Language Selection

English French German Italian Portuguese Spanish

SUSE Linux 10.2a2 report

Filed under
Reviews
SUSE
-s

The developmental release of SUSE Linux 10.2 alpha 2 hit mirrors a day ahead of schedule and with the announcement came some big news. The openSUSE project of SUSE Linux will soon become known as openSUSE, starting with alpha 3, to avoid confusion with the enterprise level products. It was reported that the new naming should be visible by beta 1. This was the biggest news associated this release. Other than one other small surprise, there isn't much difference between alpha1 and alpha2.

The release announcement acknowledged from the start that this version would only bring updated software versions and for the most part that's about all there is to report. Testers were warned of the broken graphical install ahead of time and as such I was prepared to use the text install.

I booted my SUSE Linux 10.2 alpha 2 cd1 with little excitement. I was expecting the tranquil blue boot screen I've become accustomed to seeing. But, yikes! The Lizard is back! When the boot splash began to appear I was shocked awake by a huge lizard staring me right in the eye. That splash is actually from a photo taken by Alan J Wolf.

That's about all the excitement there was. The second stage graphical install is broken and it was suggested one could either kill X when it locks up or just install in the text mode. I've described the text install in the past and it hasn't changed. It warrants mentioning again that this is most impressive and extensive text installer I've experienced.

Another "most annoying bug" listed is a GNOME/x86-64 installation will complain about broken dependencies, just disable the banshee packages.

    

In testing various software packages and modules in the yast control center and gnome control center, I found everything working really well at this early stage. As far as priliminary testing will allow, the software manager seemed to work well. So whereas there aren't any new features to discuss, we can rejoice in the fact that things are functioning fairly well.

    

Some new version numbers look as follows:

MozillaFirefox-1.5.0.4-4
OpenOffice_org-2.0.3-2
kernel-source-2.6.16.20-2
kdebase3-3.5.3-13
qt3-3.3.6-11
gtk2-2.8.10-49
gnome-desktop-2.12.2-26
xorg-x11-6.9.0-67
gcc-4.1.2_20060705-2
apache2-2.2.2-5
mysql-5.0.22-2
php5-5.1.2-31
xgl-cvs_060522-6
libsvg-cairo-0.1.6-16
compiz-cvs_060621-3
xcompmgr-051031-13
Full RPMLIST

    

Some highlights of the Changelog this time include:

++++ koffice:
  - update to KOffice 1.5.2

++++ udev:
  - new upstream release 096

++++ perl  -Tk:
  - build with XFT=1

++++ alsa:
  - updated to version 1.0.12rc1
  * improved output of amidi -l
  - add --datadir to configure to avoid the invalid datadir with
recent auto -tools.

++++ beagle:
  - Upgrade package to 0.2.7; remove all the patches that have
accumulated over time.

++++ amarok:
  - update to version 1.4.1
  - drop helix support on request from Beineri
  - add iPod/iRiver support via libnjb/gpod

++++ gcc:
  - Update to 4.1 SVN head.

++++ qt3:
  - update qt-x11-immodule-unified diff to 20060318 version.

++++ sane:
  - Updated to sane-backends version 1.0.18:
New backends: dell1600n_net, hp3500, pixma, stv680.
Updated backends: avision, canon, dll, epson, fujitsu, genesys,
gt68xx, microtek2, mustek_pp, niash, plustek, snapscan, sp15c,
test, u12, umax1220u.

++++ wesnoth:
  - update to the development version 1.1.7

++++ MozillaFirefox:
  - fixed printing crash if the last used printer is not available

++++ blender:
  - updated to version 2.41

++++ ndiswrapper:
  - update to version 1.18

++++ powersave:
  - Merge changes from CODE10 branch

++++ OpenOffice_org:
  - updated to snapshot ooc680-m7 == 2.0.3rc7

++++ coreutils:
  - Update to coreutils 5.97

++++ smart:
  - update to final 0.42 release

++++ Full Changelog since a1.

Alpha 1 Report.


Have they resolved the updater?

As most of 10.1 users know, the YaST updater was stuffed up in that release...Have they fixed that in 10.2 alpha 2?

re: updater

Well, there were no updates to test against at this point. I'll boot back over there in a fews days or so and see. When I find something out, I'll get back to this question.

thanks.

----
You talk the talk, but do you waddle the waddle?

Gnome Version

I have noticed that Gnome is still at 2.12.xx. This seems a bit odd to me because 2.14 has had some bug fixes and it has a smaller memory footprint. I would think that Suse would add 2.14 for the 10.2 release. I have seen several people post at other sites that there will be a new Gnome in 10.2, but they are not connected to the OpenSuse program, so I don't put much faith into their claims. Has anybody here heard anything official from Suse?

