Language Selection

English French German Italian Portuguese Spanish

4 use cases for Linux desktops in the enterprise

Filed under
GNU
Linux

Access to specific applications. Organizations that run certain applications, such as high-end 3D graphics design and rendering, often choose Linux for desktops. Other specialized applications that may warrant a Linux desktop include financial modeling, data analytics, finite element design and other CPU-intensive tasks. In these scenarios, Linux offers improved performance, a common interface with related servers or supercomputers and an ongoing and data-intensive pipeline operation.

User preference. Certain power users with specialized skills may simply demand Linux for their desktops. Software developers or system administrators may work on Linux-based systems on a daily basis. It often makes sense for these users to run Linux on their desktops as well.

Some organizations adopt Linux for the desktop as a matter of preference and policy. Google, for example, provides and maintains its own Linux distribution, Goobuntu, for its staff to use.

Security, privacy or confidentiality. Linux is generally regarded as easier to maintain and more secure than Windows. The U.S. Department of Defense, for example, developed Lightweight Portable Security Linux, a Linux-based OS that government staff can use to log into secure networks from external and untrusted PCs. Users can install the OS on any PC from plug-in media such as a USB flash drive. The OS establishes and maintains a secure connection into the organization's networks and leaves no footprint behind when users shut it down.

Other Linux distributions such as Tails, IprediaOS, Whonix, Discreete Linux and the Qubes OS are designed specifically to meet stringent security requirements. Some organizations may decide that such options are just what they need to establish and maintain the highest possible security levels.

Read more

Also: Chrome 75 Dev brings USB support to Linux applications [Ed: Google reinventing the wheel here; it used Gentoo GNU/Linux to build ChromeOS and now it gradually 'gives back' what it took (or locked) away]

Chrome OS 75 brings full USB support for Linux apps

  • Chrome OS 75 brings full USB support for Linux apps

    Last year, Chrome OS received an update to add in official support for Linux applications. The initial support was very rough around the edges, to say the least, but since then the company has been working hard to fix things up and make it more user-friendly. With each update for this newly added support to the platform, we are seeing an increase in the number of Linux apps that can be used. The latest addition is full USB support for Linux applications on version 75 of Chrome OS.

Chrome OS 75 has full USB support in Linux apps

Linux on Desktop/:Laptop

  • Chrome OS 75 adds USB device support for Linux, including Android phone debugging

    We knew this feature was in the works as the Stable Channel of Chrome OS 73 brought a menu option for USB Device management. while Chrome OS 72 added USB storage for Linux apps.
    Keith Myers noted the addition of USB device support for Linux on a Chromebook and did some testing with his 3D Printer, an Arduino board and a Intel Movidius Compute Stick. This feature is important for those who want to control, pass or read data to some type of external USB device from the Linux container. Keith noted some functions that Chrome OS 75 breaks as well, which is to be expected in the fast-changing Canary channel.
    Since I dabble with small computing devices myself – my CS group is extending a “pancreas in the cloud” project using a Raspberry Pi, for example – I decided to test some additional features that would be super important for many folks: the Android Debug Bridge (ADB) that lets you modify an Android phone or tablet to install custom software or recovery images.

  • s The Linux Desktop In Trouble?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security: Windows, Books, Apple and More

  • Windows 7 Enters the Last Six Months of Support [Ed: Microsoft propagandist (for ages) Bogdan Popa won't advise people to hop over to GNU/Linux (which he lies about, saying Microsoft "loves Linux")]

    According to third-party data provided by NetMarketShare, Windows 7 continues to be one of the most popular choices for desktop users.

  • Security bootcamp: 8 must-read books for leaders

    The threat of cybercrime constantly looms over business leaders – and it becomes more urgent as cyber attacks become more sophisticated. In 2019, security breaches happen more frequently, and the associated financial hit has increased, according to research from Accenture. Notably, the report points out that hackers increasingly target humans – the “weakest link in cyber defenses” – at all levels of organizations, through tactics like ransomware and phishing. (Witness the recent wave of ransomware attacks against U.S. cities, large and small.) That’s why it’s becoming essential for everyone – not just security professionals – to be well-versed in risk and their organization’s security efforts.

  • Security scanning your DevOps pipeline

    Security is one of the most important considerations for running in any environment, and using open source software is a great way to handle security without going over budget in your corporate environment or for your home setup. It is easy to talk about the concepts of security, but it's another thing to understand the tools that will get you there. This tutorial explains how to set up security using Jenkins with Anchore. There are many ways to run Kubernetes. Using Minikube, a prepackaged virtual machine (VM) environment designed for local testing, reduces the complexity of running an environment.

