Language Selection

English French German Italian Portuguese Spanish

Mir in Ubuntu 13.10, Benchmarking, and More

Filed under
Ubuntu

Many of you will have seen the recent news about Mir coming to Ubuntu 13.10 in October 2013. For those of you who are unaware of Mir, it is an Open Source display server we are building that we will use across desktops, phones, tablets, and TV. It currently works with Open Source drivers and we are currently in discussions with the major GPU manufacturers to discuss Mir support in their proprietary drivers.

FMost recently, we reached out to Phoronix to ask if Michael could perform some benchmarking tests on Mir to see where things stand today with applications running on XMir on Mir. Now, bear in mind that Mir has not yet been through a round of performance optimizations (this will happen a little later in the cycle), and the results naturally have a performance impact because of this, but the impact was not too great. These performance regressions should be largely resolved before Ubuntu 13.10.

full post




Also: The Lubuntu Blog today reported that Lubuntu would be using XMir, but removed the post before I could link to it. Don't know what that means. The only other part I recall was that they were testing it now.

More in Tux Machines

Red Hat General and Financial News

today's howtos

Tizen in Bolivia and India

Security Leftovers

  • Security updates for Wednesday
  • Microsoft says its best not to fiddle with its Windows 10 group policies (that don't work)

    On Monday, we revealed that a security researcher had used a packet sniffer to show that many settings designed to prevent access to the internet were being ignored with connections to a range of third party servers including advertising hubs.

  • What's got a vast attack surface and runs on Linux? Windows Defender, of course
    Google Project Zero's Windows bug-hunter and fuzz-boffin Tavis Ormandy has given the world an insight into how he works so fast: he works on Linux, and with the release of a personal project on GitHub, others can too. Ormandy's project is to port Windows DLLs to Linux for his vuln tests (“So that's how he works so fast!” Penguinistas around the world are saying). Typically self-effacing, Ormandy made this simple announcement on Twitter (to a reception mixing admiration, humour, and horror):
  • Hacked in Translation – from Subtitles to Complete Takeover
    Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years.
  • A Samba remote code execution vulnerability
    Distributors are already shipping the fix; there's also a workaround in the advisory for those who cannot update immediately.