Language Selection

English French German Italian Portuguese Spanish

CEO Jim Whitehurst pilots Red Hat into future

Filed under
Linux
Interviews

When Matthew Szulik left Red Hat abruptly for family health reasons in December, many people were scratching their heads over the company's new choice of CEO: a young executive from Delta Airlines, Jim Whitehurst. But Whitehurst's chief operating officer title at Delta and position outside of the technology industry are misleading; a peek into his past reveals a computer science degree and a passion for open source technology, not to mention a smooth operator who helped bring a struggling airline out of bankruptcy.

Still, Whitehurst, 40, has big shoes to fill in replacing Szulik, the man who took a small, unknown company and turned it into a savvy business competitor that made Linux a household name and struck fear in the hearts of much bigger rivals such as Microsoft. Today, Red Hat is the leading Linux vendor and is financially sound, but the company is in a pivotal phase of reinventing itself as a broader open source software provider and a multibillion-dollar technology leader that can compete long-term with much larger companies.

Whitehurst spoke with IDG News Service this week about the key findings of his first month on the job and where he thinks Red Hat should focus its attention to evolve at a sustainable pace. This is an edited version of that interview.

IDGNS: I was surprised to find out that you have a computer science background when I heard you came to Red Hat as COO from Delta Airlines. I didn’t expect you to be such a techie.

Whitehurst: I do have geek cred. For some reason, your reputation is always based on your prior experience. When I was at the airline, people said, "Who is this strategy consultant running an airline?" Now I'm an airline guy running a technology company. I wish I was called an airline guy when I was at the airline!

More Here




More in Tux Machines

OSS: Blockchain, Innersource, SQL and Clang

  • Banks are turning to open source for blockchain, says Google engineer
    Banks have historically developed all software in-house and maintained a fierce secrecy around their code, but more recently they’ve embraced open-source. They’re likely to use open source for one of the most hotly tipped technologies out there – blockchain.
  • Innersource: How to leverage open source in the enterprise
    Companies of varying sizes across many industries are implementing innersource programs to drive greater levels of development collaboration and reuse. They ultimately seek to increase innovation; reduce time to market; grow, retain, and attract talent; and of course, delight their customers. In this article, I'll introduce innersource and some of its key facets and examine some of the problems that it can help solve. I'll also discuss some components of an innersource program, including metrics.
  • Reflection on trip to Kiel
    On Sunday, I flew home from my trip to Kiel, Germany. I was there for the Kieler Open Source und LinuxTage, September 15 and 16. It was a great conference! I wanted to share a few details while they are still fresh in my mind: I gave a plenary keynote presentation about FreeDOS! I'll admit I was a little concerned that people wouldn't find "DOS" an interesting topic in 2017, but everyone was really engaged. I got a lot of questions—so many that we had to wrap up before I could answer all the questions.
  • A quick tour of MySQL 8.0 roles
    This year at the Percona Live Open Source Database Conference in Dublin, I'll be discussing a new feature introduced in MySQL 8.0: roles. This is a new security and administrative feature that allows database administrators to simplify user management and increases the security of multi-user environments. In database administration, users are granted privileges to access schemas, tables, or columns, depending on the business needs. When many different users require authorization for different sets of privileges, administrators have to repeat the process of granting privileges several times. This is both tedious and error-prone. Using roles, administrators can define sets of privileges for a user category, and then the user authorization becomes a single statement operation. Roles have been on the MySQL community's wish list for a long time. I remember several third-party solutions that tried to implement roles as a hack on top of the existing privileges granting system. I created my own solution many years ago when I had to administer a large set of users with different levels of access. Since then, anytime a new project promised to ease the roles problem, I gave it a try. None of them truly delivered a secure solution, until now.
  • MyDiamo Expands Open Source Database Encryption Offerings to Include PostgreSQL
  • Clang-Refactor Tool Lands In Clang Codebase
    The clang-refactor tool is now living within the LLVM Clang SVN/Git codebase.

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD

BlueBorne Vulnerability Is Patched in All Supported Ubuntu Releases, Update Now

Canonical released today new kernel updates for all of its supported Ubuntu Linux releases, patching recently discovered security vulnerabilities, including the infamous BlueBorne that exposes billions of Bluetooth devices. The BlueBorne vulnerability (CVE-2017-1000251) appears to affect all supported Ubuntu versions, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus) up to 16.04.3, Ubuntu 14.04 LTS (Trusty Tahr) up to 14.04.5, and Ubuntu 12.04 LTS (Precise Pangolin) up to 12.04.5. Read more