Jolicloud's Jolibook Netbook Hitting Stores
Jolicloud, the self-proclaimed "perfect OS for netbooks," has been making headlines for a while with their consumer-focused, and frankly very cute Jolibook netbook. Word all around the web is that it is available today in the UK.
According to CrunchGear the technical specs are as follows:
- Intel Atom N550 processor (1.5 GHz, dual-core)
- 250GB hard drive
- 10.1″ screen
- Memory: 1GB
- Three USB 2.0 ports
- Jacks for mic, headphones, LAN and an external monitor
What interests us here at Linux Journal is that this latest netbook offering, if successful, could mark a return to Linux-based consumer netbooks. When Asus first debuted their EeePC, the Linux world rejoiced at the possibility of widespread consumer adoption of Linux. Indeed, Linux was the preferred OS of the netbook manufactures for a short time, but was predictably pushed aside with the introduction of Windows 7. But, as cloud computing has gone from tech conference buzzword to something my mother talks about, and as consumers rely more and more on web applications like Facebook, Google Apps and others, a product like the Jolibook could bring back some of the Linux netbook momentum.
I have not yet tried Jolicloud's OS, but then I am really not their primary target audience. Jolicloud is is presented as a hassle-free, fun, web application driven OS for everyone, and not really geared toward the power Linux user.
If you've taken Jolicloud for a spin, let me know how it was. Will this be the Linux netbook for the masses?
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide
- Server Hardening
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments