Language Selection

English French German Italian Portuguese Spanish

Google SketchUp in Linux - A reality

Filed under
HowTos

Google SketchUp is one of my favorite applications. It's a free 3D software that I use to create my fabulous 3D models. It works well and lets my imagination and fingers do their magic. It's an excellent therapy for mind and soul. There's only one problem, so to speak. It has been designed to work on Windows and Mac only, with no Linux version in the offing.

All in all, it's not a tragedy, since I believe in using any software and/or operating system that meets the requirements. If you need to draw a bit, you power Windows and do what needs to be done. But some people may not have the privilege to make the cross-platform choice. For them, Google SketchUp is on the wish-list. Or is it?

Well, it turns out you can have Google SketchUp in Linux. It requires Wine.




not really

"I've listed Google SketchUp in my recent Windows cool apps mega-compilation. But now, I guess it can also be added to the Linux list as well"

It's not a Linux app. If you have to run it in Wine, it's still only a Windows app.

I am not a huge fan of running apps in Wine only because I think it gives people an excuse to not port or develop these types of apps native to Linux. It will be the crutch of developers to say "you can always run it in wine." and thus they are supporting Windows while getting off easy on being usable in Linux as a side effect.

It's attitudes like this that say "hey, you can get good enough usage of this app in Linux, it doesn't matter because Linux is only a second tier OS anyway."

Linux and the Open Source environment are the environments that are here because there are people who believe in putting their best work out there regardless of whether there is huge profit for it or not. They do it because they believe it.

It's about pride in doing something right, making it be the best it can be simply for the sake of doing your best.

Wine is always going to be just an excuse to not do one's best.

(I should point out that this is not the fault or intention of the developers of Wine. They want a way to be productive in Linux when proprietary developers, in bed with Microsoft, refuse to make their apps for equally proprietary products available to other platforms. It's others who look at Wine and say that they can be lazy and limit the scope of the software to only Windows.)

Big Bear

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security News

  • Reproducible Builds: week 90 in Stretch cycle
    The F-Droid Verification Server has been launched. It rebuilds apps from source that were built by f-droid.org and checks that the results match.
  • 6 Week Progress Update for PGP Clean Room
    One of the PGP Clean Room’s aims is to provide users with the option to easily initialize one or more smartcards with personal info and pins, and subsequently transfer keys to the smartcard(s). The advantage of using smartcards is that users don’t have to expose their keys to their laptop for daily certification, signing, encryption or authentication purposes.
  • New Kali Linux Professional Information Security Certification to debut at Black Hat USA, 2017
    First Official Kali Linux book release will coincide with launch of the new information security training program as the Penetration Testing platform celebrates its 10th anniversary.
  • The flatpak security model – part 1: The basics
    This is the first part of a series talking about the approach flatpak takes to security and sandboxing. First of all, a lot of people think of container technology like docker, rkt or systemd-nspawn when they think of linux sandboxing. However, flatpak is fundamentally different to these in that it is unprivileged.
  • Newly discovered Mac malware found in the wild also works well on Linux [Ed: Only if fools are stupid enough to actually INSTALL malware.]
    The malware, which a recent Mac OS update released by Apple is detecting as Fruitfly, contains code that captures screenshots and webcam images, collects information about each device connected to the same network as the infected Mac, and can then connect to those devices, according to a blog post published by anti-malware provider Malwarebytes. It was discovered only this month, despite being painfully easy to detect and despite indications that it may have been circulating since the release of the Yosemite release of OS X in October 2014. It's still unclear how machines get infected. [...] Another intriguing finding: with the exception of Mac-formatted Mach object file binary, the entire Fruitfly malware library runs just fine on Linux computers.

Solus Goes Flatpak for Better, Reliable Distribution of Third-Party Applications

In an unexpected turn of events, Ikey Doherty, the founder and lead developer of the Solus Project announced a few moments ago that he's adopting the well-known Flatpak application sandboxing and distribution framework for the Solus operating system. Read more

Latest LibreELEC 8.0 Beta Updates Linux Kernel Support Patches for Raspberry Pi

A new development release of the LibreELEC open-source operating system for Raspberry Pi and similar embedded devices has been unveiled recently, versioned 7.95.1 Beta. LibreELEC lets you transform a Raspberry Pi into a HTPC. Read more

Why Linux Installers Need to Add Security Features

Twelve years ago, Linux distributions were struggling to make installation simple. Led by Ubuntu and Fedora, they long ago achieved that goal. Now, with the growing concerns over security, they need to reverse directions slightly, and make basic security options prominently available in their installers rather than options that users can add manually later. At the best of times, of course, convincing users to come anywhere near security features is difficult. Too many users are reluctant even to add features as simple as unprivileged user accounts or passwords, apparently preferring the convenience of the moment to reducing the risk of an intrusion that will require reinstallation, or a consultation with a computer expert at eighty dollars an hour. Read more