Language Selection

English French German Italian Portuguese Spanish

Is SUPER Superior?

Filed under

SUPER is a project to optimize SuSE for speed and performance. In looking for an idea for my next article, I thought this project's lastest effort might make an interesting review. It's based on OpenSuSE's latest release, which is 10.0 RC1. Being concerned with speed and performance, this review could not help but compare SUPER's times with that of OpenSuSE's. However, there was another kink in the armor. I'd already compared OpenSuSE with Mandriva. I got to thinking, was the test fair? Did they use the same boot options? Were the same services and deamons being started at boot? Did they both use parallel=yes? So, what started out as a review of SUPER has morphed into a speed test. Is Super really faster than other two contenders?

SUPER stands for SUSE Performance Enhanced Release. To quote the site: "SUPER is a testbed for anything that makes your SUSE Linux OS perform in a different manner than intended in the more stable and enterprise oriented SUSE Linux tree. This can be a speed improvement geared towards the specialized desktop user or an additional feature that is considered too experimental or dangerous by the main SUSE Linux tree." So, in other words they are trying to make a good thing even better by compiling base packages in a certain order, optimized per architecture (for dvd version), utilizing RUN_PARALLEL=yes, limiting boot time file operations, pre-linking and caching files for boot-up with readahead.

SUPER is quite scaled down in comparison to the OpenSuSE SuSE Linux distribution. Applications are limited in number, and in fact the entire distro comes on one cd and takes about 1.3 gig of hard drive space. As a result the menus are minimized as is the selection of applications. The full rpm list as tested is located here. One could set up an SuSE ftp mirror in yast and install whatever else they'd like I speculate. But otherwise it is almost identical on the surface to SuSE Linux 10.0 rc1.


But is SUPER superior in performance?

Given the fact that one needs to take into consideration the startup services, it's also important to note that Mandriva gives the user a choice during install and SuSE presumes to make that decision for us (although can be adjusted later). So, where at first consideration my original times (1, 2) may seem unequal, I submit perhaps they are. Another important note is that SuSE Linux runs RUN_PARALLEL=yes as well as preloads applications with readahead by default as found in SUPER.

For the sake of this rough and unscientific experiment, I installed on Reiserfs, used the same boot options, matched the start up services as closely as possible, booted to run level 3 with vga=normal. The clock is started when the <enter> key is depressed.

Discrepancies between this and previous tests may be contributed to booted run level, frame buffer, and having opened applications previously that boot. Represented below are the averages of 3 time tests for each area, first open of each application.

Time in Seconds

Mdv 2006rc1 OSS 10.0rc1 Super 10.0rc1

Boot 17 24 21.6
X&KDE 21 27.3 15.3
OpenOffice 6 6.6 4.6
Firefox 3 3.3 2
Shutdown 17.6 22.3 21

Versions as tested

Mdv 2006rc1 OSS 10.0rc1 Super 10.0rc1

X&KDE 6.9.0,3.4.2 6.8.2, 3.4.2 6.8.2, 3.4.2
OpenOffice 1.1.5 1.9.125 1.9.125
Firefox 1.0.6 1.0.6 1.0.6
gcc 4.0.1 4.0.2 4.0.2

As you can see, the optimizations in compiling methods of SUPER are having a significant performance increase once the system is booted, whether that was the compile order of the base system or the flags used in the individual applications. However, Mandriva is still smokin' 'em on the boot and shutdown times. There is no clear winner here, as it will depend on personal preference. If you are the type that has 3 month uptimes, you aren't going to care about boot times as much. On the other hand if you are the type that leaves your applications open just about from boot to boot, yet has to reboot to another os often, then application start times might seem less important. Is SUPER superior? It's up to you to decide.

More in Tux Machines


  • New features in GNOME To Do
    Some of you might have noticed that GNOME To Do wasn’t released with GNOME 3.22. There is a reason for that: I didn’t have enough time to add new features, or fix any bugs. But that changed, and in fact big things happened.
  • CUDA 8, cuDNN, Nvidia drivers and GNOME Software metadata
    The Nvidia driver repository has been updated with AppStream metadata. From Fedora 25 onward, you will be able to search for Nvidia, CUDA, GeForce or Quadro to make the driver, control panel and other programs appear in the Gnome Software window. As far as I know, this should be enabled by default on Fedora 25.
  • Builder Rust
    With Federico’s wonderful post on Rust’ifying librsvg I guess it makes sense to share what I’ve been doing the last couple of days. I’ve been keeping my eye on Rust for quite a while. However, I’ve been so heads down with Builder the last two years that I haven’t really gotten to write any or help on integration into our platform. Rust appears to take a very pragmatic stance on integration with systems code (which is primarily C). The C calling convention is not going anywhere, so at some point, you will be integrating with some part of a system that is “C-like”. Allowing us to piecemeal upgrade the “Safety” of our systems is much smarter than rewrite-the-universe. This pragmatism is likely due to the realities of Rust’s birth at Mozilla. It’s a huge code-base, and incrementally modernizing it is the only reality that is approachable.
  • Librsvg gets Rusty
    I've been wanting to learn Rust for some time. It has frustrated me for a number of years that it is quite possible to write GNOME applications in high-level languages, but for the libraries that everything else uses ("the GNOME platform"), we are pretty much stuck with C. Vala is a very nice effort, but to me it never seemed to catch much momentum outside of GNOME. After reading this presentation called "Rust out your C", I got excited. It *is* possible to port C code to Rust, small bits at a time! You rewrite some functions in Rust, make them linkable to the C code, and keep calling them from C as usual. The contortions you need to do to make C types accessible from Rust are no worse than for any other language.

