Ubuntu 13.10 Review | LAS s29e02

Ubuntu 13.10 Review | LAS s29e02

Has Ubuntu become all about the Dash? Or is there more going on in this saucy release? We’ll dig into our pain points and moments of joy in our Ubuntu 13.10 Saucy Salamander review.

Plus: The HP vs Microsoft cold war heats up, Steam Dev Days leave us dreaming, a quick look at Cinnamon 2.0…


All this week on, The Linux Action Show!

Thanks to:




HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

— Show Notes: —

Ubuntu 13.10 Review


Brought to you by: System76

Check out System76 on G+

Ubuntu’s Juju tool can also now manage LXC Linux containers, an OS-level virtualisation technology that enables more workloads to run on a single machine than full virtualisation, potentially reducing cost for service providers, the firm said.

Juju also now supports bundles, which enables a user to automate deployment of an entire stack without the need for scripting, and export that bundle to share with other admins, according to Baker.

Search results are sent to Canonical, and then to the third parties. Rather that data is “anonymized” when its received by Canonical is irrelevant. Canonical knows where the search originated as it has to send the results back to that same device.

– Picks –

Runs Linux:

Desktop App Pick:

Weekly Spotlight Pick:

Git yours hands all over our STUFF:

— NEWS —

Cinnamon 2.0 released! ← Segfault

– Feedback: –

  • To your SoapBox!

  • Leadwerks
    • The Leadwerks Engine is a 3D game engine powered by OpenGL 2.1
    • The engine makes use of the Newton Game Dynamics SDK 2.0 (Newton Archimedes) for physics, and OpenAL and EAX for sound and 3D sound effects.
    • The engine is based on a deferred renderer as of Leadwerks 2.1 and a unified lighting system that allows for dynamic lighting and soft shadowing without the use of lightmaps or any pre-compilation.
    • Modules have been made by members of the community to allow the use of the engine in languages such as Java, C#, VB.NET, and Python, but C/C++, BlitzMax and Lua are its originally targeted and officially supported languages.
    • A license costs $200 per user. A full source code license can also be purchased for an undisclosed amount.
  • Desktop Environments



— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —
— Find us on Twitter —Hang
— Follow the network on Facebook: —
— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

7 Responses to “Ubuntu 13.10 Review | LAS s29e02”

  1. jon_downfromthetrees Says:

    Of course Canonical knows where my search originated. My IP address is embedded in each packet. That’s how — and why — the net works.

  2. Flimm Says:

    It’s true that that’s how most Internet systems work, but it doesn’t have to be the case. For example, Tor lets you interact with servers without revealing your IP address.

  3. jon_downfromthetrees Says:

    That’s merely obfuscation by a collection of executables. There is only one “internet system” and it works by keeping track of IP addresses.

  4. Alexander von Gluck Says:

    Yup.. the disappearing menus and window controls are what bugs me. I’ll pass on 13.10 :-)

  5. Flimm Says:

    Um. Tor lets you interact with servers without revealing your IP address. It builds a random tunnel of proxies, where each proxy only knows about the step before and after, and nobody can rebuild the chain. Of course it is built on top of an “internet system” that uses IP addresses, that’s how TCP/IP works, but that doesn’t mean that Tor is useless. I’ve no idea what you mean by “obfuscation by a collection of executables”.

  6. jon_downfromthetrees Says:

    I didn’t say Tor was useless. I was correcting an incorrect characterization of it as an “Internet system”. There’s only one Internet.

    Tor consists of code that executes. It’s purpose is to hide and obscure somene’s IP address. Hence, “obfuscation by a collection of executables”.

    I question the entire notion of a “right” to privacy on the net. The net is, by design and intent, an open and public space. We may imagine we have a right to privacy in that space. But, in reality, when we publish there — and it’s all publication, not communication — we can have no more expectation of privacy that when we speak in public, say, in a restaurant. We hope and expect others will be polite enough not to eavesdrop. But, that’s all. They can listen if they wish and there’s nothing we can do about it. Whether people have a right to listen in is immaterial. They can hear us.

  7. Michael Hazell Says:

    TOR works by masking your IP and instead using the TOR server’s IP. Your IP still exists and if that TOR server was compromised, the attacker can get your IP address.

Leave a Reply