Language Selection

English French German Italian Portuguese Spanish

Red Hat Reports Second Quarter Fiscal Year 2008 Results

Filed under
Linux

Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced financial results for its second fiscal quarter ended August 31, 2007. Red Hat's current fiscal year will end February 29, 2008.

Total revenue for the quarter was $127.3 million, an increase of 28% from the year ago quarter and 7% from the prior quarter. Subscription revenue was $109.2 million, up 29% year-over-year and 6% sequentially.

Other highlights of the quarter included the following:

- Red Hat continued to build its industry leading ecosystem by surpassing the milestone of more than 3,000 applications certified on Red Hat Enterprise Linux.

- Following three consecutive years of Red Hat being ranked first in value for enterprise software in the CIO Insight survey, Red Hat Japan was ranked the number one technology vendor in Japan that customers intend to conduct business with in the future according to the Nikkei Market Access survey.

More Here




Also:

Red Hat today announced the promotion of Mark E. Cook to Vice President, Finance and Controller and the appointment of Paul Argiry as Vice President and Treasurer. Both will report to Executive Vice President and Chief Financial Officer, Charlie Peters.

Red Hat Appoints Two New Financial Executives

More in Tux Machines

Security Leftovers

  • Tuesday's security updates
  • Security updates for Wednesday
  • Security updates for Thursday
  • Small number of computer-aided rifles could be hacked in contrived scenario
    The internet is reeling today at the "news" that a rare make of computer-aided gunsight can under certain circumstances be hacked into, permitting a hacker to interfere with a suitably-equipped rifle's aim. The gunsight in question is the much-hyped but seldom purchased TrackingPoint kit, a system with a Linux machine at its heart which can be fitted to a range of different rifles. The TrackingPoint (details on its capabilities are at the end of this article) is mainly a curiosity. People who would be interested in it - experienced long-range marksmen - basically don't need it, and people who need it - those who have seldom or never fired a rifle - typically don't want it. And very few in either group can afford it.
  • Researchers Hack Linux-Powered, Self-Aiming Smart Rifle, Causing It To Change Targets
  • Remote code execution via serialized data
    Serialization and, more importantly, deserialization of data is unsafe due to the simple fact that the data being processed is trusted implicitly as being “correct.” So if you’re taking data such as program variables from a non trusted source you’re making it possible for an attacker to control program flow. Additionally many programming languages now support serialization of not just data (e.g. strings, arrays, etc.) but also of code objects. For example with Python pickle() you can actually serialize user defined classes, you can take a section of code, ship it to a remote system, and it is executed there.
  • To exec or transition that is the question...
  • CIL – Part1: Faster SELinux policy (re)build
  • FCC Rules Block use of Open Source
    The United States Federal Communications Commission (FCC) has introduced ‘software security requirements’ obliging WiFi device manufacturers to “ensure that only properly authenticated software is loaded and operating the device”. The document specifically calls out the DD-WRT open source router project, but clearly also applies to other popular distributions such as OpenWRT. This could become an early battle in ‘The war on general purpose computing’ as many smartphones and Internet of Things devices contain WiFi router capabilities that would be covered by the same rules.
  • Hacked Jeep Cherokee Exposes Weak Underbelly of High-Tech Cars
    The Jeep Cherokee brought to a halt by hackers last week exposed wireless networks as the weakest link in high-tech vehicles, underscoring the need to find fast over-the-air fixes to block malicious intrusions. Features that buyers now expect in most modern automobiles, such as driving directions and restaurant guides, count on a constant connection to a telecommunications network. But that link also makes cars vulnerable to security invasions like those that threaten computers in homes and businesses.

Open source Copyright Hub unveiled with '90+ projects' in the pipeline

The web has grown up without letting people own and control their own stuff, but a British-backed initiative might change all that, offering a glimpse of how the internet can work in the future. Their work will all be open sourced early next year. Britain's much-anticipated Copyright Hub was given ministerial blessing when it finally opened its kimono today, boasting a pipeline of over 90 projects covering commercial and free uses. Read more

DNF Might Handle System Upgrades in Fedora 23 Linux, Obsoletes and Retires Fedup

Kevin Fenzi posted a new message on the Fedora devel-announce mailing list a couple of days ago, informing all users and developers about a new proposal for the upcoming Fedora 23 Linux operating system, called DNF System Upgrades. Read more

Windows 10, The Matrix, and Linux Heros

Wow, it sure was a busy Thursday in the news feeds today. Windows 10 is getting a lot of headlines, some right in Open Source World. The Free Software Foundation issued a public statement urging folks to reject Windows 10 and LinuxBSDos.com advised dual-boot upgraders. The CEO of Mozilla even posted an open letter to Microsoft CEO concerning Windows 10. Elsewhere, Christine Hall blogged about the advancement of artificial intelligence, a LibreOffice update was announced, and Swapnil Bhartiya shared his pick of top five heros of Linux. Read more