  • This Is Why We Have Betas. iOS 13 Beta Shows Saved Passwords

    There’s a reason we have beta versions of software: all the kinks need to be worked out. This is also why using beta versions always come with warnings and disclaimers that you’re using the software at your own risk. Users of the iOS 13 beta have discovered that there’s a bug that makes it easy to access the data in “Website & App Passwords” in the Settings app. Certainly, this is something Apple needs to get fixed before the official release, expected for September.

  • Hackers breached Bulgaria’s tax agency and leaked the data of 5M people

    Bulgaria has suffered what has been described as the biggest data leak in its history. The stolen data, which hackers emailed to local media on July 15, originates from the country’s tax reporting service – the National Revenue Agency (NRA). The breach contains the personal data of 5 million citizens, local outlet Capital reports. To put that into perspective, Bulgaria has a population of 7 million. Among other things, the trove includes personal identifiable numbers, addresses, and even income data.

Hardware: ASUS Chromebooks, MacBook Air Slowdowns, Exploding 'i' Things and Planned Obsolescence

  • Acer Chromebook R 11
  • ASUS Chromebook Flip C302CA
  • ASUS Chromebook C202SA
  • The 2019 MacBook Air Has 35% Slower SSD Than 2018 Model

    Tests were conducted on MacBook Air variants with different internal storage options and the drop in the write speeds were witnessed in every variant regardless of the internal storage.

  • 11-Year-Old Girl’s iPhone 6 Exploded Burning Holes In Blanket

    With smartphones from various tech companies falling prey to the exploding game, it seems like it’s Apple’s turn, as this time an iPhone caught fire in Bakersfield, California. It is suggested that 11-year-old Kayla Ramos was sitting in her sister’s bedroom and was holding the iPhone 6 in her hands. She mostly used it for watching YouTube videos and sometimes gave it to her younger siblings.

  • How many kinds of USB-C™ to USB-C™ cables are there?

    Why did it come to this? This problem was created because the USB-C connectors were designed to replace all of the previous USB connectors at the same time as vastly increasing what the cable could do in power, data, and display dimensions. The new connector may be and virtually impossible to plug in improperly (no USB superposition problem, no grabbing the wrong end of the cable), but sacrificed for that simplicity is the ability to intuitively know whether the system you've connected together has all of the functionality possible. The USB spec also cannot simply mandate that all USB-C cables have the maximum number of wires all the time because that would vastly increase BOM cost for cases where the cable is just used for charging primarily.

    How can we fix this? Unfortunately, it's a tough problem that has to involve user education. [...]

Programming: Thread Synchronization, Python, C++

  • Thread Synchronization in Linux and Windows Systems, Part 1

    In modern operating systems, each process has its own address space and one thread of control. However, in practice we often face situations requiring several concurrent tasks within a single process and with access to the same process components: structures, open file descriptors, etc.

  • Intro to Black – The Uncompromising Python Code Formatter

    There are several Python code checkers available. For example, a lot of developers enjoy using Pylint or Flake8 to check their code for errors. These tools use static code analysis to check your code for bugs or naming issues. Flake8 will also check your code to see if you are adhering to PEP8, Python’s style guide.

  • Report from the February 2019 ISO C++ meeting (Library)

    Back in February, I attended the WG21 C++ standards committee meeting in rainy Kona, Hawaii (yes, it rained most of the week). This report is so late that we’re now preparing for the next meeting, which will take place mid-July in Cologne. As usual, I spent the majority of my time in the Library Working Group (for LWG; for details on the various Working Groups and Study Groups see Standard C++: The Committee). The purpose of the LWG is to formalize the specification of the C++ Standard Library, i.e. the second “half” of the C++ standard (although in terms of page count it’s closer to three quarters than half). With a new C++20 standard on the horizon, and lots of new features that people want added to the standard library, the LWG has been very busy trying to process the backlog of new proposals forwarded by the Library Evolution Working Group (LEWG). One of the main tasks at the Kona meeting was to review the “Ranges Design Cleanup” proposal. The cleanup involves a number of fixes and improvements to the new Ranges library, addressing issues that came up during the review of the previous (much larger) proposal to add the Ranges library, which is one of the biggest additions to the C++20 library (most of the other significant additions to C++20 affect the core language, without much library impact). In fact, I’d say it’s one of the biggest additions to the C++ standard library since the first standard in 1998. The Ranges library work overhauls the parts of the standard that originated in the Standard Template Library (STL), i.e. iterators, algorithms, and containers, to re-specify them in terms of C++ Concepts. This has been a multi-year effort that has now landed in the C++20 working draft, following multiple proposals and several meetings of wording review by LWG.

  • Save and load Python data with JSON

    JSON stands for JavaScript Object Notation. This format is a popular method of storing data in key-value arrangements so it can be parsed easily later. Don’t let the name fool you, though: You can use JSON in Python—not just JavaScript—as an easy way to store data, and this article demonstrates how to get started.

Android Leftovers