Language Selection

English French German Italian Portuguese Spanish

Linux

Galaxy Note 3 Neo has a hexa-core processor

Filed under
Linux
Google
Hardware

Galaxy Note 3 Neo, the long-rumored budget version of the Note 3, has been officially announced by Samsung Poland. The device will be available in two flavors — 3G and LTE+ (offering connectivity on higher-speed Category 4 networks up to 150 Mbps down/50 Mbps up) when it will be launched globally starting February in your choice of black, white or green.

Read more

It Pays To Sell GNU/Linux

Filed under
Linux

For years I have watched the web-stats for GNU/Linux languish in Mexico. No longer. In the summer of 2013, retailers, Dell, HP, Lenovo, Acer and Canonical got together in Mexico and sold PCs.It does pay to have actual salespeople and retail shelf-space. Obviously the PCs are selling. I hope other countries get going on this, mine, for instance…

Read more

Linux Video of the Week: Sailfish Mobile OS Updates

Filed under
Linux

Jolla's Linux-based Sailfish project released its first handset in Finland this past November to favorable reviews. Since then the Meego-derived mobile operating system has publicized a few small, but interesting updates, including a new IRC client and a demo of the OS running on a Nexus 4 (watch the videos, below.)

Read more

RT-enhanced Linux stack aims at comms gear

Filed under
Linux

Like Enea Linux 3.0, the new Enea LWRT focuses on real-time Linux support. Enea LWRT is primarily aimed at cellular base stations and media gateways that require real-time features like determinism, minimal interrupt latency, and high throughput, says the company. The solution is said to be optimized for integrating Linux with Enea’s OSEck.

Read more

GNOME's Virtual Filesystem Reaches Version 1.19.5

Filed under
Linux

GVFS 1.19.5 sets etag::value for FTP, sets infinite timeout for enumerate response for daemon, removes GVfsUriMountInfo, forces openpty(3) on BSD for SFTP, rates limit progress callbacks for daemon, and properly removes socket_dir for gvfsdaemon.

Read more

Moonlight: Yet Another Linux Desktop Environment

Filed under
Linux

Moonlight is a project still in its early stages and likely will fade away like the many other third-party desktop environments with limited manpower and scope. Moonlight Desktop is trying to be a lightweight desktop for the Raspberry Pi and other low-powered, low-end, old devices -- similar in scope to Xfce, LXDE, Enlightenment, etc. They really don't seem to be far along at all right now and are still working towards an appearance for their desktop.

Read more

It’s Not Just Android: 3 Upcoming Linux Mobile Operating Systems

Filed under
Linux

Of the many mobile operating systems in the marketplace, Android has the largest share of users, and Android is based on Linux. It’s not surprising then to know that Linux is also the basis for several new (if slow-moving) operating systems for mobile devices (phone, tablet, phablet). Some are in production today, but most are still in the development stages. Then again, this is the rule for most products in mobility today.

Read more

Canalys: 80 percent of all smartphones shipped in 2013 ran Android

Filed under
Linux

For quite awhile now, there has been no question about which operating system dominates the smartphone market, domestic or worldwide. Android's reach is not slowing down either, based on a new report from global market research firm Canalys.

Read more

Linux 3.14 Supports MIPS' Latest CPU Core

Filed under
Linux

These latest MIPS designs, which were announced back in 2012, are described as "the interAptiv is a power-efficient multi-core microprocessor for use in system-on-chip (SoC) applications. The interAptiv combines a multi-threading pipeline with a coherence manager to deliver improved computational throughput and power efficiency. The interAptiv can contain one to four MIPS32R3 interAptiv cores, system level coherence manager with L2 cache, optional coherent I/O port, and optional floating point unit."

Read more

Lenovo announces ThinkPad 11e laptops, Chromebooks for education market

Filed under
Linux
Google

Dubbed the ThinkPad 11e family, it comprises four models: two traditional notebooks, and a pair of Yoga convertible systems that can function as either laptop or tablet. A Chromebook version of either form factor will be available. (Dell announced a education Chromebook last month.)

