The X Factor: Apple Rolls Out New Version of X11 Windowing Environment
When Apple launched its OS X development effort, it made a big deal out of the new OS's UNIX base. But for UNIX folks using the OS, certain components were missing or incomplete. For example, it lacked package management. So the Fink development team ported dpkg and apt-get from Debian; X on X implemented an X window system; X11 binaries for Darwin (Apple's open-source BSD-derived base code for OS X) were made available by the XFree86 project. But X11 still was hardly a strong suit for OS X.
Apple changed that this past Tuesday when it quietly announced X11 for Mac OS X, its own new open-source implementation of XFree86. Although Steve Jobs didn't make the announcement in his keynote (a press release carried the weight), Apple engineers at Macworld told me the new X11 is still a big deal: "This is one area where we had a lot of catching up to do."
Apple calls the new release "a complete, rootless X11R6.6 implementation, as well as display server and client libraries--plus headers in the SDK". The new implementation supports SSH tunneling and runs concurrently and seamlessly with other applications that use Apple's Aqua user interface. Content can be cut, copied and pasted between X and Aqua windows. It also takes advantage of Apple's Quartz graphics system.
While the obvious purpose of the move is to give Apple parity with other UNIXes, the more important purpose is to allow easier porting of X applications to OS X.
When I talked with Avie Tevanian, Apple's Senior VP of Software Engineering, he was enthusiastic about the project: "The majority will love the fact that, as open-source developers, they have the opportunity to take what we've done, tweak it, modify it, clear it up, whatever. And they now have a channel to get it out to millions of people. Of course, we're also hoping they'll port their applications to Cocoa" (Apple's OS X application development environment).
As with the company's Java, GCC and browser efforts, Tevanian said he wanted this version of X11 to be the best of its breed and thinks that status has been achieved. "The version that we have released we think is the best one out there", he said.
James Davidson (author of Learning Cocoa with Objective C and the original author of Apache Ant and Apache Tomcat) said, "They'll have to repeat what they did with GCC. In the NeXTStep days they took a snapshot of GCC and forked. Now they're trying not to repeat the experience of integrating everything back, by doing things the right way from the start."
Doc Searls is senior editor of Linux Journal.
Doc Searls is Senior Editor of Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide