Ein Wilder Ritt Distributionen

Total Page:16

File Type:pdf, Size:1020Kb

Ein Wilder Ritt Distributionen 09/2016 Besichtigungstour zu den skurrilsten Linux-Distributionen Titelthema Ein wilder Ritt Distributionen 28 Seit den frühen 90ern schießen die Linux-Distributionen wie Pilze aus dem Boden. Das Linux-Magazin blickt zurück auf ein paar besonders erstaunliche oder schräge Exemplare. Kristian Kißling www.linux-magazin.de © Antonio Oquias, 123RF Oquias, © Antonio Auch wenn die Syntax anderes vermu- samer Linux-Distributionen aufzustellen, Basis für Evil Entity denkt (Grün!), liegt ten lässt, steht der Name des klassischen denn in den zweieinhalb Jahrzehnten falsch. Tatsächlich basierte Evil Entity auf Linux-Tools »awk« nicht für Awkward kreuzte eine Menge von ihnen unseren Slackware und setzte auf einen eher düs- (zu Deutsch etwa „tolpatschig“), sondern Weg. Während einige davon noch putz- ter anmutenden Enlightenment-Desktop für die Namen seiner Autoren, nämlich munter in die Zukunft blicken, ist bei an- (Abbildung 3). Alfred Aho, Peter Weinberger und Brian deren nicht recht klar, welche Zielgruppe Als näher am Leben erwies sich der Fo- Kernighan. Kryptische Namen zu geben sie anpeilen oder ob sie überhaupt noch kus der Distribution, der auf dem Ab- sei eine lange etablierte Unix-Tradition, am Leben sind. spielen von Multimedia-Dateien lag – sie heißt es auf einer Seite des Debian-Wiki wollten doch nur Filme schauen. [1], die sich mit den Namen traditioneller Linux für Zombies Linux-Tools beschäftigt. Je kaputter, desto besser Denn, steht dort weiter, häufig halten Apropos untot: Die passende Linux- Entwickler die Namen ihrer Tools für Distribution für Zombies ließ sich recht Auch Void Linux [4], der Name steht selbsterklärend oder sie glauben, dass einfach ermitteln. Sie heißt Undead Linux je nach Übersetzung für „gleichgültig“ sie die User ohnehin nicht interessieren. aka Evil Entity [3] und hauchte 2003 oder „nichtig“, wurde einst von seinem Dieser Denkschule folgen offensichtlich trotzdem ihr Leben aus. Das heißt, die Hauptentwickler schon für tot erklärt. viele Macher der mehr als 500 Linux-Dis- zugehörigen Domains sind frei, mögli- Das Ganze stellte sich aber als April- tributionen weltweit (Abbildung 1, [2]). cherweise geistern im Bittorrent-Univer- scherz heraus [5], die totgeglaubte Dis- Bereits die frühen Vertreter trugen wahl- sum noch Kopien umher, auf der Suche tribution schaffte es kürzlich gar auf den weise kryptische Abkürzungen (LSD, LST, nach Gehirnen von Linux-Nutzern. Evil Titel der Ausgabe 04/16 der Linux-Ma- DLD) oder recht merkwürdige Namen wie Entity, das „böse Wesen“, ist übrigens gazin-Schwester „Linux User“. Yggdrasil (Abbildung 2). der Erzfeind der Comicfigur Scooby Hervorstechende Features der Rolling Re- Das Linux-Magazin nimmt das Jubiläum Doo und laut einem Wikia-Eintrag eine lease sind ein eigenes Buildsystem, ein „25 Jahre Linux“ zum Anlass, eine (zu- „schwebende Masse dunkelgrüner Ten- selbst entwickeltes Paketsystem namens gegeben unvollständige) Typologie selt- takel“. Wer sofort an Suse als perfekte Xpbs und der Verzicht auf Systemd. An 09/2016 Titelthema Distributionen 29 www.linux-magazin.de © GFDL, Andreas Lundqvist (initially), Muhammad Herdiansyah (continued) Muhammad Herdiansyah (initially), Lundqvist © GFDL, Andreas Abbildung 