Language Selection

English French German Italian Portuguese Spanish

New SUSE/Moblin Linux netbook from MSI arrives

What do you get when you mix Novell's SLED (SUSE Linux Enterprise Desktop) 11 with the Linux Foundation's Moblin 2.1 netbook desktop? A lightweight Linux desktop that's trying to snag the netbook desktop market before Google's Chrome OS runs away with it later this year.

How well will Novell do at this? Well, after working with the Linux Foundation and Intel on combining the Moblin and SUSE Linux, we're about to find out. Today, on January 7th, at the CES (Consumer Electronics Association), we'll find out. MSI is releasing the first shipping of SUSE Moblin on its MSI U135 netbook.

According to Guy Lunardi, Novell's director of client preloads, the mix and match of SUSE/Moblin's core package is built on top of the Moblin 2.1's 2.6.31 Linux kernel. Above that, most of the software is from SLED 11. Instead of KDE 4.3, though, for the interface, it uses the Moblin Web-oriented interface. So, for example, to use Firefox for your Web browser, you'll get to it via the Moblin toolbar.

rest here




It's not Ubuntu!

Horray!

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News