Language Selection

English French German Italian Portuguese Spanish

Ubuntu User On Fedora 12: Using It And Liking It

Filed under
Linux

I have been a full time Ubuntu user since 2006. Before that I tried to like it, but couldn’t. I moved to it out of necessity when MEPIS began to play around with it core, switching from Debian to Ubuntu and back in six months. It was a fun ride, but it was not what I was interested in. Ubuntu was my only viable choice. It took time for it to grow on me. In a sense we have grown together.

When the Ubuntu 9.10 alpha came out I installed it on a separate partition while using Ubuntu 9.04 on another partition as my main OS. I am active on several help forums, problem solving mostly Ubuntu and Kubuntu problems. I run Ubuntu from alpha to final. I report bugs and watch it grow into maturity with pride. I spread the word and help others with problems. I have been a faithful user in every sense of the word.

I am at the same time a Fedora resister. I began with Mandrake and lived in RPM hell for two years. Yes, RPM has matured, but I have a well established hatred of that package management system. I tried Fedora’s first few releases, but they left me cold. I have tried each release of Fedora since, but it has continued to rub me the wrong way.

Until recently.




Ubuntu and Fedora

Fedora is a point-and-click desktop, next-next installer distribution and that is what it aims to be. It is actually easier to administer than Ubuntu, it has more graphical administration tools, the video driver never fails to build upon kernel update and rpm is more streamlined than apt/dpkg these days. In Ubuntu even enabling and disabling services requires command line voodoo.

I'm currently using both Ubuntu and Fedora, the former on my laptop and the latter on the family desktop, and I have yet to decide which one I like better, they are probably pretty much equivalent, so much so that I have no motivation to format either one to switch. Canonical vs. Red Hat I'm too old to care, they are both active contributors to the open source community, each one in their own way.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Android Leftovers

Tidelift Backed by Former Red Hat Chairman and CEO Matthew Szulik

  • Open source startup Tidelift snags $15 mln Series A
    Boston-based Tidelift, an open source startup, has secured $15 million in Series A funding. General Catalyst, Foundry Group and former Red Hat Chairman and CEO Matthew Szulik led the round. In conjunction with the funding, Larry Bohn, managing director at General Catalyst, Ryan McIntyre, co-founder and managing director at Foundry Group and Szulik have all joined Tidelift’s board of directors.
  • Tidelift raises $15M to find paying gigs for open-source developers maintaining key projects
    Tidelift wants to give open-source developers a way to earn some money for contributing to important open-source projects and while helping the companies that are using those projects in key parts of their business, and it just raised $15 million to build those connections. General Catalyst, Foundry Group, and former Red Hat CEO Matthew Szulik co-led the Series A founding round into the Boston-based startup, the first time the 17-person company has taken financing, said Donald Fischer, co-founder and CEO of Tidelift. The other co-founders — Havoc Pennington, Jeremy Katz, and Luis Villa — share a wealth of open-source experience across companies like Red Hat and organizations like The Wikimedia Foundation and the Mozilla Foundation.
  • Tidelift Raises $15M Series A To Make Open Source Work Better--For Everyone

today's howto

Linux and CPU Security

  • 22 essential security commands for Linux
    There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems.
  • CVE-2018-3639: Spectre Variant 4 Vulnerability Affects the Linux Kernel
    A Spectre variant 4 vulnerability has been identified in the Linux kernel and represents a very dangerous threat to all affected machines. All system administrators are urged to apply the latest updates as soon as possible to mitigate any possible impact.
  • Spectre Number 4, STEP RIGHT UP!
    In the continuing saga of Meltdown and Spectre (tl;dr: G4/7400, G3 and likely earlier 60x PowerPCs don't seem vulnerable at all; G4/7450 and G5 are so far affected by Spectre while Meltdown has not been confirmed, but IBM documentation implies "big" POWER4 and up are vulnerable to both) is now Spectre variant 4. In this variant, the fundamental issue of getting the CPU to speculatively execute code it mistakenly predicts will be executed and observing the effects on cache timing is still present, but here the trick has to do with executing a downstream memory load operation speculatively before other store operations that the load does not depend on. If the CPU is convinced to speculatively execute down this victim path incorrectly, it will revert the stores and the register load when the mispredict is discovered, but the loaded address will remain in the L1 cache and be observable through means similar to those in other Spectre-type attacks.