1: Nur ein kleiner Ausschnitt aus dem umfangreichen Stammbaum der Linux­Distributionen. Die Grafik wartet unter [http://futurist.se/gldt/]. dessen Stelle setzt Void-Linux, das darauf Schweißausbrüche auslösen – doch völ- nicht, beschwert sich gleich einer in den besteht, kein Fork einer anderen Distribu- lig unberechtigt. Im Gegenteil. Das einzig 666 (!) Kommentaren auf der About-Seite tion zu sein, auf Runit [6]. teuflische an der leichtgewichtigen Li- [12]: „Als spiritueller Satanist finde ich Einen absoluten Sonderfall bietet Damn nux-Distribution, die von CDs oder USB- [die Distribution] beleidigend. Wenn die Vulnerable Linux (DVL, [7]). Wie ein gu- Sticks bootet, ist der Verzicht auf eine Themes mehr in Richtung Satanismus ter Wein wird das infektiöse Linux selbst grafische Oberfläche (Abbildung 4). Das gingen und weniger in Richtung düstere nach seinem Ableben immer besser. macht aber nichts, dient sie doch erfahre- Bilder und Heavy Metal, wäre ich wo- Thorsten Schneider, ein Dozent der Uni nen Admins als Router- und Firewall-Sys- möglich interessierter.“ Neben verletzten Bielefeld, hatte 2007 Version 1.0 von DVL tem und inzwischen auch als dedizierter Gefühlen macht das Zitat die Stoßrich- als Admin-Albtraum voller Sicherheits- Server für Anwendungen. tung der Satanic Edition deutlich – sie lücken veröffentlicht, damit Sicherheits- Der Fokus liegt auf der Sicherheit: Die zielte auf Heavy-Metal-Fans. forscher mit ihr experimentieren. Seit meisten Binaries sind mit GCC Stack Auf der Webseite warten Wallpaper 2012 entwickelt offenbar niemand mehr Smashing Protection übersetzt, der mit Feuer, Totenköpfen und halbnack- das auf Debian und Damn Small Linux Kernel setzt auf GR-Security und Pax. ten Frauen in beliebiger Reihung sowie basierende DVL weiter, womit die Zahl Aktuell arbeiten die Macher ganz bo- Heavy-Metal-inspirierte Musiksamm- der nicht behobenen Sicherheitslücken denständig an Ver- naturgemäß wächst – in diesem Fall eine sion 1.8.0, Exorzisten klassische Win-Win-Situation. dürfen also zu Hause bleiben. Am Abgrund Höllen­ Suicide Linux [8] klingt zunächst wie spektakel eine ironiebegabte und aufstrebende Li- nux-Distribution mit optimistischer Aus- Dringt Devil-Linux nur richtung und Zukunftsplänen, entpuppt dem Namen nach in sich aber bei der Recherche als feuchter religiöse Gefilde vor, Traum für masochistisch veranlagte Sys- tauchen andere Distri- admins. Genau genommen handelt es butionen gleich rich- sich um ein Debian-Paket, das bei jedem tig ein. Denkt man falsch eingegeben Befehl mit Rootrechten zumindest sofort, ein »rm -rf /« absetzt und so sämtliche wenn die Rede auf 3.0 ­ BY Daten auf der Festplatte löscht. Schwarze die Ubuntu Satanic ­ Pädagogik [9] für Linux-Admins, wenn Edition (Abbildung 5, man so will. [11]) kommt. CC © Ralfk, Auch der Name Devil-Linux [10] dürfte Ein Linux für Teufels- Abbildung 2: Yggdrasil gehörte zu den frühen Linux­Distributionen und ließ bei zart besaiteten Usern höllische anbeter sei das aber sich von einer CD starten. 