Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] Red Hat CEO in the Press, GNU/Linux Dominance Explained

  • Subject: [News] Red Hat CEO in the Press, GNU/Linux Dominance Explained
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Tue, 06 Jul 2010 18:17:18 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.4.2
Hash: SHA1

Jim Whitehurst is CEO and Chief Plumber at Red Hat

,----[ Quote ]
| That's certainly borne out by the recent 
| top500 supercomputer listings, where 91 per 
| cent of the world's fastest supercomputers 
| run some form of GNU/Linux (Windows runs on 
| 1%), the fact that the open source Apache 
| Web server well over half of the Web â as it 
| has for the last 10 years - and the near-
| parity in Europe of Firefox's market share 
| with Microsoft's Internet Explorer.


Open source could be a success story, too: Red Hat CEO

,----[ Quote ]
| Coming from an airline, the 42-year-old Mr 
| Whitehurst is an unlikely CEO for a 
| technology company, and more so, a company 
| that makes profits from selling free 
| software.
| When he left Delta, he was approached to do 
| a lot of additional turnarounds, but Mr 
| Whitehurst said rather than trying to fix 
| something, he wanted to build something, 
| where there was a buoyant canvas to be 
| painted, and Red Hat fit that bill. Red Hat 
| was also looking for someone from a non-tech 
| background and Mr Whitehurstâs profile, with 
| his interest in geeky stuff, matched it 
| well.



Open Source is Inherently More Secure, Says Red Hat

,----[ Quote ]
| But in the closed source world, you have
| to trust your vendor completely. All you
| get to see are binaries, so you have no
| way of knowing how they were built.
| President Reagan was fond of saying to
| Soviet leader Mikhail Gorbachev, "Trust,
| but verify." With proprietary software,
| you simply have to trust.
| Microsoft, for example, pushes out
| security updates on the second Tuesday of
| every month. Bressers said they can't do
| that. Microsoft has the advantage of
| hiding security flaws and working on them
| at their leisure, but with open source
| software, that's not possible because
| everyone can see that there's a problem
| and they expect it to be fixed right away.
| And if a security hole isn't plugged
| quickly enough, you can fix it yourself,
| Bressers explained.
| An example of the power of open source is
| the ping of death bug. Back in the late
| 1990s someone figured out that if you send
| a giant ICMP packet to a computer, just
| about any computer, it will crash. The bug
| affected every operating system, routers,
| printers, etc. When the problem was
| discovered, the open source Linux
| operating system had the bug squashed in
| about 2 hours, Bressers recalled. The
| closed source operating system vendors,
| however, took days, weeks and even months
| to make and distribute a patch for the
| ping of death.


Microsoft: 10,000 PCs hit with new Windows XP zero-day attack

,----[ Quote ]
| Nearly a month after a Google engineer
| released details of a new Windows XP flaw,
| criminals have dramatically ramped up
| online attacks that leverage the bug.
| Microsoft reported Wednesday that it has
| now logged more than 10,000 attacks. "At
| first, we only saw legitimate researchers
| testing innocuous proof-of-concepts. Then,
| early on June 15th, the first real public
| exploits emerged," Microsoft said in a
| blog posting.

Version: GnuPG v1.4.10 (GNU/Linux)


[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index