Language Selection

English French German Italian Portuguese Spanish

Canonical/Ubuntu: NGD Systems SSD, LXD, Launchpad and Ubuntu Studio News

Filed under
  • Computational storage takes spotlight in new NGD Systems SSD

    Like traditional SSDs, computational storage devices contain NAND flash memory chips, a controller to manage data writes and RAM to buffer reads and writes. But the new Newport In-Situ Computational Storage (ICS) 8100 SSD embeds a quad-core ARM processor into NGD's custom-built 14-nanometer (nm) application-specific integrated circuit (ASIC) to run Ubuntu Linux and enable functions such as indexing and searching data within the device.

  • LXD 3.11 releases with configurable snapshot expiry, progress reporting, and more

    The LXD team released version 3.11 of LXD, its open source container management extension for Linux Containers (LXC), earlier this week. LXD 3.11 explores new features, minor improvements, and bugfixes.

  • Launchpad News: Launchpad news, February 2019

    Here’s a brief changelog for this month.

  • Ubuntu Studio: Statement to the Community

    Basically, in order for Ubuntu Studio to remain an official flavor, we must have at least one team member with package upload permissions. Right now, out of the three active developers (Myself, Len Ovens, Ross Gammon), we have no upload permissions. As such, since before the release of 16.04 back in April 2016, the team had been going to other members of the Ubuntu community known as Masters of the Universe (MOTUs). Those are a select few active developers that have unlimited upload access to the Universe repository of Ubuntu, which contains applications and components not found in the Main repository, such as the core components of Ubuntu Studio.

  • Ubuntu Studio Runs Into Troubles With None Of Their Developers Having Upload Rights

    The 19.04 release of Ubuntu Studio, the Ubuntu flavor focused on multimedia production / content creation, might not happen unless at least one of their developers are granted package upload rights. 

    Since Ubuntu 17.04, none of the remaining Ubuntu Studio developers have had package upload rights themselves to land their changes and thus have relied upon other Ubuntu developers for getting their tool updates and other changes landed.

More in Tux Machines

Linux File Manager: Top 20 Reviewed for Linux Users

A file manager is the most used software in any digital platform. With the help of this software, you can access, manage, and decorate the files on your device. For the Linux system, this is also an important factor to have an effective and simple file manager. In this curated article, we are going to discuss a set of best Linux file manager tools which definitely help you to operate the system effectively. Read more

Latte Dock, first beta for v0.9 (v0.8.97)

I know you waited for this so long but believe me there were really good reasons. Check out the past articles concerning Latte git version and you can get a picture what major new features are introduced for v0.9. Of course this is an article for a beta release and as such I will not provide any fancy videos or screenshots; this is a goal for official stable release article. Read more Also: Latte Dock 0.9 Beta Brings Wayland Improvements, Smoother Experience

Games: Evan's Remains, Path of Titans, GIGABUSTER, SpriteStack

Shrinking Linux Attack Surfaces

Often, a kernel developer will try to reduce the size of an attack surface against Linux, even if it can't be closed entirely. It's generally a toss-up whether such a patch makes it into the kernel. Linus Torvalds always prefers security patches that really close a hole, rather than just give attackers a slightly harder time of it. Matthew Garrett recognized that userspace applications might have secret data that might be sitting in RAM at any given time, and that those applications might want to wipe that data clean so no one could look at it. There were various ways to do this already in the kernel, as Matthew pointed out. An application could use mlock() to prevent its memory contents from being pushed into swap, where it might be read more easily by attackers. An application also could use atexit() to cause its memory to be thoroughly overwritten when the application exited, thus leaving no secret data in the general pool of available RAM. The problem, Matthew pointed out, came if an attacker was able to reboot the system at a critical moment—say, before the user's data could be safely overwritten. If attackers then booted into a different OS, they might be able to examine the data still stored in RAM, left over from the previously running Linux system. As Matthew also noted, the existing way to prevent even that was to tell the UEFI firmware to wipe system memory before booting to another OS, but this would dramatically increase the amount of time it took to reboot. And if the good guys had won out over the attackers, forcing them to wait a long time for a reboot could be considered a denial of service attack—or at least downright annoying. Read more