09/2016 Titelthema Sabily lautete der Name der in Frankreich produzierten Ubuntu Muslim Edition [14], die aber 2011 den Gebetsteppich einrollte. Wohl auch, weil sich die ein- zelnen Tools problemlos im Standard- Distributionen Ubuntu nachinstallieren lassen. Laut Wikipedia [15] installierte Sabily arabi- 30 sche Sprachpakete vor und brachte Pro- gramme für Koranstudien, einen islami- schen Kalender sowie eine Erinnerungs- software für Gebetszeiten mit. www.linux-magazin.de Weitere Versionen von Sabily waren ge- © www.abclinuxu.cz plant, faktisch ist aber Ubuntu 11.10 mit Unity-Desktop die letzte angebotene. Das erhält schon länger keinen Support mehr, weshalb Distrowatch die Distribution für tot erklärt. Mit Ojuba-Linux [16] exis- tiert ein leicht angestaubtes Pendant zu Sabily, das auf Fedora basiert. Die letzte Version dieser arabischen Distribution Abbildung 3: Ein tschechisches Blog erlaubt noch einen nachträglichen Eindruck von Evil Entity, das Enligh­ mit einigen islamischen Tools stammt tenment als Desktopumgebung nutzte, aber inzwischen nicht mehr unter uns weilt. vom März 2014. lungen, die Namen wie „Music for the Edition (Abbildung 6, [13]) als „schla- Wellness und Pasta Damned“ oder „Distro of the Beast“ tra- fend“ ein, immerhin erhält das zugrunde gen. Das Ganze war wohl nur zeitweise liegende Ubuntu 12.04 noch bis April Viele Deutsche halten Buddhismus ja witzig, übrig blieb auf der Webseite die 2017 Updates. für praktizierte Wellness, auch bei Bodhi Undead-Live-CD (Version 666.9) mit ei- Dans Guardian sorgt dafür, dass die Kin- Linux [17] wird nicht sofort klar, wie nem völlig veralteten Ubuntu 10.10 und der beim Surfen nicht aus Versehen beim viel Religion und wie viel Wellness in Gnome 2 als Desktop. Echt teuflisch! eben beschriebenen Teufelszeug landen, der Ubuntu-basierten Distribution steckt. an Bord sind christliche Tools wie Xiphos Religiös angehaucht sind vor allem die Himmel hilf! (Bibelstudien) und Open LP (Präsentati- Begriffe. Bodhi kann sich auf denselben onsplattform für Kirchen). Die meisten Wortstamm wie Buddha stützen und Christen haben es da etwas besser. Zwar Pilger zur Webseite kommen übrigens steht für den buddhistischen Erkennt- schätzt Distrowatch die Ubuntu Christian aus den USA, gefolgt von Polen. nisvorgang. Auch der Moksha-Desktop (Abbildung 7) deutet auf diese Richtung hin, das Wort steht in den indischen Re- ligionen ungefähr für Erlösung und Er- leuchtung. Auf der anderen Seite kommt mit Enlight- enment 17 auch ein „erleuchteter“ Desk- top zum Einsatz, womöglich ist Moksha also einfach eine Übersetzung des Wor- tes. Spezielle religiöse Software installiert Bodhi jedenfalls nicht vor, die aktuelle Version 3.2 ist im März 2016 erschienen, Buddha gefällt das. Mit weit weniger Wohlgefallen dürfte hingegen seine nudelige Gottheit, das fliegende Spaghetti-Monster [18], auf seine Anhänger und die Landschaft der Linux-Distributionen als solche schauen. Das Linux für Pastafaris, einst von Linux Format halb im Scherz angekündigt [19], bleibt wohl weiterhin ein parmesanbe- streuter Wunsch. Bislang hat sich kein Abbildung 4: Nicht nur beim Booten verzichtet Devil­Linux auf eine grafische Oberfläche. siebtragender Entwickler oder Pirat ge- 09/2016 Titelthema funden, um die zentralen Glaubensin- halte auf einem Linux-Desktop zu ver- sammeln. Wäre das Ganze
Recommended publications
  • Upgrading Cfengine Nova a Cfengine Special Topics Handbook
