Language Selection

English French German Italian Portuguese Spanish

LinuxWorld Summit New York City: A Wrap-Up Report

Filed under
Linux

If you hold a LinuxWorld but there are no community exhibits on hand or distro CDs to pick up, what do you have? On May 25-26, IDG World Expo held a first-of-its-kind LinuxWorld Summit in New York City with that sort of dynamic. And for those two days, the answer to the question was "business focus."

Designed to attract attendees from corporate managerial strata (read: big time suits) rather than function as a general penguin fest, the LinuxWorld Summit opened with daily keynote panels before featuring a three-track conference: "The Business of Linux and Open Source", "Data Center and Virtualization" and "Security: Inside and Out."

The CIO Magazine Keynote Panel opened the event. Featuring three notable panelists, it was no surprise that each brought an enthusiastic message of positive results deploying Linux. For business, the financial bottom line is an imposing factor in decision-making policy. Thus, as would be expected, large cost savings were reported by each panelist. Each reported additional technical good news beyond cost savings-- improved scalability, reliability, uptime and so on--but given the responsibilities of C-level management, the cost savings was the headline.

I must confess that given the sometimes rancorous debate over what constitutes proper TCO accounting on the desktop, I was not surprised that each panelist detailed successful projects that reside in the data center rather than sweeping Linux-on-the-desktop initiatives. Within the data center, there is intense focus on the mission-critical task at hand and considerably less opportunity for lateral feature exploration. Given the possible range of options, one can imagine that Linux-on-the-desktop initiatives easily can be waylaid in no time.

The second day opened with the ambitiously titled "The Evolving World of Linux and Open Source Keynote Panel." Although flanked by two corporate panelists with solid messages, the star of this panel was Eben Moglen. As General Counsel to the Free Software Foundation, he gets to say such things as his "I make freedom" introductory statement. However, Moglen did much more than drop packaged hype to a crowd used to wading through sensational messages. He presented cogent analysis of why free software is the future and never strayed from point--"Free Software is not product. Free Software is knowledge"--even when handling questions during the Q & A that followed his talk.

"The Business of Linux and Open Source" conference track generally focused on resenting positive news to decision makers. The early adopters of Linux and open source are leading successfully, but quite a large number of more risk-averse managers still are on the sidelines, awaiting the results. Thus, this was an important track for this conference.

Although not exclusively about legal and licensing concerns, "The Business of Linux and Open Source" track did feature packed presentations about these important issues. Given the various FUD public relations efforts both directly issued from Microsoft and indirectly staged through partners targeting precisely these people, their attention to the legal issues was not surprising.

The "Data Center and Virtualization" track was weighted heavily with vendor presentations about Linux in the data center. This content dovetailed quite nicely with the Wednesday morning keynote panelist presentations. Virtualization is a hot topic, and AMD was among the vendors presenting (Xen for AMD) within this track.

"Security: Inside and Out" featured a range of presentations about Linux security in a corporate setting. I have to confess that the initial thought of having to reassure managers currently running massive Windows deployments about the quality of Linux security seemed like nonsense. How could they not know this? However, after reflecting on the high level of managerially targeted Microsoft FUD, especially the dubious accusations about Linux vulnerabilities and patching efforts, I had to agree with the inclusion and importance of this track.

Outside of the planned events, the big news at the LinuxWorld Summit was made by Nokia. At a press conference immediately following the CIO Magazine Keynote Panel, the Nokia 770 Internet Tablet handheld device and the maemo.org development site were unveiled and the formal pledge not to use patents against the Linux kernel was stated.

As big an announcement as the patent pledge was--Eben Moglen acknowledged its importance when answering questions about Linux patent concerns the following day--the 770 easily overshadowed it throughout the two day event. How could it not? A handheld device featuring multiple forms of input and wireless connectivity, the 770 also is designed as an open development platform. To encourage developers, Nokia unveiled the maemo Web site, which is dedicated to supporting 770 development. The Nokia table was constantly busy the rest of the show, as everyone in attendance had to witness the 770 up close. I was able to speak with a Nokia representative about the announcement; see An Interview with Dr. Ari Jaaksi of Nokia.

Full Article.

More in Tux Machines

Security News

  • Wednesday's security updates
  • Secure your Elasticsearch cluster and avoid ransomware
    Last week, news came out that unprotected MongoDB databases are being actively compromised: content copied and replaced by a message asking for a ransom to get it back. As The Register reports: Elasticsearch is next. Protecting access to Elasticsearch by a firewall is not always possible. But even in environments where it is possible, many admins are not protecting their databases. Even if you cannot use a firewall, you can secure connection to Elasticsearch by using encryption. Elasticsearch by itself does not provide any authentication or encryption possibilities. Still, there are many third-party solutions available, each with its own drawbacks and advantages.
  • Resolve to Follow These 8 Steps for Better Data Security in 2017
    Getting physically fit is a typical New Year's resolution. Given that most of us spend more time online than in a gym, the start of the new year also might be a great time to improve your security “fitness.” As with physical fitness challenges, the biggest issue with digital security is always stagnation. That is, if you don't move and don't change, atrophy sets in. In physical fitness, atrophy is a function of muscles not being exercised. In digital fitness, security risks increase when you fail to change passwords, update network systems and adopt improved security technology. Before long, your IT systems literally become a “sitting duck.” Given the volume of data breaches that occurred in 2016, it is highly likely that everyone reading this has had at least one breach of their accounts compromised in some way, such as their Yahoo data account. Hackers somewhere may have one of the passwords you’ve used at one point to access a particular site or service. If you're still using that same password somewhere, in a way that can connect that account to you, that's a non-trivial risk. Changing passwords is the first of eight security resolutions that can help to improve your online security fitness in 2017. Click through this eWEEK slide show to discover the rest.
  • Pwn2Own 2017 Takes Aim at Linux, Servers and Web Browsers
    10th anniversary edition of Pwn2Own hacking contest offers over $1M in prize money to security researchers across a long list of targets including Virtual Machines, servers, enterprise applications and web browsers. Over the last decade, the Zero Day Initiative's (ZDI) annual Pwn2Own competition has emerged to become one of the premiere events on the information security calendar and the 2017 edition does not look to be any different. For the tenth anniversary of the Pwn2Own contest, ZDI, now owned and operated by Trend Micro, is going farther than ever before, with more targets and more prize money available for security researchers to claim by successfully executing zero-day exploits.
  • 'Factorio' is another game that was being hit by key scammers
    In another case of scammers trying to buy keys with often stolen credit cards to sell on websites like G2A, the developers of 'Factorio' have written about their experience with it (and other stuff too).

Red Hat News

Development News: LLVM, New Releases, and GCC

PulseAudio 10 and Virtual GPU in Linux

  • PulseAudio 10 Coming Soon, Using Memfd Shared Memory By Default
    It's been a half year since the debut of PulseAudio 9.0 while the release of PulseAudio 10 is coming soon. PulseAudio 9.99.1 development release was tagged earlier this month, then usually after x.99.2 marks the official release, so it won't be much longer now before seeing PulseAudio 10.0 begin to appear in Linux distributions.
  • Experimenting With Virtual GPU Support On Linux 4.10 + Libvirt
    With the Linux 4.10 kernel having initial but limited Intel Graphics Virtualization Tech support, you can begin playing with the experimental virtual GPU support using the upstream kernel and libvirt.