Language Selection

English French German Italian Portuguese Spanish

Mandriva and Turbolinux Announce Manbo-Labs

Filed under
Linux

Mandriva and Turbolinux announce a partnership by creating a lab named: Manbo-Labs. This Lab is the result of an agreement between Mandriva and Turbolinux to share resources and technology to release a common base system on each of the Linux distributions.

Mandriva, the leading European editor of Linux distributions, and Turbolinux, a leading Linux client and server distributor in Japan and China, signed the agreement about Manbo-Labs last October and have been working together since then. Both companies decided to wait until first internal delivery to issue this announcement.

Manbo-Labs' team is composed of more than ten developers from France, Japan, Brazil and also includes developers from the community. Altogether, they have been working on building a common Linux base system to be released in April 2008. Mandriva Linux 2008 Spring will be based on this system.

The current internal delivery is composed of: gcc; glibc; rpm; kernel; bin-utils; mkinitrd; udev.

By this Agreement, Mandriva and Turbolinux form a strategic partnership to pursue on Linux solutions to address new customers. By pooling together common engineering resources, Mandriva and Turbolinux will be able to invest more in technology and product quality. For instance this will help in getting more hardware compatibility and stronger relationships with ISVs and IHVs.

More Here




I'm getting worried about this...

Here's what PJ wrote:

[PJ: I guess this is goodbye then, for me, as far as Mandriva goes. I’ve used it for years and really loved it, and I thank them for helping me get to use Linux. But TurboLinux signed a patent deal with Microsoft, joined Ecma to help out with MSOOXML, participates in the Interoperability Vendor Alliance, uses Windows Media and made Live Search the default. So you don’t have to be a rocket scientist to know what all that means. Since Mandriva and Turbolinux are sharing code now, I don’t trust the code so it’s a fond farewell from me.]

Sad :-(

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

War Thunder on GNU/Linux and More on SteamVR

Leftovers: OSS

Security Leftovers

  • Wednesday's security advisories
  • Smartphones with fingerprint scanners under screen to hit market this year
    The majority of fingerprint scanners can be found either on the back of a smartphone or on the front, embedded in the home button. But it looks like that status quo is soon about to change. According to a report from The Investor, CrucialTec, a manufacturer of fingerprint modules based in South Korea, will launch its on-screen fingerprint scanning solution that allows you to unlock your device by placing a finger on the screen sometime this year. This means that we can expect to see the first smartphones featuring the new fingerprint technology hit the market in 2017. Unfortunately, CrucialTec did not reveal an exact time frame or the smartphone manufacturers it is currently working with.
  • Kaspersky launches 'secure operating system' -- with no trace of Linux in it [Ed: You must be pretty desperate for headlines and attention when your marketing pitch is, "we're not Linux!"]
  • Windows Botnet Spreading Mirai Variant
    A Chinese-speaking attacker is spreading a Mirai variant from a repurposed Windows-based botnet. Researchers at Kaspersky Lab published a report today, and said the code was written by an experienced developer who also built in the capability to spread the IoT malware to Linux machines under certain conditions.
  • Five New Linux Kernel Vulnerabilities Were Fixed in Ubuntu 16.10, 14.04 & 12.04
    We reported earlier that Canonical published multiple security advisories to inform Ubuntu users about the availability of new kernel updates that patch several flaws discovered recently by various developers. We've already told you about the issues that are affecting Ubuntu 16.04 LTS and Ubuntu 16.04.1 LTS (Xenial Xerus) users, so check that article to see how you can update your systems is you're still using the Linux 4.4 LTS kernel. But if you managed to upgrade to Ubuntu 16.04.2 LTS, which uses Ubuntu 16.10 (Yakkety Yak)'s Linux 4.8 kernel, then you need to read the following.
  • Another Linux Kernel Vulnerability Leading To Local Root From Unprivileged Processes

Red Hat News