Considering that the fix for the first issue is widely available in most distributions and the second one is only a modprobe away, I’d say this laptop is pretty darned Linux compatible. I’m currently running Fedora 21 without any problems.
Linux in hi-rel is growing, says McPherson
Xilinx has joined the Linux Foundation, the industry organisation supporting growth of Linux and collaborative development.
The FPGA firm’s interest indicates how Linux is expanding its footprint beyond consumer and computing markets and in high reliability industrial, automotive and aerospace systems.
The theme of this year’s Embedded Linux Conference, which is sponsored by The Linux Foundation, was ‘Drones, Things and Automotive.’
BQ Aquaris E4.5 Ubuntu Edition First-Time Boot - Video
Today we take a quick look at the first time boot and configuration of the BQ Aquaris E4.5 Ubuntu Edition smartphone. Those of you who watched our unboxing video of the first ever Ubuntu Phone device, would know that it takes some time for the operating system to start when used for first time.
Privacy and Tails 1.3
Privacy and security are difficult to come by in our progressively connected world. Advertisers track our browsing habits, employers monitor productivity and government agencies monitor our communications. Most operating systems do not take steps to protect our privacy or our identities, two things which are increasingly difficult to guard. Tails is a Linux distribution that is designed to help us stay anonymous on-line and protect our identity. Tails is a Debian-based live disc that we can use to scrub our files of meta data, browse the web with some degree of anonymity and send private messages. According to the project's website, "Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging."