Language Selection

English French German Italian Portuguese Spanish

Sizing up the Linux desktop market, part 1

Filed under
Linux

What Linux loyalists might see as "the good news" is that the typical Linux desktop distribution has become highly reliable and rich in capabilities, Iams said. And what's more, today there are more applications to run on desktop Linux than ever before -- and they're getting better, too.

SearchEnterpriseLinux.com caught up with recently to get a holistic view of the Linux desktop market from users to vendors. In part one, the analyst describes the overall progress of Linux on the desktop thus far, and talks a little about how the leading Linux desktop offerings -- Red Hat and Novell -- stack up.

How is the Linux desktop market progressing today?

Tony Iams:. Well, slowly. It has been progressing slowly. Every year seems to be the year where widespread adoption of Linux on the desktop is just around the corner. What is clear is from a technology standpoint is that some amazing progress has been made. If you look at the capabilities of desktop Linux today in terms of ease-of-use, in terms of the productivity applications that are available, it's very clear that the development community has invested huge resources in delivering something that is usable by typical end users. There are some terrific Linux desktop products out there today. What I still don't see emerging quite yet is widespread demand. But clearly there are some users that are very interested in running Linux on the desktop.

What types of companies do those "very interested" users work for? Is there a typical profile of a Linux desktop user organization?

Iams: You really have to break it down by market segment. In large organizations that have desktops with very tightly defined functions -- limited functions for very specific applications -- there is interest in using Linux as a foundation.

Do those dedicated applications tend to be homegrown?

Iams: Yes. That's true. [They include] in-house applications, or very limited function [applications], where you really don't need that broad spectrum of functional capabilities [like] multimedia and so on. All of the things that you can do on a typical Windows PC, those really aren't necessary for a lot of corporate users, especially in larger enterprises because you tend to have rigid job functions there.

What about smaller companies?

Iams: When you get down to the small and medium businesses and consumer segments, those workloads are much more driven by applications, by specific applications. The application portfolio on Linux continues to grow and many developers target Linux, [but] other systems like Windows still have the majority of applications. A lot of [those applications] have not been ported to Linux. If your business depends on that [unsupported] application, it's not feasible to migrate without significant investments in re-porting the application, retraining your users and so on. So, small and medium business tends to be application driven, and since Windows still has the majority of applications, that is a major strength for it.

How do Red Hat's and Novell's compare on the desktop?

Iams: Novell is being a little bit more aggressive because they actually have several offerings there. They have the SuSE Enterprise Linux 9 Professional, which is in the retail channel. Red Hat has more or less gotten out of the retail channel, but SuSE Linux is still in there. That means you can go to CompUSA and it's on the shelf. Red Hat isn't really interested in that for now.

[Red Hat has] Red Hat Enterprise Linux, which you can certainly run on the desktop. And they have Fedora, which they target at sort of the power user that has traditionally used Linux on the desktop.

Novell has SuSE Enterprise Linux 9 Professional, which is also targeted at those enthusiasts, and then they have the Novell Linux Desktop, which is more for enterprise users -- users that only require basic functionality and are mostly concerned with integrating it into a larger IT infrastructure. So, Novell has more choices and packages for the desktop than Red Hat, and [Novell] also benefits from some technology they've acquired.

Which technology is that?

Iams: The Ximian Desktop, for example, is something that Novell bought a couple of years ago. That included Evolution, which is a messaging and groupware application that is compatible with Exchange. And then they have something called Red Carpet, which is a software management tool. Those are both very valuable for helping to integrate a Linux desktop into existing messaging infrastructures that are based on Exchange. And it also makes it easier to manage the software updates that those desktops require.

Of Novell and Red Hat, which one is most likely to crack the SMB market?

Iams: Novell has a rich portfolio of desktop products and functions. And they're potentially in a stronger position than Red Hat to drive into those SMB-type environments because their NetWare operating system has long been used in SMB environments. Novell is now in the process of turning those users over to Linux by migrating the NetWare file and print sharing services over to Linux. That could in turn encourage the redeployment of some of those SMB applications that were formerly based on NetWare. Those would now be based on Linux. That could give Novell a foothold in SMB environments, where the desktop, again, plays a really significant role.

By Mark Brunelli
SearchEnterpriseLInux
Part 2.

That is not quite accurate.

Linux distros are not even distinquishable except for driver compatibility for your Linux machine.

Three years and 164 Linux distributions, most used and tested...Most documented with hours of notes and observations. While the devil might still be in the details, it is those details that make the pretty pictures you see on your monitor.

Even after a year of hard development on the live cd front, there is still only one distro that gives you 100 percent streaming out of the box with zero fiddling with drivers and stuffing obscure mplayer files into folders.

That would be PCLiuxOS. Out of 164 distros, this is the only work that I have found suitable for the new user and power user alike. Mepis fell hard on streaming, but it did make the attempt.

You and I seem to be guilty of the same thing...believing the deeper intention of our words will be evident in the most general of statements.

THAT'S why I don't write for a living. Wink

helios

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Today in Techrights

Security Leftovers

  • One-stop counterfeit certificate shops for all your malware-signing needs

    The Stuxnet worm that targeted Iran's nuclear program almost a decade ago was a watershed piece of malware for a variety of reasons. Chief among them, its use of cryptographic certificates belonging to legitimate companies to falsely vouch for the trustworthiness of the malware. Last year, we learned that fraudulently signed malware was more widespread than previously believed. On Thursday, researchers unveiled one possible reason: underground services that since 2011 have sold counterfeit signing credentials that are unique to each buyer.

  • How did OurMine hackers use DNS poisoning to attack WikiLeaks? [Ed: False. They did not attack Wikileaks; they attacked the DNS servers/framework. The corporate media misreported this at the time.
    The OurMine hacking group recently used DNS poisoning to attack WikiLeaks and take over its web address. Learn how this attack was performed from expert Nick Lewis.
  • Intel didn't give government advance notice on chip flaws

    Google researchers informed Intel of flaws in its chips in June. The company explained in its own letter to lawmakers that it left up to Intel informing the government of the flaws.

    Intel said that it did not notify the government at the time because it had “no indication of any exploitation by malicious actors,” and wanted to keep knowledge of the breach limited while it and other companies worked to patch the issue.

    The company let some Chinese technology companies know about the vulnerabilities, which government officials fear may mean the information was passed along to the Chinese government, according to The Wall Street Journal.

  • Intel hid CPU bugs info from govt 'until public disclosure'

    As iTWire reported recently, Intel faces a total of 33 lawsuits over the two flaws. Additionally, the Boston law firm of Block & Leviton is preparing a class action lawsuit against Intel chief executive Brian Krzanich for allegedly selling a vast majority of his Intel stock after the company was notified of the two security flaws and before they became public.

  • Intel did not tell U.S. cyber officials about chip flaws until made public [iophk: "yeah right"]

    Current and former U.S. government officials have raised concerns that the government was not informed of the flaws before they became public because the flaws potentially held national security implications. Intel said it did not think the flaws needed to be shared with U.S. authorities as hackers [sic] had not exploited the vulnerabilities.

  • LA Times serving cryptocurrency mining script [iophk: "JS"]

    The S3 bucket used by the LA Times is apparently world-writable and an ethical hacker [sic] appears to have left a warning in the repository, warning of possible misuse and asking the owner to secure the bucket.

  • Facebook's Mandatory Malware Scan Is an Intrusive Mess

    When an Oregon science fiction writer named Charity tried to log onto Facebook on February 11, she found herself completely locked out of her account. A message appeared saying she needed to download Facebook’s malware scanner if she wanted to get back in. Charity couldn’t use Facebook until she completed the scan, but the file the company provided was for a Windows device—Charity uses a Mac.

  • Tinder plugs flaw that enabled account takeover using just a phone number

    As Tinder uses Facebook profile pics for its users to lure in a mate or several, the 'dating' app is somewhat tied to the social network. When a swipe-hungry Tinder user comes to login to their account they can either do so via Facebook or use their mobile number.

  • `

Android Leftovers

Report from Debian SnowCamp and a Look at Solyd XK, a Debian-Based Distribution

  • Report from Debian SnowCamp: day 1
  • Report from Debian SnowCamp: day 2
    Of course, we’re still sorely lacking volunteers who would really care about mentors.debian.net; the codebase is a pile of hacks upon hacks upon hacks, all relying on an old version of a deprecated Python web framework. A few attempts have been made at a smooth transition to a more recent framework, without really panning out, mostly for lack of time on the part of the people running the service. I’m still convinced things should restart from scratch, but I don’t currently have the energy or time to drive it… Ugh.
  • Installing Solyd XK, a Debian based Linux distribution : Cooking With Linux
    It's time for some more "Cooking With Linux" without a net, meaning the video you are about to watch was recorded live. Today, I'm going to install a new Linux distribution (new to me, anyhow) called Solyd XK.