What about the Google Summer of Code? There is a project to create a GTK frontend to Yast so that KDE libs will not have to be installed for the Gnome desktop. Will this and the other projects make it into 10.2?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Audiocasts/Shows: Linux in the Ham Shack and Linux Headlines

  • LHS Episode #302: The End of Kenwood

    Welcome to Episode 302 of Linux in the Ham Shack. In this short topic episode, the hosts discuss the potential end of Kenwood in the amateur radio market, emcom in Montucky, Storm Area 51, HF on satellites, a huge update for PulseAudio, the Linux 5.3 kernel and much more. Thank you for listening and have a fantastic week.

  • 09/19/2019 | Linux Headlines

    Fresh init system controversy at the Debian project, a more scalable Samba, and a big release for LLVM. Plus GitHub's latest security steps and a new version of OBS Studio.

Android Leftovers

When Diverse Network ASICs Meet A Unifying Operating System

And it has also been a decade since switch upstart Arista Networks launched its Extensible Operating System, or EOS, which is derived from Linux. [...] The cross-platform nature of ArcOS, coupled with its ability to run in any function on the network, could turn out to be the key differentiator. A lot of these other NOSes were point solutions that could only be deployed in certain parts of the network, and that just creates animosity with the incumbent vendors that dominate the rest of the networking stack. Given the mission-critical nature of networking in the modern datacenter, it costs a great deal to qualify a new network operating system, and it can take a lot of time. If ArcOS can run across more platforms, qualify faster, and do more jobs in the network, then, says Garg, it has a good chance of shaking up switching and routing. “That totally changes the business conversation and the TCO advantages that we can bring to a customer across the entirety of their network.” Read more

Server: Kubernetes/OpenShift, OpenStack, and Red Hat's Ansible

  • 9 steps to awesome with Kubernetes/OpenShift presented by Burr Sutter

    Burr Sutter gave a terrific talk in India in July, where he laid out the terms, systems and processes needed to setup Kubernetes for developers. This is an introductory presentation, which may be useful for your larger community of Kubernetes users once you’ve already setup User Provisioned Infrastructure (UPI) in Red Hat OpenShift for them, though it does go into the deeper details of actually running the a cluster. To follow along, Burr created an accompanying GitHub repository, so you too can learn how to setup an awesome Kubernetes cluster in just 9 steps.

  • Weaveworks Named a Top Kubernetes Contributor

    But anyone who knows the history of Weaveworks might not be too surprised by this. Weaveworks has been a major champion of Kubernetes since the very beginning. It might not be too much of a coincidence that Weaveworks was incorporated only a few weeks after Kubernetes was open sourced, five years ago. In addition to this, the very first elected chair of the CNCF’s Technical Oversight Committee, responsible for technical leadership to the Cloud Native Foundation was also headed up by our CEO, Alexis Richardson(@monadic) (soon to be replaced by the awesome Liz Rice (@lizrice) of Aqua Security).

  • Improving trust in the cloud with OpenStack and AMD SEV

    This post contains an exciting announcement, but first I need to provide some context! Ever heard that joke “the cloud is just someone else’s computer”? Of course it’s a gross over-simplification, but there’s more than a grain of truth in it. And that raises the question: if your applications are running in someone else’s data-centre, how can you trust that they’re not being snooped upon, or worse, invasively tampered with?

  • Red Hat OpenStack Platform 15 Enhances Infrastructure Security and Cloud-Native Integration Across the Open Hybrid Cloud

    Red Hat, Inc., the world's leading provider of open source solutions, today announced the general availability of Red Hat OpenStack Platform 15, the latest version of its highly scalable and agile cloud Infrastructure-as-a-Service (IaaS) solution. Based on the OpenStack community’s "Stein" release, Red Hat OpenStack Platform 15 adds performance and cloud security enhancements and expands the platform’s ecosystem of supported hardware, helping IT organizations to more quickly and more securely support demanding production workloads. Given the role of Linux as the foundation for hybrid cloud, customers can also benefit from a more secure, flexible and intelligent Linux operating system underpinning their private cloud deployments with Red Hat Enterprise Linux 8.

  • Red Hat Ansible Automation Accelerates Past Major Adoption Milestone, Now Manages More Than Four Million Customer Systems Worldwide

    Red Hat, Inc., the world's leading provider of open source solutions, today announced that more than four million customer systems worldwide are now automated by Red Hat Ansible Automation. Customers, including Energy Market Company, Microsoft, Reserve Bank of New Zealand and Surescripts all use Red Hat Ansible Automation to automate and orchestrate their IT operations, helping to expand automation across IT stacks. According to a blog post by Chris Gardner with Forrester Research, who was the author of The Forrester Wave™: Infrastructure Automation Platforms, Q3 2019, "Infrastructure automation isn’t just on-premises or the cloud. It’s at the edge and everywhere in between."1 Since its launch in 2013, Red Hat Ansible Automation has provided a single tool to help organizations automate across IT operations and development, including infrastructure, networks, cloud, security and beyond.