Language Selection

English French German Italian Portuguese Spanish

Linux Process, Not Tech, Biggest Hurdle

Filed under

Neither SCO Group's copyright claims on select Linux code nor Microsoft will be able to slow the spread of Linux in the enterprise over the next two years, an analyst for Gartner Research said.

The biggest hurdles to greater Linux enterprise penetration are process-based, according to George Weiss.

In a conference call sponsored by Unisys, Gartner's Weiss said five "process" issues could potentially inhibit Linux's continued movement up the enterprise pyramid.

They include: the potential for multiple source code distribution to cause fragmentation; higher support costs that increase total cost of ownership (TCO) with demanding workloads; OSS licenses that could proliferate beyond users' abilities to manage them; frequent open source software releases that create potential compatibility dependency issues, and potential patent and copyright issue exposure that could raise risk management concerns.

However, despite these issues, Gartner Research data also shows that more enterprises expect to make Linux their next strategic focus.

Linux is moving up the enterprise pyramid from non-mission critical network edge functions, to mission critical deployment, he noted in a presentation titled, "Enterprise Linux: Will Adolescence Yield to Maturity?"

In terms of focus, Network edge came in first at 31 percent in the survey's results about Linux usage, followed by Web Servers and Data center/mission critical at 18 percent. Application servers were a focus for 13 percent of respondents and computing clusters were cited by 12 percent of the survey's respondents.

"It's probably more than likely that UNIX will decline and will be pushed up into a mission-critical or mainframe focus in the enterprise, for databases and for large and very demanding workloads" over the next five years, Weiss said.

"For the part of the market where we're talking about mid-range applications, where you've got 1, 2, 4, 8, 16 and possibly 32-way, there will be a major tug of war between Linux on one hand and Windows on the other."

Linux will also likely erode software margins and continue to drive subscription pricing. Gartner also said he expects Linux to become a significant presence in more than 60 percent of data centers. Just don't expect all that Linux activity to lead to large migrations from either Windows servers or Windows desktop, he added.

Full Story.

More in Tux Machines

KDE Applications 16.12 Software Suite Lands December 15 for KDE Plasma 5.8 LTS

KDE Plasma's KDE Applications 16.08 software suite series will receive just one more point release, namely KDE Applications 16.08.3, which lands November 10, so it's time for the next major branch. Read more

Android Leftovers

Security News

  • How your DVR was hijacked to help epic cyberattack
    Technology experts warned for years that the millions of Internet-connected "smart" devices we use every day are weak, easily hijacked and could be turned against us. The massive siege on Dyn, a New Hampshire-based company that monitors and routes Internet traffic, shows those ominous predictions are now a reality. An unknown attacker intermittently knocked many popular websites offline for hours Friday, from Amazon to Twitter and Netflix to Etsy. How the breach occurred is a cautionary tale of the how the rush to make humdrum devices “smart” while sometimes leaving out crucial security can have major consequences.
  • Find Out If One of Your Devices Helped Break the Internet
    Security experts have been warning for years that the growing number of unsecured Internet of Things devices would bring a wave of unprecedented and catastrophic cyber attacks. Just last month, a hacker publicly released malware code used in a record-breaking attack that hijacked 1.5 million internet-connected security cameras, refrigerators, and other so-called “smart” devices that were using default usernames and passwords. On Friday, the shit finally hit the fan.
  • Once more, with passion: Fingerprints suck as passwords
    Fingerprints aren’t authentication. Fingerprints are identity. They are usernames. Fingerprints are something public, which is why it should really bother nobody with a sense of security that the FBI used them to unlock seized phones. You’re literally leaving your fingerprints on every object you touch. That makes for an abysmally awful authentication token.
  • Strengthen cyber-security with Linux
    Using open source software is a viable and proven method of combatting cyber-crime It’s encouraging to read that the government understands the seriousness of the loss of $81 million dollars via the hacking of Bangladesh Bank, and that a cyber-security agency is going to be formed to prevent further disasters. Currently, information security in each government department is up to the internal IT staff of that department.
  • Canonical announces live kernel patching for Ubuntu
    Canonical, the company behind the Ubuntu GNU/Linux distribution, has announced that it will provide a live kernel patching services for version 16.04 which was released in April.
  • Everything you know about security is wrong
    If I asked everyone to tell me what security is, what do you do about it, and why you do it. I wouldn't get two answers that were the same. I probably wouldn't even get two that are similar. Why is this? After recording Episode 9 of the Open Source Security Podcast I co-host, I started thinking about measuring a lot. It came up in the podcast in the context of bug bounties, which get exactly what they measure. But do they measure the right things? I don't know the answer, nor does it really matter. It's just important to keep this in mind as in any system, you will get exactly what you measure. [...] If you have 2000 employees, 200 systems, 4 million lines of code, and 2 security people, that's clearly a disaster waiting to happen. If you have 20, there may be hope. I have no idea what the proper ratios should be, if you're willing to share ratios with me I'd love to start collecting data. As I said, I don't have scientific proof behind this, it's just something I suspect is true.
  • Home Automation: Coping with Insecurity in the IoT
    Reading Matthew Garret’s exposés of home automation IoT devices makes most engineers think “hell no!” or “over my dead body!”. However, there’s also the siren lure that the ability to program your home, or update its settings from anywhere in the world is phenomenally useful: for instance, the outside lights in my house used to depend on two timers (located about 50m from each other). They were old, loud (to the point the neighbours used to wonder what the buzzing was when they visited) and almost always wrongly set for turning the lights on at sunset. The final precipitating factor for me was the need to replace our thermostat, whose thermistor got so eccentric it started cooling in winter; so away went all the timers and their loud noises and in came a z-wave based home automation system, and the guilty pleasure of having an IoT based home automation system. Now the lights precisely and quietly turn on at sunset and off at 23:00 (adjusting themselves for daylight savings); the thermostat is accessible from my phone, meaning I can adjust it from wherever I happen to be (including Hong Kong airport when I realised I’d forgotten to set it to energy saving mode before we went on holiday). Finally, there’s waking up at 3am to realise your wife has fallen asleep over her book again and being able to turn off her reading light from your alarm clock without having to get out of bed … Automation bliss!

Microsoft Corruption, Rejections, and Struggles

  • Microsoft licensing corruption scandal in Romania has ended on October 3rd
    This scandal covers buying Microsoft licensees for Romanian administration from 2004 to 2012 for total 228 millions USD. During the investigation was found that more than 100 people, former ministers, mayor of Bucuresti and businessman are involved in this corruption scandal and more than 20 millions euro are paid as bribes.
  • 49ers Colin Kaepernick, Chip Kelly review Microsoft Surface tablets, which Bill Belichick is ‘done’ using
    Ranting about Microsoft’s unreliable, sideline tablets is not a top priority for 49ers coach Chip Kelly and quarterback Colin Kaepernick, not with a five-game losing streak in tow for Sunday’s game against the Tampa Bay Buccaneers. But both Kelly and Kaepernick confirmed this week that they’ve experienced problems with the Microsoft Surface tablets. They’re just not as fed up with them as New England Patriots coach Bill Belichick, who’s lambasted the imperfect technology for years and finally declared this week: “I’m done with the tablets.”
  • Windows: When no growth is an improvement
    Research firms like IDC and Gartner have continued to forecast contraction, not expansion, in the PC business. Only when enterprise migrations to Windows 10 kick into gear do analysts see a reversal of the industry’s historic slump. That isn’t expected to happen until next year.