Language Selection

English French German Italian Portuguese Spanish

Give Fedora Silverblue a test drive

Filed under
Red Hat

Fedora Silverblue is a new variant of Fedora Workstation with rpm-ostree at its core to provide fully atomic upgrades. Furthermore, Fedora Silverblue is immutable and upgrades as a whole, providing easy rollbacks from updates if something goes wrong. Fedora Silverblue is great for developers using Fedora with good support for container-focused workflows.

Additionally, Fedora Silverblue delivers desktop applications as Flatpaks. This provides better isolation / sandboxing of applications, and streamlines updating applications — Flatpaks can be safely updated without reboot.

The Fedora Workstation team is running a Test Day for Silverblue next week, so if you want to try it out, and help out the development effort at the same time, keep reading.

Read more

More in Tux Machines

IBM and Red Hat Leftovers

  • Big Blue’s Red Hat Brings A Big Change Of Heart

    Perhaps, many years hence, we will call the company that, more than any other, created the enterprise computing environment Big Purple now that it has acquired the company that made open source software in the enterprise safe, sane, and affordable. Twenty years ago next month, Red Hat went public and everything about enterprise software changed. A company with some tens of millions of dollars in revenues, providing subscription support for a commercial Linux distribution for systems within a few months had a ridiculous market capitalization in excess of $20 billion and the mad dash for open source projects to be commercialized was on. Fast forward two decades, and Red Hat is the touchstone for how to work with upstream open source software projects related to datacenter infrastructure and to bring them downstream to harden them to be enterprise grade, package them up, and then sell support for them. Red Hat is by far and away the most successful provider of commercial support for open source code, and has moved well beyond its foundational Enterprise Linux distribution, mostly through key acquisitions including the companies behind the GNU compilers, JBoss application server, the KVM hypervisor, the Gluster parallel file system, the Ceph object storage, the innovative CoreOS Linux distribution, and the Ansible software provisioning tools as well as the OpenShift container controller (a mix of in-house and Kubernetes code these days), the OpenStack cloud controller, and the CloudForms hybrid cloud management system (also largely done in-house). Red Hat, we think, still needs to have a heavy duty open source database management system distribution – perhaps several different ones with different architectural tenets – but it was also perhaps prescient in that it stayed out of the Hadoop storage and data analytics racket, which has not panned out as planned.

  • Splunk Connect for OpenShift: All About Objects

    This is the second post of our blog series on Red Hat OpenShift and Splunk Integration. In the first post, we showed how to send application and system logs to Splunk. The second part is focused on how to use Splunk Kubernetes Objects.

  • Command Line Heroes season 3 episode 2: Learning the BASICs

    Command Line Heroes explores how beginner languages bring people into the world of programming. BASIC lowered the barrier to entry. Now, the next generation is getting their start modifying games, like Minecraft. Listen to the episode.

  • Introducing Red Hat Smart Management for Red Hat Enterprise Linux

    How do you want to manage your systems? That probably depends a lot on the type of environment you have -- whether your systems are primarily on-prem, or if they reside in the cloud. Or a mixture of both. Either way, Red Hat is looking to meet you where you're at and provide management tools to suit your needs with Red Hat Smart Management. We introduced Red Hat Smart Management at Red Hat Summit earlier this year in Boston as a layered add on for Red Hat Enterprise Linux (RHEL), as well as including Red Hat Insights with RHEL subscriptions.

Librem One Design Principles: Services You Can Trust

Our hardware and software puts users back in control of computing–but, you may be wondering, can we do the same with our services? With Librem One, the answer is yes. We have big, no, huge dreams about what we can achieve with your support and the wealth of free software that already exists. But we need to keep our feet firmly on the ground. In this post we will outline the touchstones we have used to do just that–engineer trustworthy services that everyone can use–with a design process called user-centered software engineering. We hope it will facilitate communication with friends and colleagues as we hack towards a common goal… and also show all non-technical readers that human beings are at the center of our bits and bytes. So, how did we do it? Read more Also: joining social media at DebConf19

Programming Leftovers: Python, Go, LLVM and More

  • Python List Sorting with sorted() and sort()

    In this article, we'll examine multiple ways to sort lists in Python. Python ships with two built-in methods for sorting lists and other iterable objects. The method chosen for a particular use-case often depends on whether we want to sort a list in-place or return a new version of the sorted list.

