Language Selection

English French German Italian Portuguese Spanish

How two volunteers built the Raspberry Pi’s operating system

Filed under
Linux
Hardware

When you buy a Raspberry Pi, the $35 computer doesn't come with an operating system. Loading your operating system of choice onto an SD card and then booting the Pi turns out to be pretty easy. But where do Pi-compatible operating systems come from?

With the Raspberry Pi having just turned one year old, we decided to find out how Raspbian—the officially recommended Pi operating system—came into being. The project required 60-hour work weeks, a home-built cluster of ARM computers, and the rebuilding of 19,000 Linux software packages. And it was all accomplished by two volunteers.

Like the Raspberry Pi itself, an unexpected success story




More in Tux Machines

Mycroft AI Intelligent Personal Assistant Now Available as a Raspberry Pi Image

It's been very quiet lately for the Mycroft project, an open-source initiative to bring a full-featured intelligent personal assistant to Linux desktops, but it looks like it's still alive and kicking, and it's now available as a Raspberry Pi image. Read more

You Can Now Have All the Essential Ubuntu 14.04.5 LTS Flavors on a Single ISO

After informing Softpedia about the release of the Linux AIO Ubuntu 16.10 Live DVDs, Željko Popivoda from the Linux AIO team is now announcing the availability of Linux AIO Ubuntu 14.04.5. Read more

Benchmarking Radeon Open Compute ROCm 1.4 OpenCL

Last month with AMD/GPUOpen's ROCm 1.4 release they delivered on OpenCL support, albeit for this initial release all of the code is not yet open-source. I tried out ROCm 1.4 with the currently supported GPUs to see how the OpenCL performance compares to just using the AMDGPU-PRO OpenCL implementation. Read more

Canonical to Remove Old Unity 7 Scopes from Ubuntu Because They're Not Secure

Canonical's Will Cooke has revealed recently the company's plans on removing some old, unmaintained Unity 7 Scopes from the Ubuntu Linux archives because they could threaten the security of the entire operating system. Read more