With the release of Fedora 41 in October, this Red Hat sponsored Linux distribution is hoping to have all the software bits aligned that its AMD SEV-SNP virtualization stack will be all squared away for this latest iteration of Secure Encrypted Virtualization...
Intel today released OpenVINO 2024.2, the newest version of its open-source AI toolkit for optimizing and deploying deep learning (A) inference models across a range of AI frameworks and broad hardware types...
As a planned change for Fedora 41, Red Hat engineers are working on upstream GNOME Software better supporting the NVIDIA proprietary driver installation by allowing the installation to work gracefully with UEFI Secure Boot enabled systems...
After last week looking at how FreeBSD 14.1 has improved performance over FreeBSD 14.0, here is an expanded cross-OS comparison now looking at how the new FreeBSD 14.1 stable release compares to the recently released NetBSD 10.0, the current DragonFlyBSD 6.4 release, and then CentOS Stream 9 and Ubuntu 24.04 LTS for some Linux comparison data points.
Germany's Sovereign Tech Fund has been making sizable investments into various Linux desktop projects, the Rust-based Coreutils implementation, libmicrohttpd, PHP, a systemd bug bounty, and other prominent open-source software that could benefit from greater financial resources. Today they have announced they have opened up for a new round of applications for those open-source projects seeking funding from this German government initiative...
Intel's Open Image Denoise open-source software that is a denoising library used by Blender and other applications is out with a new feature release as it prepares for the integrated graphics of upcoming Arrow Lake and Lunar Lake processors as well as nearing the launch of Xe2 / Battlemage discrete graphics...
Within the every increasingly complex world of CPU security mitigations, Intel engineers have submitted Linux kernel patches to begin taking into account the CPU core "hybrid" topology when determining relevant CPU security vulnerabilities and in turn the mitigations to apply...
Pages