Language Selection

English French German Italian Portuguese Spanish

Setting Up the Ideal Linux Desktop

Filed under
Linux

After years of authorized and -- I admit -- the occasional unauthorized but non-tampering snooping, I'm overdue to offer reciprocity. I'm not naive enough to throw open my machine for everyone to examine online, but, over the years, I have developed several pages of hard-earned notes that I follow and revise whenever I buy and set up a new computer.

Since I'm currently mulling buying another computer in the spring, I'm sharing them now. I figure that many other people share my insatiable curiosity, and, like me, can find a benefit or two by seeing how someone else approaches the task of preparing a computer to run with their favorite free operating system.

Selecting hardware and general setup

If I were doing nothing more than writing and web work, I wouldn't buy a new computer. Instead, I'd get a refurbished two or three year old computer from Free Geek Vancouver, saving me cash and making me environmentally responsible while giving me all the computing power I need.

However, I occasionally do graphics work or review software that strains system resources, so I try to have at least one reasonably up to date computer. I always buy a customized workstation from a small specialty store (every major urban center should have a couple) after researching GNU/Linux hardware compatibility. Then, when it's assembled, I take a live CD -- preferably from my distribution of choice -- and test the assembled computer at the store before I take it home. These days, hardware compatibility is less and less of an issue, but, by making this effort, I sidestep any problems that might lessen the joy of a new machine.

Annoyingly, I don't have the same option for a customized machine if I buy a laptop.

More Here




More in Tux Machines

35 Open Source Tools for the Internet of Things

In a nutshell, IoT is about using smart devices to collect data that is transmitted via the Internet to other devices. It's closely related to machine-to-machine (M2M) technology. While the concept had been around for some time, the term "Internet of Things" was first used in 1999 by Kevin Ashton, who was a Procter & Gamble employee at the time. Read more

IoT tinkerers get new Linux hub & open platforms

Cloud Media, the maker of entertainment box Popcorn Hour, launched a project on Kickstarter, Inc. that will add to the growing number of smart hubs for people to connect and control smart devices. Called the STACK Box, it features a Cavium ARM11 core processor, 256MB DDR3 RAM, 512MB flash, SD slot, 802.11n WiFi, Bluetooth LE 4.0, Z-Wave, standard 10/100 Ethernet port, optional X10 wired communication, 5 USB 2.0 ports, RS-232 port, 2 optocoupler I/O, Xbee Bus, Raspberry Pi-compatible 26-pin bus and runs Linus Kernel 3.10. IT also features optional wireless communications for Dust Networks and Insteon with RF433/315, EnOcean, ZigBee, XBee, DCLink, RFID, IR coming soon. Read more

Citrix and Google partner to bring native enterprise features to Chromebooks

Chromebooks are making inroads into the education sector, and a push is coming for the enterprise with new native Chrome capabilities from Citrix. Google and Citrix have announced Citrix Receiver for Chrome, a native app for the Chromebook which has direct access to the system resources, including printing, audio, and video. To provide the security needed for the enterprise, the new Citrix app assigns a unique Receiver ID to each device for monitoring, seamless Clipboard integration across remote and local applications, end user experience monitoring with HDX Insight, and direct SSL connections. Read more

Is Open Source an Open Invitation to Hack Webmail Encryption?

While the open source approach to software development has proven its value over and over again, the idea of opening up the code for security features to anyone with eyeballs still creates anxiety in some circles. Such worries are ill-founded, though. One concern about opening up security code to anyone is that anyone will include the NSA, which has a habit of discovering vulnerabilities and sitting on them so it can exploit them at a later time. Such discoveries shouldn't be a cause of concern, argued Phil Zimmermann, creator of PGP, the encryption scheme Yahoo and Google will be using for their webmail. Read more