Linuxconf Europe: Kernel Programming and Energy Efficiency
Today, the Linux Conference in Cambridge focused on energy saving and kernel power management.
LinuxConf Europe is a very technical conference. One of the nicest features of this gathering
has been an overt recognition on behalf of the organisers, the UKUUG and GUUG, that
Linux is only a small component of a large software ecosystem; largely the GNU operating
system. Even more impressively, on Tuesday, the conference held an entire session
dedicated to hardware-related issues, specifically power management. At first this may not
appear to be the most interesting topic, but as the kernel continues to mature the
importance of power management is ever-increasing.
Arjan van de Ven of Intel began the session with an overview of common programming
techniques which are the largest wastes of power consumption: unnecessary polling of system
resources, insufficient caching of data being read from hard disk for example. These
examples were largely presented in the context of desktop applications, but the importance
and ramifications spread much further, most notably into the field of mobile devices.
Mobile and embedded Linux have been some of the largest growth areas for the kernel in
recent years (as advanced by devices such as Nokia's Internet Tablets, N770/800 and this
will only accelerate as OpenMoko and Qtopia phones become commercially viable.
The session ended with a talk by Matthew Garrett discussing how programmers need to go
about making Linux less power hungry. He noted that he had calculated his power saving
code, internationally, had saved more energy than he had consumed flying to conferences to
present his work. The ecological argument for this work is clearly apparent. However, it
shall be the increased usage time for mobile devices that will be the most obvious benefit of
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems