Language Selection

English French German Italian Portuguese Spanish

Putting Dell's Ubuntu Ultrabook to the test

Filed under
Hardware
Ubuntu

Our very first keypress after turning on the Dell XPS 13 Developer Edition (running Ubuntu 12.04) drew no response from the Unity desktop. And with that we thought our test of Dell's Ubuntu Ultrabook for developers was set to go the way of most Linux laptop tests – Linux kind of works, but not really.

But further testing turned up no serious problems, with Ubuntu ultimately running very nicely on the XPS 13. All of the function keys on the laptop, which has been on sale in Europe since the start of March, worked and the keyboard backlighting could be turned on and off. It wasn't possible to scroll window content up and down by gliding a finger along the right hand edge of the touchpad: scrolling required two fingers, in keeping with what is now the default Windows setting. Windows can be moved and resized using three-finger gestures. All this is made possible by a driver that will be included in the 3.9 kernel due for release in late April.

rest here




More in Tux Machines

Leftovers: OSS

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux