In conjunction with its Project Skybridge and K2 announcement, AMD said that today it “demonstrated for the first time its 64-bit ARM-based AMD Opteron A-Series processor, codenamed ‘Seattle,’ running a Linux environment derived from the Fedora Project.” The Fedora-based Linux environment is said to enable development — and migration between — applications based on both x86- and ARM-based processors using common tools.
David has now posted working patches for his DP MST code on the DRI-devel mailing list. Right now his code has just been tested on a Lenovo Ultrabook boasting Intel "Haswell" graphics and it's working when connected to external hubs. There's still code that's a work in progress but overall it seems to be working fine. Right now this initial "preview code" works for Intel Haswell hardware with certain DP MST hubs.
A few links have been sent in to our news tip box with this page, which reads, "Open Source Mali-200/300/400/450 GPU Kernel Device Drivers." While the page mentions open-source drivers, it's only about the kernel portion of the driver and it's always been that way with ARM -- and most other ARM-based graphics vendors. The kernel portion is open, the user-space components are closed. Without an open user-space, having an open kernel driver is only of limited use, and will not be accepted into the upstream Linux kernel.
AMD rolled out the Beema and Mullins hardware yesterday. The AMD "Beema" APUs are targeted for mobile products like notebook PCs while AMD Mullins APUs are low-power processors for ultra low-powered devices. The low-end Mullins APUs sport Radeon R2/R3 Graphics. The AMD Mullins APUs include the A10 Micro-6700T, A4 Micro-6400T, and E1 Micro-6200Tl. The Beema APUs include the E2-6010, E2-6110, A4-6210, and A6-6310. The Mullins models top out at 4.5 Watts while the Beema APUs top out at 15 Watts.
AMD has now revealed their newest APUs, codenamed "Beema" and "Mullins" while their Linux fate remains unclear.
The AMD "Beema" APUs are targeted for mobile products like notebook PCs while AMD Mullin APUs are low-power processors for ultra low-powered devices. The low-end Mullin APUs sport Radeon R2/R3 Graphics.
Ever since the Raspberry Pi burst onto the scene in 2012, open source hardware projects have been promoting their Linux-ready hacker boards as offering faster, more capable alternatives. Considering the Pi's 700MHz ARM11 processor and relatively modest feature set, that's not such a stretch, but matching the $35 price is another story. If you can't match the price, what you really need to get the attention of Pi-lovers looking for a bit more oomph is to look and act like a Pi.
SolidRun created the community-backed HummingBoard to serve as a modular motherboard for use in its Linux- and Android-ready CuBox mini-PCs, including the recent CuBox-i models. Like the recently announced, Allwinner A20-based Banana Pi single board computer, the HummingBoard is a faster near-clone of the Raspberry Pi. It also similarly offers Pi-like ports and layout, as well as the RasPi’s 26-pin expansion connector for add-on module compatibility. But unlike the Pi boards, the HummingBoard’s processor core resides on a tiny computer-on-module.
First, DSL router owners got an unwelcome Christmas present. Now, the same gift is back as an Easter egg. The same security researcher who originally discovered a backdoor in 24 models of wireless DSL routers has found that a patch intended to fix that problem doesn’t actually get rid of the backdoor—it just conceals it. And the nature of the “fix” suggests that the backdoor, which is part of the firmware for wireless DSL routers based on technology from the Taiwanese manufacturer Sercomm, was an intentional feature to begin with.
Back in December, Eloi Vanderbecken of Synacktiv Digital Security was visiting his family for the Christmas holiday, and for various reasons he had the need to gain administrative access to their Linksys WAG200G DSL gateway over Wi-Fi. He discovered that the device was listening on an undocumented Internet Protocol port number, and after analyzing the code in the firmware, he found that the port could be used to send administrative commands to the router without a password.
After Vanderbecken published his results, others confirmed that the same backdoor existed on other systems based on the same Sercomm modem, including home routers from Netgear, Cisco (both under the Cisco and Linksys brands), and Diamond. In January, Netgear and other vendors published a new version of the firmware that was supposed to close the back door.