Language Selection

English French German Italian Portuguese Spanish

Dell fixes Ubuntu laptop pricing

Filed under
Ubuntu

Dell Ubuntu Linux buyers were recently outraged when a price comparison between identical Inspiron 1420 laptops showed that instead of the Ubuntu system being cheaper, it actually ended up costing $225 more than the same laptop with Vista Home Basic Edition. This was after Dell had announced the week before that Ubuntu systems would be $50 cheaper than similar systems running Vista Home Basic Edition.

"Bottom line this was an oversight, pure and simple," a Dell spokesperson told DesktopLinux.com. "We will be posting a comment to IdeaStorm to that effect by tomorrow." In the meantime, Dell says that the prices have been reset to the appropriate prices.

The systems that were compared were Inspiron 1420s with Intel Core 2 Duo T5250 processors running at 1.5GHz, with a 667MHz FSB (front-side bus) and 2MB of cache.

More Here and @ Direct2Dell.




More in Tux Machines

Development Functional Programming in JavaScript and Learning to Code

  • An introduction to functional programming in JavaScript
    When Brendan Eich created JavaScript in 1995, he intended to do Scheme in the browser. Scheme, being a dialect of Lisp, is a functional programming language. Things changed when Eich was told that the new language should be the scripting language companion to Java. Eich eventually settled on a language that has a C-style syntax (as does Java), yet has first-class functions. Java technically did not have first-class functions until version 8, however you could simulate first-class functions using anonymous classes. Those first-class functions are what makes functional programming possible in JavaScript. JavaScript is a multi-paradigm language that allows you to freely mix and match object-oriented, procedural, and functional paradigms. Recently there has been a growing trend toward functional programming. In frameworks such as Angular and React, you'll actually get a performance boost by using immutable data structures. Immutability is a core tenet of functional programming. It, along with pure functions, makes it easier to reason about and debug your programs. Replacing procedural loops with functions can increase the readability of your program and make it more elegant. Overall, there are many advantages to functional programming.
  • Learning to Code in One’s Own Language
    I recently published a paper with Sayamindu Dasgupta that provides evidence in support of the idea that kids can learn to code more quickly when they are programming in their own language. Millions of young people from around the world are learning to code. Often, during their learning experiences, these youth are using visual block-based programming languages like Scratch, App Inventor, and Code.org Studio. In block-based programming languages, coders manipulate visual, snap-together blocks that represent code constructs instead of textual symbols and commands that are found in more traditional programming languages.
  • [Older] RcppArmadillo 0.7.900.2.0

Intel Core i7 7740X Preliminary Benchmarks On Linux

For those not yet well briefed on the Core-X series since the embargo expiry last week, the i7-7740X has four cores plus Hyper Threading. It has a 4.3GHz base frequency with 4.5GHz turbo frequency and an 8MB cache. The i7-7740X has a 112 Watt TDP, natively supports DDR4-2666 of dual-channel memory, and foregoes any integrated graphics. Read more

Security: Another Massive, Worldwide Ransom Attack on Microsoft Windows, Security News About GNU/Linux

  • NSA-linked tools help power second global ransomware outbreak [Ed: And neglecting to mention it targets Microsoft Windows. Why?]
  • Hacker Behind Massive Ransomware Outbreak Can't Get Emails from Victims Who Paid
    On Tuesday, a new, worldwide ransomware outbreak took off, infecting targets in Ukraine, France, Spain, and elsewhere. The hackers hit everything from international law firms to media companies. The ransom note demands victims send bitcoin to a predefined address and contact the hacker via email to allegedly have their files decrypted.
  • Digital signatures in package management
    Serious distributions try to protect their repositories cryptographically against tampering and transmission errors. Arch Linux, Debian, Fedora, openSUSE, and Ubuntu all take different, complex, but conceptually similar approaches. Many distributions develop, test, build, and distribute their software via a heterogeneous zoo of servers, mirrors, and workstations that make central management and protection of the end product almost impossible. In terms of personnel, distributions also depend on the collaboration of a severely limited number of international helpers. This technical and human diversity creates a massive door for external and internal attackers who seek to infect popular distribution packages with malware. During updates, then, hundreds of thousands of Linux machines download and install poisoned software with root privileges. The damage could hardly be greater. The danger is less abstract than some might think. Repeatedly in the past, projects have had to take down one or more servers after hacker attacks. The motivation of (at least) all the major distributions to protect themselves from planted packages is correspondingly large and boils down to two actions: one simple and one cryptographic.
  • This Windows Defender bug was so gaping its PoC exploit had to be encrypted
    Microsoft recently patched a critical vulnerability in its ubiquitous built-in antivirus engine. The vulnerability could have allowed attackers to execute malicious code by luring users to a booby-trapped website or attaching a booby-trapped file to an e-mail or instant message.
  • [Older] Reproducible Builds: week 110 in Stretch cycle
  • [Older] Free Market Security
    I think there are many of us in security who keep waiting for demand to appear for more security. We keep watching and waiting, any day now everyone will see why this matters! It's not going to happen though. We do need security more and more each day. The way everything is heading, things aren't looking great. I'd like to think we won't have to wait for the security equivalent of a river catching on fire, but I'm pretty sure that's what it will take.
  • Linux Systems in the Hackers' Cross Hairs [Ed: This is a rewrite of a press release below. Phil Muncaster could certainly have done better than this.]
  • New Research Shows Cybersecurity Battleground Shifting to Linux and Web Servers
    "This new Firebox Feed data allows us to feel the pulse of the latest network attacks and malware trends in order to identify patterns that influence the constantly evolving threat landscape," said Corey Nachreiner, chief technology officer at WatchGuard Technologies. "The Q1 report findings continue to reinforce the importance and effectiveness of basic security policies, layered defenses and advanced malware prevention. We urge readers to examine the report's key takeways and best practices, and bring them to the forefront of information security efforts within their organizations."

Ubuntu Kylin, a Linux Distribution with a Microsoft Windows Experience

Ubuntu Kylin is an open-source Linux distribution based on Ubuntu since 2013, mainly developed by a Chinese team alongside dozens of Linux developers all over the world. It contains the basic features you would expect from Ubuntu, plus features a desktop environment and applications. As far as we know, Ubuntu Kylin is one of the most suitable Linux distributions for users who are farmiliar with Microsoft Windows, including its desktop environment, office suite and various applications. Read more