Feeds

Ubuntu chief ushers in the age of Intrepid Ibex

Goat boy's flehmen response

Internet Security Threat Report 2014

Canonical chief Mark Shuttleworth has revealed the name of the next Ubuntu release - Meeky Meerkat.

Er, well, it's really called Intrepid Ibex and will likely arrive in Oct. as Ubuntu 8.10.

It sounds as if Intrepid Ibex will center on laptop features such a tool to switch automatically between Wi-Fi and dial-in services.

"A particular focus for us will be pervasive internet access, the ability to tap into bandwidth whenever and wherever you happen to be," Shuttleworth wrote in an e-mail. "No longer will you need to be a tethered, domesticated animal - you'll be able to roam (and goats do roam!) the wild lands and access the web through a variety of wireless technologies. We want you to be able to move from the office, to the train, and home, staying connected all the way."

In addition, Shuttleworth wrote,

"Our desktop offering will once again be a focal point as we re-engineer the user interaction model so that Ubuntu works as well on a high-end workstation as it does on a feisty little subnotebook. We'll also be reaching new peaks of performance - aiming to make the mobile desktop as productive as possible."

Shuttleworth closed out his call to arms with a plea to give Ibex "horns."

Canonical plans to ship Hardy Heron (8.04) in April, which will mark its second long-term support (LTS) release. While Canonical pushes out fresh iterations of Ubuntu every six months, only the select few versions of the operating system receive LTS status. That LTS tag ensures that bug fixes and proper support will be available for five years on server versions of the OS and three years for desktop code.

The ibex is a goatish type creature, which is particularly noteworthy because of the males' impressive horns.

We're informed that a male ibex will try and tempt a female into sex by licking and sniffing the lass and by issuing a low scream. It's suspected that Bono responds to a similar ritual. Sometimes the female will demonstrate her interest by urinating or by ramming the male with her horns. The male then returns the favor through the flehmen response, which is a curling of the upper lip. This goes on for about 30 minutes until Bono shows up or the ibexes get it on. ®

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
'Urika': Cray unveils new 1,500-core big data crunching monster
6TB of DRAM, 38TB of SSD flash and 120TB of disk storage
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.