Linux 3.8 to drop support for Intel 386 chips
Released on Monday, meanwhile, Version 3.7 steps up the kernel's ARM support.
PC World - Launched back in 1985, the venerable i386 processor has served countless PC users around the globe long and well, but recently the developers of the Linux kernel decided to drop support for it.
This tree removes ancient-386-CPUs support and thus zaps quite a bit of complexity, wrote developer Ingo Molnar when submitting the change on Tuesday.
That complexity has meant extra work for kernel developers for years, Molnar pointed out.
While removing 386 support will make life easier, it also means that starting with Linux 3.8, very old hardware will no longer be able to run modern versions of Linux.
Unfortunately there's a nostalgic cost: your old original 386 DX33 system from early 1991 won't be able to boot modern Linux kernels anymore. Sniff, Molnar added.
Linux creator Linus Torvalds, however, was unconcerned: I'm not sentimental, he wrote on Wednesday in response. Good riddance.
Production of the i386 ended in September 2007, by which time it was already obsolete for use in PCs. It had still been used in embedded systems, however, and in phones including the BlackBerry 950 and Nokia 9000 Communicator.
Linux 3.7 debuts
On Monday, meanwhile, Torvalds released Linux 3.7.
"It's been a somewhat drawn-out release despite the 3.7 merge window having otherwise appeared pretty straightforward, and none of the rc's were all that big either," Torvalds wrote in the announcement. "But we're done, and this means that the merge window will close on Christmas Eve."
Linux 3.7 is particularly notable for features including multiplatform ARM support and 64-bit ARM support as well as heightened security, full TCP Fast Open support, and improved drivers for Intel and Nvidia graphics hardware, among many other features.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Linux and Unix White Papers | Webcasts