Language Selection

English French German Italian Portuguese Spanish

How Unity, Compiz, GNOME Shell & KWin Affect Performance

Filed under
Hardware
Software

Those that follow my Twitter feed know that over the weekend I began running some benchmarks of the various open-source and closed-source graphics drivers. But it was not like the usual Phoronix benchmarks simply comparing the driver performance. Instead it was to see how each driver performed under the various desktops / window managers now being used by modern Linux installations. In this article are the first results of this testing of Unity with Compiz, the classic GNOME desktop with Metacity, the classic GNOME desktop with Compiz, the GNOME Shell with Mutter, and the KDE desktop with KWin. These configurations were tested with both the open and closed-source NVIDIA and ATI/AMD Linux drivers.

While the original plans were grand, various Linux graphics driver bugs were hit along the way. For example, on Git master of Mesa and with the latest Linux kernel DRM from Linux 3.0/2.6.40 (it's likely a Mesa bug though), Compiz as found in the Natty repository is broken.

rest here




More in Tux Machines

Leftovers: OSS

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux