Ubuntu Codenames

Ubuntu utilizes two-word codenames in the development of future releases of the Linux-based operating system. While the official Ubuntu releases carry a version number in the form of X.YY, with the “X” representing the year and the “YY” signifying the month of the official release, the Ubuntu codenames use an “adjective animal” combination, or an adjective word followed by the name of an animal, typically one that’s unique or not all that well known.

The Ubuntu codenames are always alliterations, and they have generally ascended in alphabetical order with each successive release, although not always with the next letter in the alphabet used. The quirky codename game started with development of the v4.10 release of Ubuntu in 2004 under the codename of Warty Warthog. Hoary Hedgehog (v5.04) followed in April 2005, Breezy Badger (v5.10) in October 2005 and Dapper Drake (v6.06) in June 2006.

Dapper Drake started the process of new Ubuntu codenames ascending in alphabetical order. Since Dapper Drake, Ubuntu codenames have been Edgy Eft (v6.10), Feisty Fawn (v7.04), Gutsy Gibbon (v7.10), Hardy Heron (v8.04), Intrepid Ibex (v8.10), Jaunty Jackalope (v9.04), Karmic Koala (v9.10), Lucid Lynx (v10.04), Maverick Meerkat (v10.10), Natty Narwhal (v11.04), Oneiric Ocelot (v11.10), Precise Pangolin (v12.04), Quantal Quetzal (v12.10), Raring Ringtail (v13.04), Saucy Salamander (v13.10), Trusty Tahr (v14.04), Utopic Unicorn (v14.10), Vivid Vervet (v15.04), Wily Werewolf (v15.10), Xenial Xerus (16.04 LTS), Yakkety Yak (16.10), Zesty Zapus (17.04), Artful Aardvark (17.10) and Bionic Beaver (18.04 LTS).

The 18.10 release of Ubuntu is currently under development, with an official release date planned in October 2018. Its Ubuntu codename has yet to be determined.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...