    Upgrading CFEngine Nova A CFEngine Special Topics Handbook CFEngine AS This document describes how software updates work in CFEngine Nova. ¨ © Copyright c 2010- CFEngine AS 1 v i Table of Contents What does upgrading mean? ::::::::::::::::::::::::::::::::::::::::: 3 Why do I need to upgrade?::::::::::::::::::::::::::::::::::::::::::: 3 How does upgrading work? ::::::::::::::::::::::::::::::::::::::::::: 3 How can I do phased deployment? :::::::::::::::::::::::::::::::::::: 4 What if I have multiple operating system platforms? ::::::::::::::::::: 4 How do Nova policies update if I already have my own policy? ::::::::: 4 Appendix A Manual package upgrade commands ::::::: 5 3 What does upgrading mean? A software upgrade involves obtaining a new version of the CFEngine software from soft- ware.CFEngine.com and installing it in place of the old. When software is updated, the previous version of the software is retained. From version 1.1 of CFEngine Nova, CFEngine is fully capable of managing its own updates ¨ and service restarts with a minimum of manual work on the policy server. Existing users of version 1.0 will need to upgrade the software manually on the affected sys- tems, or use the existing CFEngine to assist in the manual process. Please contact CFEngine Professional Services for for assistance (see Appendix). © Why do I need to upgrade? Bug fixes and new features are included in new software releases. To gain access to these fixes, you need to upgrade the software. Changes to the standard Community Open Promise Body Library might make use of new features, so upgrading brings you access to these new methods. How does upgrading work? CFEngine packages its software in operating sytsem compatible package formats (RPM, PKG, MSI, etc).
    [Show full text]
  • Guida Per L'utente Delle Stampanti Laser Dell™ 2330D/Dn E 2350D/Dn
    Guida per l'utente delle stampanti laser Dell™ 2330d/dn e 2350d/dn Per ordinare inchiostro o materiali di consumo da Dell: 1. Fare doppio clic sull'icona sul desktop. 2. Visitare il sito Web Dell, oppure ordinare i materiali di consumo per la stampante Dell telefonicamente. www.dell.com/supplies Per ottenere un servizio ottimale, accertarsi di disporre dell'etichetta servizio della stampante Dell. Note, avvertenze e messaggi di attenzione NOTA: una NOTA identifica informazioni importanti che possono semplificare l'uso della stampante. AVVISO: un'AVVERTENZA può identificare potenziali danni all'hardware oppure perdita di dati e fornisce informazioni su come evitare il problema. ATTENZIONE: un messaggio di ATTENZIONE indica che le operazioni effettuate potrebbero provocare danni alle strutture, lesioni a persone o incidenti mortali. Le informazioni contenute in questo documento sono soggette a modifiche senza preavviso. © 2010 Dell Inc. Tutti i diritti riservati. È vietata qualsiasi forma di riproduzione del presente documento senza autorizzazione scritta da parte di Dell Inc. Marchi utilizzati in questo testo: Dell, il logo DELL e OpenManage sono marchi di Dell Inc. Microsoft e Windows sono marchi registrati di Microsoft Corporation negli Stati Uniti e/o in altri Paesi. Windows Vista è un marchio o un marchio registrato di Microsoft Corporation negli Stati Uniti e/o in altri Paesi. Linux è il marchio registrato di Linus Torvalds negli Stati Uniti e in altri Paesi. SuSE è un marchio di Novell, Inc. negli Stati Uniti e in altri Paesi. Red Hat è un marchio di Red Hat, Inc. Debian è un marchio registrato di Software in the Public Interest, Inc.