Read more

Syndicate content

More in Tux Machines

today's howtos

Leftovers: OSS

  • Report: If DOD Doesn't Embrace Open Source, It'll 'Be Left Behind'
    Unless the Defense Department and its military components levy increased importance on software development, they risk losing military technical superiority, according to a new report from the Center for a New American Security. In the report, the Washington, D.C.-based bipartisan think tank argues the Pentagon, which for years has relied heavily on proprietary software systems, “must actively embrace open source software” and buck the status quo. Currently, DOD uses open source software “infrequently and on an ad hoc basis,” unlike tech companies like Google, Amazon and Facebook that wouldn’t exist without open source software.
  • The Honey Trap of Copy/Pasting Open Source Code
    I couldn’t agree more with Bill Sourour’s article ‘Copy.Paste.Code?’ which says that copying and pasting code snippets from sources like Google and StackOverflow is fine as long as you understand how they work. However, the same logic can’t be applied to open source code. When I started open source coding at the tender age of fourteen, I was none the wiser to the pitfalls of copy/pasting open source code. I took it for granted that if a particular snippet performed my desired function, I could just insert it into my code, revelling in the fact that I'd just gotten one step closer to getting my software up and running. Yet, since then, through much trial and error, I’ve learned a thing or two about how to use open source code effectively.
  • Affordable, Open Source, 3D Printable CNC Machine is Now on Kickstarter
    The appeals of Kickstarter campaigns are many. There are the rewards for backers, frequently taking the form of either deep discounts on the final product or unusual items that can’t be found anywhere else. Pledging to support any crowdfunding campaign is a gamble, but it’s an exciting gamble; just browsing Kickstarter is pretty exciting, in fact, especially in the technological categories. Inventive individuals and startups offer new twists on machines like 3D printers and CNC machines – often for much less cost than others on the market.
  • Open Standards and Open Source
    Much has changed in the telecommunications industry in the years since Standards Development Organization (SDOs) such as 3GPP, ITU and OMA were formed. In the early days of telecom and the Internet, as fundamental technology was being invented, it was imperative for the growth of the new markets that standards were established prior to large-scale deployment of technology and related services. The process for development of these standards followed a traditional "waterfall" approach, which helped to harmonize (sometimes competing) pre-standard technical solutions to market needs.

Leftovers: BSD

  • The Voicemail Scammers Never Got Past Our OpenBSD Greylisting
    We usually don't see much of the scammy spam and malware. But that one time we went looking for them, we found a campaign where our OpenBSD greylisting setup was 100% effective in stopping the miscreants' messages. During August 23rd to August 24th 2016, a spam campaign was executed with what appears to have been a ransomware payload. I had not noticed anything particularly unusual about the bsdly.net and friends setup that morning, but then Xavier Mertens' post at isc.sans.edu Voice Message Notifications Deliver Ransomware caught my attention in the tweetstream, and I decided to have a look.
  • Why FreeBSD Doesn't Aim For OpenMP Support Out-Of-The-Box

Security Leftovers

  • FBI detects breaches against two state voter systems
    The Federal Bureau of Investigation has found breaches in Illinois and Arizona's voter registration databases and is urging states to increase computer security ahead of the Nov. 8 presidential election, according to a U.S. official familiar with the probe. The official, speaking on condition of anonymity, said on Monday that investigators were also seeking evidence of whether other states may have been targeted. The FBI warning in an Aug. 18 flash alert from the agency's Cyber Division did not identify the intruders or the two states targeted. Reuters obtained a copy of the document after Yahoo News first reported the story Monday.
  • Russians Hacked Two U.S. Voter Databases, Say Officials [Ed: blaming without evidence again]
    Two other officials said that U.S. intelligence agencies have not yet concluded that the Russian government is trying to do that, but they are worried about it.
  • FBI Says Foreign Hackers Got Into Election Computers
    We've written probably hundreds of stories on just what a dumb idea electronic voting systems are, highlighting how poorly implemented they are, and how easily hacked. And, yet, despite lots of security experts sounding the alarm over and over again, you still get election officials ridiculously declaring that their own systems are somehow hack proof. And now, along comes the FBI to alert people that it's discovered at least two state election computer systems have been hacked already, and both by foreign entities.
  • Researchers Reveal SDN Security Vulnerability, Propose Solution
    Three Italian researchers have published a paper highlighting a security vulnerability in software-defined networking (SDN) that isn't intrinsic to legacy networks. It's not a showstopper, though, and they propose a solution to protect against it. "It" is a new attack they call Know Your Enemy (KYE), through which the bad guys could potentially collect information about a network, such as security tool configuration data that could, for example, reveal attack detection thresholds for network security scanning tools. Or the collected information could be more general in nature, such as quality-of-service or network virtualization policies.
  • NV Gains Momentum for a Secure DMZ
    When it comes to making the shift to network virtualization (NV) and software-defined networking (SDN), one of the approaches gaining momentum is using virtualization technology to build a secure demilitarized zone (DMZ) in the data center. Historically, there have been two major drawbacks to deploying firewalls as a secure mechanism inside a data center. The first is the impact a physical hardware appliance has on application performance once another network hop gets introduced. The second is the complexity associated with managing the firewall rules. NV technologies make it possible to employ virtual firewalls that can be attached to specific applications and segregate them based on risk. This is the concept of building a secure DMZ in the data center. The end result is that the virtual firewall is not only capable of examining every packet associated with a specific application, but keeping track of what specific firewall rules are associated with a particular application becomes much simpler.