Leftovers: Software

  • Rblpapi 0.3.5
    A new release of Rblpapi is now on CRAN. Rblpapi provides a direct interface between R and the Bloomberg Terminal via the C++ API provided by Bloomberg Labs (but note that a valid Bloomberg license and installation is required).
  • Flatpak 0.6.13
    These used to take an application id and an optional branch name as two arguments. This meant you could not specify multiple apps to install in a single command. So, instead of having the branch as a separate argument we now support partial references. If you only specify an id we try to match the rest as best we can depending on what is installed/available, but if this matches multiple things you have to specify more details.
  • New features on Hosted Weblate
    Today, new version has been deployed on Hosted Weblate. It brings many long requested features and enhancements.
  • A Wild Desktop Reddit App for Linux Appears
    Reddit is …Well it’s Reddit: there’s little else like it on the internet. Thos of us who use Reddit probably do so a tab, in a browser, because that’s how the site works best. Many desktop Reddit apps exist, but few translate the unique experience of using the service to the desktop in a way that really works.
  • Opera 41 Browser Brings Performance Improvements
    For those still using the Opera web-browser, Opera 41 is now available as the latest stable release and seems primarily focused on performance improvements.
  • Faster and better browsing – Welcome Opera 41
    We all know the feeling. You want to check out your favorite website, but when you open your laptop or turn on your computer, you realize the browser is closed. You click on the browser icon and then have to wait while the browser opens all your previously opened sites… We have a solution for you that makes your browsing faster: Opera 41 includes a new, smarter startup sequence that cuts away almost all the wait time, no matter how many tabs you open on startup.

today's howtos

Security News

  • Tuesday's security updates
  • We Got Phished
    She logged into her account but couldn’t find the document and, with other more urgent emails to deal with, she quickly moved on and put this brief event out of mind. This staff member will henceforth be known as PZ, or “patient zero.” The login page wasn’t really a login page. It was a decoy webpage, designed to look legitimate in order to trick unsuspecting recipients into typing in their private login credentials. Having fallen for the ruse, PZ had effectively handed over her email username and password to an unknown party outside the Exploratorium. This type of attack is known as “phishing.” Much like putting a lure into a lake and waiting to see what bites, a phishing attack puts out phony prompts, such as a fake login page, hoping that unwitting recipients can be manipulated into giving up personal information.
  • DDoS attacks against Dyn the work of 'script kiddies'
    Last week's distributed denial of service attack in the US against domain name services provider Dynamic Network Services are more likely to have been the work of "script kiddies", and not state actors. Security researchers at threat intelligence firm Flashpoint dismissed reports that linked the attack to WikiLeaks, the Russian government or the New World Hackers group. Instead, Flashpoint said, it was "moderately confident" that the Hackforums community was behind the attack which led to well-known sites like Twitter, Spotify, Netflix and Paypal being inaccessible on 21 October (US time).
  • How one rent-a-botnet army of cameras, DVRs caused Internet chaos
    Welcome to the Internet of Evil Things. The attack that disrupted much of the Internet on October 21 is still being teased apart by investigators, but evidence thus far points to multiple "botnets" of Internet-connected gadgets being responsible for blocking access to the Domain Name Service (DNS) infrastructure at DNS provider Dyn. Most of these botnets—coordinated armies of compromised devices that sent malicious network traffic to their targets—were controlled by Mirai, a self-spreading malware for Internet of Things (IoT) devices. in a blog post on the attack, Dyn reported "tens of millions" of devices were involved in the attack But other systems not matching the signature of Mirai were also involved in the coordinated attack on Dyn. "We believe that there might be one or more additional botnets involved in these attacks," Dale Drew, CSO of Level 3 Communications, told Ars. "This could mean that they are 'renting' several different botnets to launch an attack against a specific victim, in which multiple other sites have been impacted." The motive may have been blackmail, since the attacker sought a payout by Dyn to stop. But Drew warned that the huge disruption caused by the attack "could result in large copycat attacks, and [a] higher [number of] victim payouts [so] as to not be impacted in the same way. It could also be a signal that the bad guy is using multiple botnets in order to better avoid detection since they are not orchestrating the attack from a single botnet source."
  • ARM builds up security in the tiniest Internet of Things chips
    IoT is making devices smaller, smarter, and – we hope – safer. It’s not easy to make all those things happen at once, but chips that can help are starting to emerge. On Tuesday at ARM TechCon in Silicon Valley, ARM will introduce processors that are just a fraction of a millimeter across and incorporate the company’s TrustZone technology. TrustZone is hardware-based security built into SoC (system on chip) processors to establish a root of trust. It’s designed to prevent devices from being hacked and taken over by intruders, a danger that’s been in the news since the discovery of the Mirai botnet, which recently took over thousands of IP cameras to mount denial-of-service attacks.
  • Antique Kernel Flaw Opens Door to New Dirty Cow Exploit