"Sorry, but your system does not meet the minimum system requirements"
Sorry, but your system does not meet the minimum system requirements (Adobe). The all-new Yahoo! Mail has not been tested with your operating system (Yahoo).
What do these two messages have in common? In both cases, they were generated by trying to access the service or software from a Linux-based PC. I wish I could say it was because I am running 64-bit Fedora, or because I want to do something special with the sites, but sadly, that is not the case. In the case of Yahoo, I am just trying to access my mail box. It does work, but it "has not been tested," which leads me to believe that if some feature fails to work as I expect it to, I am pretty much out of luck. In the case of Adobe, I need to download something called Adobe Digital Editions in order to read an electronic book from Cisco Press. I guess this indicates that Cisco admins only use Windows or Apple as their desktop systems.
And this bothers me. It bothers me on a number of levels. Linux is no longer just for servers, nor has it been for more than ten years. Major corporations, like Cisco, are pressing for a larger Linux presence, working with development shops and providing software that interacts or runs on Linux.
A web mail client should not have to be "tested" to work with a specific operating system. It should be tested to interoperate with the HTML standards, but the operating system should be irrelevant. That is supposed to be the strength of n-tier systems.
One of the key points I gained from this year's LinuxCon was that the desktop, as a meme, is dead. And by dead, I mean that it does not matter what the hardware or operating system is. It should not matter if you are accessing data via an Android-powered netbook or an Apple-powered tablet. Making the cloud work, means that the standards must be more than hardware and OS. And yet tools that are supposedly designed to make it easier to integrate and interoperate with the cloud and its data are still hamstrung by having to have a specific operating system, bit version, and CPU running underneath them.
As a Linux user, this makes me very angry...and it is time to start expressing my opinion with my wallet. Regrettably, I do not really think that is going to be enough.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- The Death of RoboVM
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide