Mageia Trudging on to Release
The Mageia project is moving on to their initial alpha, now expected sometime in January. They've been busy setting up the infrastructure, developmental and administrative teams, and choosing a permanent logo.
At the beginning of November the Mageia project had many necessary elements almost in place. These included things like a build server, Website and wiki hosting, a Code of Conduct, development and management teams, and a roadmap. The build server is based on Mandriva One and is just almost complete. PLF is temporarily hosting the some online resources and Zarb.org is hosting the mailing lists until a move to Gandi is completed. Packaging, artwork, distribution developers, translators, designers, QA, and other teams were organized. An alpha was planned for December at that time.
Mageia is making some further headway according to a recent blog post. The many logo entries have been short-listed and a final decision is expected any day now. There were so many nice entries that this is bound to be a very difficult task.
Earlier in the week the Mageia.org association was created and registered. This will allow Mageia to collect and distribute funds necessary to develop the distribution. Anne Nicolas was appointed President, Arnaud Patard is the new Secretary, and the Treasurer is Damien Lallement. Monthly reports will be published for those interested in the financial details. Report logs of the Founders' Weekly meetings will also be published and each team will have their own public communication channels as well.
Discussions are on-going concerning the repository directory structure and subversion repositories are being implemented. Main mirrors will start with three media directories: core, nonfree, and tainted; and each will have five subdirectories: release, updates, updates_testing, backports, and backports_testing. Importing from Mandriva will be logical and organized as developers start with the base system, compiler, and rpm tools. X will be next followed by the desktop environments before moving on the remaining software. Removing any code encumbered by licensing restrictions is a top priority.
The most significant tidbit for anxious testers is that the December alpha has been pushed back to sometime in January with the first release still on schedule for March.
Susan Linton is a Linux writer and the owner of tuxmachines.org.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide