If you have to stay in a Windows environment, you still can save money with Linux. That's the thinking behind Thin Computing's WinConnect, a “Remote Desktop Protocol” that lets you use a generic Linux workstation—even cheap or recycled iron—for Windows 2000 terminal sessions. Thin Computing is at www.thincomputinginc.com.
Percentage of its enterprise that Plastic Dress-Up (the leading supplier of trophy and award components) has moved to the Linux platform: 80-90
Linux-derived cost savings in dollars on each new enterprise server purchased by Plastic Dress-Up: 30,000
Millions of images in the 1mage document imaging system on one Red Hat Linux server at Plastic Dress-Up: 1
Recovery percentage of its image database after a power outage at Plastic Dress-Up, in spite of a damaged drive partition: 100
Years during which Streptococcus mitis bacteria survived on the Moon between visits from Earthlings: 2.5
Years during which bacteria lived in the brickwork of Peruvian pyramids: 4,800
Years during which bacteria lived in a mastodon corpse: 11,000
Range in millions of years during which bacterial spores survived in amber-trapped bees: 25-40
Age in years of bacteria revived after recovery from a New Mexico mine shaft: 250,000,000
Estimated number of computer viruses in 1990: 200-500
Estimated minimum number of computer viruses in 2000: 50,000
Total number of reported Linux viruses: 1
Cost in billions of dollars in virus damages by September 2001: 10.7
Number of observable domains hosted by 21VIANET.com in Beijing, China: 3
Latest uptime in days of the 21VIANET domain (www.encantata.com.cn) running Apache on Linux: 305
Latest uptime in days of the the two 21VIANET domains running IIS on Windows 2000: 10, 19
1-4: 1mage (www.1mage.com)
13: Computer Economics (www.computereconomics.com)
14-16: Netcraft (www.netcraft.com)
We all know Big Blue is spending a billion dollars on Linux because a visible hunk of that money is being spent on advertising and promotion.
Less obvious is how the Chinese government, representing more than 1.2 billion people, is expressing its own love of Linux by encouraging adoption of its own distribution: Red Flag Linux.
Red Flag was created in 1999 by the Academy of Science, which is headed by Jiang Mianheng, son of President Jiang Zemin, with financial assistance from the government-owned Shanghai NewMargin Venture Capital.
Red Flag's purpose is to prevent increased domination of the Chinese computer market by Microsoft's Windows operating systems. The best way to do that, as the Chinese government sees it, is to promulgate an already popular alternative with “full transparency in terms of underlying code”, as one commentator described it. They are doing this by encouraging state institutions and state-owned companies to adopt Red Flag Linux.
And that's just one strategy. Another is to avoid copyright infringement and “software piracy” issues by promoting use of software that avoids the issue. Another is by purchasing software from domestic companies that build on Linux rather than Windows.
According to Gartner, the Beijing municipal government gave contracts to six local vendors and rejected the seventh: Microsoft. One of the six was Red Flag.
Not surprisingly, Linux is now showing up in quantity on desktops, at least in retail stores.
On a recent trip to China, I noticed that many of the Intel-compatible PCs for sale in several major department stores had a slightly different appearance than usual, apart from the language differences. I looked closely and realized they were running GNU/Linux
writes Dan Gillmor of the San Jose Mercury News.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide