainframes, among other areas. At the same time that many workers are getting ready to retire, leaving behind a wealth of knowledge, many younger IT professionals are struggling to gain the knowledge they will need to take their agencies into the future.
  • Introducing Fn: “Serverless must be open, community-driven, and cloud-neutral”
    Fn, a new serverless open source project was announced at this year’s JavaOne. There’s no risk of cloud lock-in and you can write functions in your favorite programming language. “You can make anything, including existing libraries, into a function by packaging it in a Docker container.” We invited Bob Quillin, VP for the Oracle Container Group to talk about Fn, its best features, next milestones and more.
  • Debian seminar in Yokohama, 2017/11/18
    I had attended to Tokyo area debian seminar #157. The day’s special guest is Chris Lamb, the Debian Project Leader in 2017. He had attended to Open Compliance Summit, so we invited him as our guest.
  • Overclock Labs bets on Kubernetes to help companies automate their cloud infrastructure
    Overclock Labs wants to make it easier for developers to deploy and manage their applications across clouds. To do so, the company is building tools to automate distributed cloud infrastructure and, unsurprisingly, it is betting on containers — and specifically the Kubernetes container orchestration tools — to do this. Today, Overclock Labs, which was founded two years ago, is coming out of stealth and announcing that it raised a $1.3 million seed round from a number of Silicon Valley angel investors and CrunchFund — the fund that shares a bit of its name and history with TechCrunch but is otherwise completely unaffiliated with the blog you are currently reading.
  • MariaDB Energizes the Data Warehouse with Open Source Analytics Solution
    MariaDB® Corporation, the company behind the fastest growing open source database, today announced new product enhancements to MariaDB AX, delivering a modern approach to data warehousing that enables customers to easily perform fast and scalable analytics with better price performance over proprietary solutions. MariaDB AX expands the highly successful MariaDB Server, creating a solution that enables high performance analytics with distributed storage and parallel processing, and that scales with existing commodity hardware on premises or across any cloud platform. With MariaDB AX, data across every facet of the business is transformed into meaningful and actionable results.
  • AT&T Wants White Box Routers with an Open Operating System [Ed: AT&T wants to openwash its surveillance equipment]
    AT&T says it’s not enough to deploy white box hardware and to orchestrate its networks with the Open Network Automation Platform (ONAP) software. “Each individual machine also needs its own operating system,” writes Chris Rice, senior vice president of AT&T Labs, Domain 2.0 Architecture, in a blog post. To that end, AT&T announced its newest effort — the Open Architecture for a Disaggregated Network Operating System (dNOS).
  • Intel Lands Support For Vector Neural Network Instructions In LLVM
  • p2k17 Hackathon report: Antoine Jacoutot on ports+packages progress
  • GCC 8 Feature Development Is Over
    Feature development on the GCC 8 compiler is over with it now entering stage three of its development process. SUSE's Richard Biener announced minutes ago that GCC 8 entered stage three development, meaning only general bug fixing and documentation updates are permitted.
  • 2018 Is The Year For Open Source Software For The Pentagon
  • Open-source defenders turn on each other in 'bizarre' trademark fight sparked by GPL fall out
    Two organizations founded to help and support developers of free and open-source software have locked horns in public, betraying a long-running quarrel rumbling mostly behind the scenes. On one side, the Software Freedom Law Center, which today seeks to resolve licensing disputes amicably. On the other, the Software Freedom Conservancy, which takes a relatively harder line against the noncompliance of licensing terms. The battleground: the, er, US Patent and Trademark Office. The law center has demanded the cancellation of a trademark held by the conservancy.
  • Open Source Underwater Glider: An Interview with Alex Williams, Grand Prize Winner
    Alex Williams pulled off an incredible engineering project. He developed an Autonomous Underwater Vehicle (AUV) which uses a buoyancy engine rather than propellers as its propulsion mechanism and made the entire project Open Source and Open Hardware.

Programming Leftovers

Security: Linux, Free Software Principles, Microsoft and Intel

  • Some 'security people are f*cking morons' says Linus Torvalds
    Linux overlord Linus Torvalds has offered some very choice words about different approaches security, during a discussion about whitelisting features proposed for version 4.15 of the Linux kernel. Torvalds' ire was directed at open software aficionado and member of Google's Pixel security team Kees Cook, who he has previously accused of idiocy. Cook earned this round of shoutiness after he posted a request to “Please pull these hardened usercopy changes for v4.15-rc1.”
  • Free Software Principles
    Ten thousand dollars is more than $3,000, so the motives don't add up for me. Hutchins may or may not have written some code, and that code may or may not have been used to commit a crime. Tech-literate people, such as the readers of Linux Magazine, understand the difference between creating a work and using it to commit a crime, but most of the media coverage – in the UK, at least – has been desperate to follow the paradigm of building a man up only to gleefully knock him down. Even his achievement of stopping WannaCry is decried as "accidental," a word full of self-deprecating charm when used by Hutchins, but which simply sounds malicious in the hands of the Daily Mail and The Telegraph.
  • New warning over back door in Linux
    Researchers working at Russian cyber security firm Dr Web claim to have found a new vulnerability that enables remote attackers to crack Linux installations virtually unnoticed. According to the anti-malware company, cyber criminals are getting into the popular open-source operating system via a new backdoor. This, they say, is "indirect evidence" that cyber criminals are showing an increasing interest in targeting Linux and the applications it powers. The trojan, which it's calling Linux.BackDoor.Hook.1, targets the library libz primarily. It offers compression and extraction capabilities for a plethora of Linux-based programmes.
  • IN CHATLOGS, CELEBRATED HACKER AND ACTIVIST CONFESSES COUNTLESS SEXUAL ASSAULTS
  • Bipartisan Harvard panel recommends hacking [sic] safeguards for elections
     

    The guidelines are intended to reduce risks in low-budget local races as well as the high-stakes Congressional midterm contests next year. Though most of the suggestions cost little or nothing to implement and will strike security professionals as common sense, notorious attacks including the leak of the emails of Hillary Clinton’s campaign chair, John Podesta, have succeeded because basic security practices were not followed.  

  • Intel Chip Flaws Leave Millions of Devices Exposed
     

    On Monday, the chipmaker released a security advisory that lists new vulnerabilities in ME, as well as bugs in the remote server management tool Server Platform Services, and Intel’s hardware authentication tool Trusted Execution Engine. Intel found the vulnerabilities after conducting a security audit spurred by recent research. It has also published a Detection Tool so Windows and Linux administrators can check their systems to see if they're exposed.