    [Show full text]
  • An Opinionated Guide to Technology Frontiers
    TECHNOLOGY RADARVOL. 21 An opinionated guide to technology frontiers thoughtworks.com/radar #TWTechRadar Rebecca Martin Fowler Bharani Erik Evan Parsons (CTO) (Chief Scientist) Subramaniam Dörnenburg Bottcher Fausto Hao Ian James Jonny CONTRIBUTORS de la Torre Xu Cartwright Lewis LeRoy The Technology Radar is prepared by the ThoughtWorks Technology Advisory Board — This edition of the ThoughtWorks Technology Radar is based on a meeting of the Technology Advisory Board in San Francisco in October 2019 Ketan Lakshminarasimhan Marco Mike Neal Padegaonkar Sudarshan Valtas Mason Ford Ni Rachel Scott Shangqi Zhamak Wang Laycock Shaw Liu Dehghani TECHNOLOGY RADAR | 2 © ThoughtWorks, Inc. All Rights Reserved. ABOUT RADAR AT THE RADAR A GLANCE ThoughtWorkers are passionate about ADOPT technology. We build it, research it, test it, 1 open source it, write about it, and constantly We feel strongly that the aim to improve it — for everyone. Our industry should be adopting mission is to champion software excellence these items. We use them and revolutionize IT. We create and share when appropriate on our the ThoughtWorks Technology Radar in projects. HOLD ASSESS support of that mission. The ThoughtWorks TRIAL Technology Advisory Board, a group of senior technology leaders at ThoughtWorks, 2 TRIAL ADOPT creates the Radar. They meet regularly to ADOPT Worth pursuing. It’s 108 discuss the global technology strategy for important to understand how 96 ThoughtWorks and the technology trends TRIAL to build up this capability. ASSESS 1 that significantly impact our industry. Enterprises can try this HOLD 2 technology on a project that The Radar captures the output of the 3 can handle the risk.
    [Show full text]
  • General Specs Copying Connectivity
    General Specs Part no. 27X0128 Packaged Size (mm - H x 24 x 178 x 191 mm W x D) Packaged Weight, kg 0.099 kg Copying Network Type IEEE 802.11 b/g/n Wireless SISO 1x1 Connectivity Network Type IEEE 802.11 b/g/n Wireless SISO 1x1 Connectors One USB port (Type B) for Configuration Network Protocol Support TCP/IP IPv6, TCP/IP IPv4, AppleTalk™, TCP, UDP Network Printing Methods LPR/LPD, Function may vary by printer or MFP., Direct IP (Port 9100), HTTP, Telnet, FTP, TFTP, Enhanced IP (Port 9400), ThinPrint .print integration, IPP 1.0, 1.1, 2.0 (Internet Printing Protocol) Network Management DHCP, APIPA (AutoIP), BOOTP, RARP, mDNS, IGMP, SLPv1, Bonjour, WINS, DDNS, SNMPv3, Function may Protocols vary by printer or MFP., SNMPv2c, Telnet, NTP, ICMP, DNS, ARP, HTTPs (SSL1 /TLS), Finger Network Security IPSec, SNMPv3, 802.1x Authentication: MD5, MSCHAPv2, LEAP, PEAP, TLS, TTLS Wireless Network WEP Encryption (64- and 128-bit key), 1x1 802.11i b/g/n 72Mbps, WPA2™ - Enterprise with Certificate Management, WPA2™ - Personal Supported Operating Systems Microsoft Windows Windows Server 2008 x64 running Terminal Services, Windows Server 2008 x64, Windows Server 2008 running Operating Systems Terminal Services, Windows 8.1, Windows Server 2008 R2 Supported running Terminal Services, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows 8 x64, Windows 7 x64, Windows Server 2012, Windows RT 8.1, Windows XP x64, Windows Server 2003 x64, Windows RT, Windows Server 2003, Windows Server 2012 R2, Windows XP, Windows Server 2003 x64 running
    [Show full text]
  • 24 Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage
    Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage YOUJIP WON and JOONTAEK OH, Hanyang University, Korea JAEMIN JUNG, Texas A&M University, USA GYEONGYEOL CHOI and SEONGBAE SON, Hanyang University, Korea JOOYOUNG HWANG and SANGYEUN CHO, Samsung Electronics, Korea This work is dedicated to eliminating the overhead required for guaranteeing the storage order in the modern IO stack. The existing block device adopts a prohibitively expensive approach in ensuring the storage order among write requests: interleaving the write requests with Transfer-and-Flush. For exploiting the cache bar- rier command for flash storage, we overhaul the IO scheduler, the dispatch module, and the filesystem sothat these layers are orchestrated to preserve the ordering condition imposed by the application with which the associated data blocks are made durable. The key ingredients of Barrier-Enabled IO stack are Epoch-based IO scheduling, Order-Preserving Dispatch,andDual-Mode Journaling. Barrier-enabled IO stack can control the storage order without Transfer-and-Flush overhead. We implement the barrier-enabled IO stack in server as well as in mobile platforms. SQLite performance increases by 270% and 75%, in server and in smartphone, respectively. In a server storage, BarrierFS brings as much as by 43× andby73× performance gain in MySQL and SQLite, respectively, against EXT4 via relaxing the durability of a transaction. CCS Concepts: • Software and its engineering → File systems management; Additional Key Words and Phrases: Filesystem, storage, block device, linux ACM Reference format: Youjip Won, Joontaek Oh, Jaemin Jung, Gyeongyeol Choi, Seongbae Son, Jooyoung Hwang, and Sangyeun Cho. 2018. Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage.
