We’ve had a long and arduous search for a usable resolution (at least 1366×768) portable netbook, that will run Ubuntu smoothly, and we’re pleased to report our findings! The MSI U230-040US netbook fulfills all our requirements without so much as a hiccup.
Most netbooks have a 1024 x 600 pixel display. This fails miserably with some applications that are designed for higher resolution, like Eclipse, for example. Working with Eclipse can be annoying enough, but in a lower resolution display, important fields in certain windows are unusable and almost completely hidden.
Portability is important and this system weighs in at 3.3 pounds. It’s got a good solid feel to it, and the display bends back to an angle of about 135 degrees. The keys are next to each other, not spaced out like the Sony Vaio. The netbook’s measurements are 11.71″(L) x 7.49″(D) x 0.55~1.22″(H).
This system passed all our tests and is available, as a complete dual boot system from eRacks, called the eRacks/CUMULUS. We’ve got Ubuntu and Windows 7 on this one.
The built-in Webcam is 1.3MP and works with Cheese Webcam Booth, both photo and video. There is a 4-in-1 Card Reader (XD/SD/MMC/MS), and three USB2.0 connections. Bluetooth is working without any special configurations.
I’ve set the processor for 800MHz at OnDemand. The other settings are Conservative, Performance, and Powersave with a higher 1.6GHz is available.
All-in-all this system gets top marks for usability and portability.
britta October 5th, 2010
Here are 10 really useful reasons to justify why you need a new Linux Netbook from eRacks.
Besides, a contributing member of this technological society is required to stay well-connected at all times. And in this economy, cost-effectiveness is imperative.
britta January 6th, 2009
from The Open Source Newsletter – July 2008
Aside from all the usual green advice, what can a conscientious SysAdmin do to save money during this time of rising energy prices and a challenging economic situation?
Here is eRacks’ top-ten list of recession-proofing strategies:
Remember, recession isn’t permanent, but can be long. And playing it smart now will help, and quite possibly make all the difference.
britta August 8th, 2008
Posted In: News
A secure environment is absolutely crucial for a virtualization server connected to the Internet. If the host is compromised, all its virtual machines are at risk and their services will be affected, learn more from these important internet safety tips and advice article.
|eRacks virtualization experts have put together a useful list of security considerations for virtualization migration planners. TIP #1. Use an open source virtualizer if possible. Open source software vulnerabilities are documented clearly, are well-known, and fixed quickly.|
|Proprietary-software bugs usually take longer to get fixed, and are even sold on black markets for illicit hacking. In fact, there are documented cases of closed source software companies purchasing security hole information of their own applications. Open source software vulnerabilities have less value on the black market, because of their shorter shelf-life.|
|TIP #2. Use open source guests wherever possible. New drivers for open source applications improve security as well as performance. Open source guests are more cooperative with the host, leaving less room for attack. Windows is inherently less secure, since a – it is closed source and updated less frequently. b – widely used and thus a big target. c – statistically has more severe vulnerabilities than open source OSes which take longer to fix.|
|TIP #3. Minimize the host footprint, making less surface area available for hackers. A small target is harder to hit than a large one. eRacks typically recommends KVM because of its small footprint, simple design, and ease of use.
The virtualization host provides services in the form of ports and packages, which should only include those required by the VMs. An effective security plan should minimize the number of open ports, narrowing the possibilities of illicit entry.
|TIP #5. Use an external physical firewall. It is also possible to use a virtualized firewall, running as a guest, but it can only protect the downstream systems, and not the host. A virtualized IP-less bridging firewall is also possible but it is more difficult to implement, and still doesn’t protect the host. The safest solution is an external firewall, such as the eRacks/TWINGUARD, a redundant 1U system, with failover, running a very secure OpenBSD.|
|TIP #6. Assess your security level, including regular port scans (Nmap), and OS fingerprinting, keeping track of any changes. A hardened system will not give out versions of running services, otherwise it would be too easy to know exactly where the vulnerabilities lie. eRacks can give you a head start by building, installing, and configuring your system for you. Your physical host server can be configured with your choice of a virtualization host, including the freely available version of VMWare or Linux-native KVM (Kernel-based Virtual Machine), as well as a large number of possible virtual operating systems and applications, including web, DNS, email, proxy and other infrastructure services.|
|virtualizer||description||complexity||level of open source|
|KVM||built into the kernel, uses the standard Linux scheduler, memory management and other services||simple, non-intrusive, very stable, easy to administrate –
KVM hypervisor about 10-12K lines of code (2007)
|released under the GNU GPL
|Xen||external hypervisor, supports both paravirtualization and full virtualization, has its own scheduler, memory manager, timer handling, and machine initialization.||specially modified kernel – has 10x more lines of code as KVM => raises the vulnerability level||released under the GNU GPL
|VMware||fully virtualizes using software techniques only, very good performance, stability.||very large and complex; more than 10x lines of code of Xen||proprietary,
player open (teaser-ware),
britta July 9th, 2008