Language Selection

English French German Italian Portuguese Spanish

Amazon.com Includes Linux Users in new Movie Streaming Service

Filed under
Linux
Web

Linux users have long searched for a way to legally watch premium movies on their computers with little luck. Netflix, Cinemanow, (and the now bankrupt Blockbuster) strictly forbid anything other than Windows or Mac systems. Even local video rentals or delivery services require the use of software that isn't legal in the US. Well, Amazon.com has come to the rescue by allowing the streaming of recent premium movies to Linux machines.

The Amazon Instant Video store doesn't have quite the selection of Netflix just yet, but does it matter what Netflix has since they exclude the small portion of Linux users? Amazon carries thousands of movies and television shows for their Prime service subscription rate of $79.00 per year or on a per-view basis.

rest here




More in Tux Machines

Intel Compute Stick with Ubuntu Goes on Sale, Lower Specs than Windows Version

The Ubuntu 14.04 LTS flavored Intel Compute Stick is finally going on sale next week, and it joins the Windows version that was already made available a while back. Read more

Ubuntu MATE Project Donates Money to Geany, Transmission, and MATE Devs

The Ubuntu MATE team makes monthly donations to other projects that are being used by this distribution and this month's targets are Geany and Transmission, along with a couple of MATE developers. Read more

Ubuntu MATE hardware partnership with LibreTrend

Ubuntu MATE is an official flavour of Ubuntu focussed on usability and stability, which has gained massive traction in the Linux community over recent months. Inspired by the traditional GNOME 2 interface of classic Ubuntu releases, Ubuntu MATE is the perfect distribution for easing the transition between Microsoft Windows or Mac OS and Linux. Read more

Can Data Infrastructure Vendors Stop Hackers?

The ecosystem is based on Security-Enhanced Linux (SELinux), but it adds role-based access control with a policy for each role, so no one can get to the system root and the root can’t see user data. All access is logged, so any attempts to penetrate the system can be traced. Policies are based on roles such as security admin, audit admin and sysadmin, and each file is tagged with a security level so some users can see it while others can’t. Read more