    [Show full text]
  • Tempus LX GPS Network Time Server
    "Smarter Timing Solutions" Tempus LX GPS Network Time Server User Manual Tempus LX GPS Network Time Server User Manual Preface Thank you for purchasing the Tempus LX Network Time Server. Our goal in developing this product is to bring precise, Universal Coordinated Time (UTC) into your network quickly, easily and reliably. Your new Tempus LX is fabricated using the highest quality materials and manufacturing processes available today, and will give you years of troublefree service. About EndRun Technologies EndRun Technologies is dedicated to the development and refinement of the technologies required to fulfill the demanding needs of the time and frequency community. Our innovative engineering staff, with decades of experience in the research and development of receiver technology for the Global Positioning System (GPS), has created our window-mount GPS antenna and extended hold-over oscillator-control algorithms. The instruments produced by EndRun Technologies have been selected as the timing reference for such rigorous applications as computer synchronization, research institutions, aerospace, network quality-of-service monitoring, satellite base stations, and calibration laboratories. EndRun Technologies is committed to fulfilling your precision timing needs by providing the most advanced, reliable and cost-effective time and frequency equipment available in the market today. Trademark Acknowledgements IBM-PC, Linux, NotePad, Timeserv, UNIX, Windows NT, WordStar are registered trademarks of the respective holders. Part No. USM3015-0000-000 Revision 18 February 2012 Copyright © EndRun Technologies 2005-2012 Tempus LX GPS User Manual About This Manual This manual will guide you through simple installation and set up procedures. Introduction – The Tempus LX, how it works, where to use it, its main features.
    [Show full text]
  • NOVA: a Log-Structured File System for Hybrid Volatile/Non
    NOVA: A Log-structured File System for Hybrid Volatile/Non-volatile Main Memories Jian Xu and Steven Swanson, University of California, San Diego https://www.usenix.org/conference/fast16/technical-sessions/presentation/xu This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST ’16). February 22–25, 2016 • Santa Clara, CA, USA ISBN 978-1-931971-28-7 Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX NOVA: A Log-structured File System for Hybrid Volatile/Non-volatile Main Memories Jian Xu Steven Swanson University of California, San Diego Abstract Hybrid DRAM/NVMM storage systems present a host of opportunities and challenges for system designers. These sys- Fast non-volatile memories (NVMs) will soon appear on tems need to minimize software overhead if they are to fully the processor memory bus alongside DRAM. The result- exploit NVMM’s high performance and efficiently support ing hybrid memory systems will provide software with sub- more flexible access patterns, and at the same time they must microsecond, high-bandwidth access to persistent data, but provide the strong consistency guarantees that applications managing, accessing, and maintaining consistency for data require and respect the limitations of emerging memories stored in NVM raises a host of challenges. Existing file sys- (e.g., limited program cycles). tems built for spinning or solid-state disks introduce software Conventional file systems are not suitable for hybrid mem- overheads that would obscure the performance that NVMs ory systems because they are built for the performance char- should provide, but proposed file systems for NVMs either in- acteristics of disks (spinning or solid state) and rely on disks’ cur similar overheads or fail to provide the strong consistency consistency guarantees (e.g., that sector updates are atomic) guarantees that applications require.
    [Show full text]
  • Technology Overview New Features Backupedge
    Technology Overview - BackupEDGE™ Introduction to the New Features in BackupEDGE 3.x Technology Overview BackupEDGE has a long history of providing reliable data protection for New Features many thousands of users. As operating systems, storage devices and BackupEDGE 3.x usage needs and tendencies have changed over the years, it has continuously met the challenge of providing inexpensive, stable backup and disaster recovery on a variety of UNIX and Linux platforms. Clients routinely find new and clever ways to utilize products. Storage devices have taken on new and exciting features, and incredible capacities. Products designed years ago had built-in limits that were thought to be beyond comprehension. Today, these limits are routinely exceeded. The need for data security is even more apparent. We’re constantly asking our To continue to meet the evolving needs of our clients, we are always clients what tools our asking what features of our products they find most useful, what products need to serve them improvements we can make, and what new requirements they have. better. We’ve used this knowledge to map out new product strategies designed to anticipate the needs of the next generation of users, systems and storage products. This has resulted in the creation of BackupEDGE 3.x, with a combination of internal improvements, new features and enhanced infrastructure designed to become the backbone of a new generation of storage software. Summary of Major Changes and Additions BackupEDGE 3.x features include: • Improvements to partition sizing, UEFI table cleanup after DR, and SharpDrive debugging (03.04.01 build 3). • Support for Rocky Linux 8.4 and AlmaLinux 8.4 (03.04.01 build 2).
    [Show full text]
  • Red Hat Enterprise Linux Openstack Platform on Inktank Ceph Enterprise
    Red Hat Enterprise Linux OpenStack Platform on Inktank Ceph Enterprise Cinder Volume Performance Performance Engineering Version 1.0 December 2014 100 East Davie Street Raleigh NC 27601 USA Phone: +1 919 754 4950 Fax: +1 919 800 3804 Linux is a registered trademark of Linus Torvalds. Red Hat, Red Hat Enterprise Linux and the Red Hat "Shadowman" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. Dell, the Dell logo and PowerEdge are trademarks of Dell, Inc. Intel, the Intel logo and Xeon are registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. © 2014 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). The information contained herein is subject to change without notice. Red Hat, Inc. shall not be liable for technical or editorial errors or omissions contained herein. Distribution of modified versions of this document is prohibited without the explicit permission of Red Hat Inc. Distribution of this work or derivative of this work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from Red Hat Inc. The GPG fingerprint of the [email protected] key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E www.redhat.com 2 Performance Engineering Table of Contents 1 Executive Summary ........................................................................................
