Browse Definitions :
Definition

Peppermint

Peppermint is a lightweight open source operating system that is optimized for cloud computing and Web-based applications. The operating system is based on Ubuntu Linux.

The intention behind Peppermint development was to create a fast Web-oriented operating system with an intuitive interface that would allow users to run Web applications as if they were installed locally. To this end, Mozilla Prism is used to create site-specific browsers (SSBs). Web apps launch into simplified windows that are free of browser features and buttons that are not relevant to the application. The operating system requires less than 512MB of storage space, loads in 25 seconds and shuts down in five.

The default desktop environment is LXDE (Lightweight X11 Desktop Environment). Other default installed applications include Firefox, Dropbox (an online backup, file synching and sharing application), Exaile (a music management application), Prism, X-Chat (an IRC client) and Transmission (a BitTorrent client). Default cloud applications include Editor by Pixlr, Facebook, Hulu, Last.FM, Pandora, Seesmic Web, The Cloud Player, YouTube, Google Calendar, Google Docs, Google Mail and Google Reader.

Peppermint OS One components include:

  • Linux Kernel 2.6.32
  • Xorg 7.5
  • Openbox 3.4.10
  • PCManFM 0.9.5
  • LXSession 0.4.3

Peppermint is available as a free download from the Peppermint website or can be purchased inexpensively as a Live CD or Live USB.

This was last updated in May 2010

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close