Language Selection

English French German Italian Portuguese Spanish

Making the ultimate creative content OS from bits of Windows, Mac, and Linux

Filed under
OS

The recent unveiling of the Mac Pro has divided a lot of professional users who hoped Apple wouldn't fix what wasn't broken. Phil Schiller's words from the announcement—"can't innovate anymore, my ass"—made it clear that Apple used the venerable workstation as a Guinea pig to prove that it can still get its machined-aluminum groove on. Sure, the design and engineering of the Darth Pro are brilliant, but as I pointed out in my critical look, the Mac Pro needed shrinking as urgently as I need a Hermès man-purse. Whether it will pay off remains to be seen, but some people who want more flexible hardware options aren't convinced. I know one video editor who's already abandoned OS X for Windows because their work depends more on GPU power with apps like DaVinci Resolve. A big box with multiple PCI Express slots is more important to them than added desk space.

As it stands, I've come away with the impression that there is a lot of room for improvement in dealing with creative content in today's OSes. So in effect, this is a guide on how to create the ultimate OS for creatives by taking what OS X, Windows, and Linux do right—and wrong—for serious creative professional work. The end result should be a guide on how to make ÜberCreate OS 1.0.

OK, so what does “creative” mean?

I'm not here to debate that coders or accountants aren't creative people too. But in this context, "creative" users are professional content creators—photographers, video editors, compositors, Web designers, architects, graphic designers, art directors, 3D animators, audio engineers, etc.

rest here




More in Tux Machines

Linux command history: Choosing what to remember and how

Linux history – the record of commands that you’ve used on the command line – can simplify repeating commands and provide some very useful information when you’re trying to track down how recent system or account changes might have come about. Two things you need to understand before you begin your sleuthing, however, are that the shell’s command memory can be selective and that dates and times for when commands were run are optional. Read more

Security: Voting Machines With Windows and Back Doors in Windows Help Crypto-jacking

  • Election Security a High Priority — Until It Comes to Paying for New Voting Machines [Ed: Sadly, the US has outsourced its voting machines to a private company whose systems are managed by Microsoft]
    When poll workers arrived at 6 a.m. to open the voting location in Allentown, New Jersey, for last November’s gubernatorial election, they found that none of the borough’s four voting machines were working. Their replacements, which were delivered about four hours later, also failed. Voters had to cast their ballots on paper, which then were counted by hand. Machine malfunctions are a regular feature of American elections. Even as worries over cybersecurity and election interference loom, many local jurisdictions depend on aging voting equipment based on frequently obsolete and sometimes insecure technology. And the counties and states that fund elections have dragged their heels on providing the money to buy new equipment.
  • Congress Can Act Right Now to Prevent Interference in the 2018 Elections [Ed: "confidence" is not security]

    To create that confidence the SAFE Act would: [...]

  • America’s Election Meddling Would Indeed Justify Other Countries Retaliating In Kind
    There is still no clear proof that the Russian government interfered with the 2016 U.S. election in any meaningful way. Which is weird, because Russia and every other country on earth would be perfectly justified in doing so.
  • NSA Exploit Now Powering Cryptocurrency Mining Malware [Ed: Microsoft Windows back door]
    You may have been asked if you'd like to try your hand at mining cryptocurrency. You may have demurred, citing the shortage in graphics cards or perhaps wary you were being coaxed into an elaborate Ponzi scheme. So much for opting out. Thanks to the NSA, you may be involved in mining cryptocurrency, but you're likely not seeing any of the benefits.
  • Cryptocurrency-mining criminals that netted $3 million gear up for more
    Separately, researchers from security firm FireEye said attackers, presumably with no relation to the one reported by Check Point, are exploiting unpatched systems running Oracle's WebLogic Server to install cryptocurrency-mining malware. Oracle patched the vulnerability, indexed as CVE-2017-10271, in October.

today's howtos

More Android Leftovers