    [Show full text]
  • Governmental Control of Digital Media Distribution in North Korea: Surveillance and Censorship on Modern Consumer Devices
    Governmental Control of Digital Media Distribution in North Korea: Surveillance and Censorship on Modern Consumer Devices Niklaus Schiess ERNW GmbH Abstract pressive regimes like China [14], Iran [7] or Turkey [6] are using national telecommunication networks as an in- Modern devices like PCs and tablet PCs enable users strument to interfere with information flows within their to consume a wide range of media like videos, audio country and even across borders [13]. In the case of and documents. Introducing such devices in repressive North Korea, which is considered one of the most repres- regimes like North Korea [10] (officially Democratic sive states [11], where typical users only get access to a People’s Republic of Korea, DPRK) contradicts the ob- nationwide intranet that is entirely controlled by the gov- jective of controlling and suppressing information within ernment. Full Internet access, without any governmental the country and particularly information imported from regulations and restrictions of the consumable content, is the outside world. This can be generalized as any in- only possible for a chosen few [12]. formation that has not been reviewed and approved by the government. This paper is an effort to evaluate the technical challenges that arise while enabling users to 1.1 Motivation consume or create potentially unwanted media and an- Although network-level control over media distribution alyzes two media-controlling mechanisms developed by can be effective even on a nationwide scale, the effec- North Korean government organizations. The analysis tiveness is limited in a technical less advanced environ- covers implementations found in Red Star OS, a Linux- ment like North Korea today [11].
    [Show full text]
  • Introduction to Linux
    Presentation to U3A - Linux Introduction 8 June 2019 – Terry Schuster - [email protected] What is Linux? https://en.wikipedia.org/wiki/Linux https://www.iotforall.com/linux-operating-system-iot-devices/ In simple terms, Linux is an operating system which was developed to be a home-built version of UNIX, one of the first operating systems which could be run on different brands of mainframe computers with quite different types of hardware. Linux has developed to the extent that it is the leading operating system on servers and other big iron systems such as mainframe computers, and the only OS used on TOP500 supercomputers (since November 2017, having gradually eliminated all competitors). It is used by around 2.3 percent of desktop computers. The Chromebook, which runs the Linux kernel-based Chrome OS, dominates the US K–12 education market. In the mid 2000’s, Linux was quickly seen as a good building block for smartphones, as it provided an out- of-the-box modern, full-featured Operating System with very good device driver support, and that was considered both scalable for the new generation of devices and had the added benefit of being royalty free. It is now becoming very common in IoT devices, such as smart watches/refrigerators, home controllers, etc. etc. BTW, Tux is a penguin character and the official brand character of the Linux kernel. Originally created as an entry to a Linux logo competition, Tux is the most commonly used icon for Linux, although different Linux distributions depict Tux in various styles. The character is used in many other Linux programs and as a general symbol of Linux.
    [Show full text]
  • Introduction to Fmxlinux Delphi's Firemonkey For
    Introduction to FmxLinux Delphi’s FireMonkey for Linux Solution Jim McKeeth Embarcadero Technologies [email protected] Chief Developer Advocate & Engineer For quality purposes, all lines except the presenter are muted IT’S OK TO ASK QUESTIONS! Use the Q&A Panel on the Right This webinar is being recorded for future playback. Recordings will be available on Embarcadero’s YouTube channel Your Presenter: Jim McKeeth Embarcadero Technologies [email protected] | @JimMcKeeth Chief Developer Advocate & Engineer Agenda • Overview • Installation • Supported platforms • PAServer • SDK & Packages • Usage • UI Elements • Samples • Database Access FireDAC • Migrating from Windows VCL • midaconverter.com • 3rd Party Support • Broadway Web Why FMX on Linux? • Education - Save money on Windows licenses • Kiosk or Point of Sale - Single purpose computers with locked down user interfaces • Security - Linux offers more security options • IoT & Industrial Automation - Add user interfaces for integrated systems • Federal Government - Many govt systems require Linux support • Choice - Now you can, so might as well! Delphi for Linux History • 1999 Kylix: aka Delphi for Linux, introduced • It was a port of the IDE to Linux • Linux x86 32-bit compiler • Used the Trolltech QT widget library • 2002 Kylix 3 was the last update to Kylix • 2017 Delphi 10.2 “Tokyo” introduced Delphi for x86 64-bit Linux • IDE runs on Windows, cross compiles to Linux via the PAServer • Designed for server side development - no desktop widget GUI library • 2017 Eugene
    [Show full text]