Language Selection

English French German Italian Portuguese Spanish

What's in Store for SUSE in 2012

Filed under
SUSE

It's been a long, strange trip for SUSE. What started in 1992 as a small German company with a derivative of Slackware Linux became a mighty Linux distribution in its own right. Money problems led to a sale to Novell in 2003, which had its own share of troubles.

Finally Novell was sold to Attachmate in a deal that closed in April of this year. Attachmate then decided to spin SUSE off into its own business, and tapped Nils Brauckmann as president and general manager of the unit.

To get a sense what SUSE is in for in 2012, I talked to Brauckmann this morning. Brauckmann's involvement with SUSE started with Attachmate's purchase, so the first time we spoke was earlier this year just after he took over the role. This time I found him much readier to discuss details of the SUSE strategy, if not every minor product detail.

rest here




More in Tux Machines

Leftovers: Gaming

Leftovers: KDE/Qt

Leftovers: OSS

Security Leftovers

  • DNS server attacks begin using BIND software flaw
    Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses. Last week, a patch was issued for the denial-of-service flaw, which affects all versions of BIND 9, open-source software originally developed by the University of California at Berkeley in the 1980s.
  • Researchers Create First Firmware Worm That Attacks Macs
    The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t. It turns out this isn’t true. Two researchers have found that several known vulnerabilities affecting the firmware of all the top PC makers can also hit the firmware of MACs. What’s more, the researchers have designed a proof-of-concept worm for the first time that would allow a firmware attack to spread automatically from MacBook to MacBook, without the need for them to be networked.