News: 0001600232

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

NVIDIA 590.48.01 Linux Driver Brings R590 Series To Stable

([NVIDIA] 6 Hours Ago NVIDIA 590.48.01)


NVIDIA has promoted their R590 driver series to stable with the release today of the NVIDIA 590.48.01 Linux driver as their latest new feature branch version.

Earlier this month NVIDIA published the [1]590.44.01 Linux driver beta that brought Wayland improvements, Vulkan driver fixes, and other mostly low-level changes. The NVIDIA 590 driver series is also what's [2]dropping the aging GeForce GTX 900 / GTX 1000 series support .

Out today is the NVIDIA 590.48.01 Linux driver that takes R590 out of beta. Compared to the prior beta release, there are just a handful of EGL platform bug fixes around multi-sample configurations. No other new changes are noted with this NVIDIA 590.48.01 stable release.

The NVIDIA 590.48.01 Linux driver can be downloaded at [3]NVIDIA.com .



[1] https://www.phoronix.com/news/NVIDIA-590.44.01-Linux-Beta

[2] https://www.phoronix.com/review/nvidia-980-5080-linux

[3] https://www.nvidia.com/en-us/drivers/details/259267/



Look Out! It's Microsoft Outlook

An old maxim in the Unix community states, "All programs expand until they
can read mail... except Microsoft Outlook." Well, that's no longer true.
By taking advantage of loopholes in several undocumented APIs, a team of
geeks were able to transform Outlook from a virus-delivery system into an
actual mail client.

"It was quite a feat to accomplish this," said one of the geeks. "I mean,
the rat's nest that is the Windows API can be used to frighten small
children... or adults. And the frequency by which Outlook exploits are
discovered is directly proportional to the number of times Bill Gates uses
the word 'innovation'. But this is the first time somebody has discovered
a beneficial exploit."

Microsoft has vowed to release a patch to fix the uncovered security
flaws. "We simply cannot tolerate unauthorized reverse engineering and
hacking of our innovative solutions. Our Security Response Team will pull
an all-nighter to eliminate these known issues."