  • ExpressPython: Lightweight, portable Python editor for small scripts

    There are many IDEs for Python, and it’s time for one more. ExpressPython is a lightweight, small code editor for Python 3. Originally built to help teach students how to code, it can be used in programming competitions, or just when you need a fast, small, clean code editor. There are a wide variety of Python IDEs and code editors available for programmers. Between PyCharm, VS Code, IDLE, Spyder, just to name a few, programmers have many to choose from depending on their needs and preferences. Add one more editor to the fray. ExpressPython is a small, lightweight Python 3 editor that can help with learning and competitive programming, such as coding challenges. Its creator started work on it in 2014 in order to fulfill a few needs, such as the ability to work offline. It is not made with the intent of becoming a fully-featured IDE, and does not include debugging features. However, it does have a few noteworthy features, so let’s take a look.

  • Google's Go team decides not to give it a try

    The Go language will not be adding a "try" keyword in the next major version, despite this being a major part of what was proposed for version 1.14. Go, an open source language developed by Google, features static typing and native code compilation. It is around the 15th most popular language according to the Redmonk rankings. Error handling in Go is currently based on using if statements to compare a returned error value to nil. If it is nil, no error occurred. This requires developers to write a lot of if statements. "In general Go programs have too much code-checking errors and not enough code handling them," wrote Google principal engineer Russ Cox in an overview of the error-handling problem in Go.

  • LLVM 9.0 Feature Work Is Over While LLVM 10.0 Enters Development

    Feature work is over on LLVM 9.0 as the next release for this widely-used compiler stack ranging from the AMDGPU shader compiler back-end to the many CPU targets and other innovative use-cases for this open-source compiler infrastructure. Ongoing LLVM release manager Hans Wennborg branched the LLVM 9.0 code-base this morning while in turn opening LLVM 10.0 development on trunk/master. This also marks the 9.0 branching for all LLVM sub-projects.

  • Mu at EuroPython

    Mu made a number of appearances at last week’s wonderful EuroPython 2019 conference in Basel, Switzerland.

  • PyCharm 2019.2 Release Candidate

    PyCharm 2019.2 is almost ready to be released, and we’re happy to announce that a release candidate is available for download now.

Security: EvilGnome Scaremongering, Intel Defects, New Patches and the "Desktop Security Nightmare"

  • EvilGnome Is A Linux Spyware That Records Audio And Steals Your Files [Ed: FOSSBytes has moved on from pushing non-FOSS misinformation to actually doing anti-FOSS FUD. Painting malware one needs to actually install as a real threat.]
  • CPU vulnerability mitigations keeping Linux devs busy: SUSE's Pavlík [Ed: Intel defects now waste software developers' time. They should just replace/recall those billions of defective chips]

    A veteran Linux kernel developer at Germany-based SUSE says the one thing that keeps him and his team busy these days is CPU vulnerability mitigations...

  • Security updates for Friday

    Security updates have been issued by Debian (bzip2), Fedora (freetds, kernel, kernel-headers, and knot-resolver), openSUSE (bubblewrap, fence-agents, kernel, libqb, libu2f-host, pam_u2f, and tomcat), Oracle (vim), SUSE (kernel, LibreOffice, libxml2, and tomcat), and Ubuntu (libmspack and squid, squid3).

  • The Desktop Security Nightmare

    Many of us have extremely sensitive data on our systems. Emails to family, medical or bank records, Bitcoin wallets, browsing history, the list goes on. Although we have isolation between our user account and root, we have no isolation between applications that run as our user account. We still, in effect, have to be careful about what attachments we open in email. Only now it’s worse. You might “npm install hello-world”, and audit hello-world itself, but get some totally malicious code as well. How many times do we see instructions to gem install this, pip install that, go get the other, and even curl | sh? Nowadays our risky click isn’t an email attachment. It’s hosted on Github with a README.md. Not only that, but my /usr/bin has over 4000 binaries. Have every one been carefully audited? Certainly not, and this is from a distro with some of the highest quality control around. What about the PPAs that people add? The debs or rpms that are installed from the Internet? Are you sure that the postinst scripts — which run as root — aren’t doing anything malicious when you install Oracle Virtualbox? [...] One thing a person could do would be to keep the sensitive data on a separate, ideally encrypted, filesystem. (Maybe even a fuse one such as gocryptfs.) Then, at least, it could be unavailable for most of the time the system is on. Of course, the downside here is that it’s still going to be available to everything when it is mounted, and there’s the hassle of mounting, remembering to unmount, password typing, etc. Not exactly transparent. I wondered if mount namespaces might be an answer here. A filesystem could be mounted but left pretty much unavailable to processes unless a proper mount namespace is joined. Indeed that might be a solution. It is somewhat complicated, though, since nsenter requires root to work. Enter sudo, and dropping privileges back to a particular user — a not particularly ideal situation, and complex as well. Still, it might well have some promise for some of these things.