Linux in Government: Linux Desktop Reviews, Part 2 - Novell Linux Desktop
When you look into the Novell Linux Desktop (NLD), you find a product that fits an analyst's picture of a mature open-source model. Last week, we asked some hard questions about that model with regards to Xandros and were left wondering. When you ask the same questions of Novell, the answers come out positive:
What kind of support organization does Novell offer related to users? If you run into a problem, can you contact someone for help? How, over the phone or by e-mail?
How big is Novell's support organization? Does the company out-source its support?
Does Novell have a professional services organization? If someone wants to buy a large number of desktops, how would Novell handle a big order?
Novell offers documentation for the user. How about technical documentation, is there anything for the administrator?
What kind of solution/provider ecosystem exists? Does Novell have resellers? How robust is that reseller organization?
What is Novell's server strategy? Does the company provide back-office functionality and identity management?
What tools exist for rolling out and managing the desktops? Does the company offer on-site training?
How can administrators and help-desk people learn to provide desk-side support in their own companies? Does curriculum exist?
In the event you have little experience with Novell, you should find that the company covers all the bases, from top to bottom. From the desktop point of view, we are left to wonder who has an open-source model that approaches Novell? A quick visit to the Novell Web site leads to a case study of Jefferson County that answers many of the above questions for you.
Novell has a long history of providing support, training, back-office functionality, innovation in managing desktops and networks and a significant partner ecosystem. Since the company embraced the open-source model with the purchase of SUSE and Ximian, it has transformed the open-source model into one of maturity.
In sum, the Novell Linux Desktop represents the product the company has chosen for its own use. In an article in Computer Business Review Online, we learn that "Novell has entered phase two of its Open Desktop Initiative to roll out Linux as the desktop operating system for its 6,000 internal employees, with plans to get 100% of them using Linux by the end of May."
In the same article, we learn:
The Waltham, Massachusetts-based software vendor's Linux desktop migration began in 2004 and overachieved on its phase-one goals, (according to CIO Debra Anderson.)
"This year we're moving more aggressively," Anderson said. "We want to get 100% of Novell on a Linux desktop, including dual-boot, and the second part is to drive a single Linux image and have 80% by the end of the year turn off Windows."
The company has already made the open source OpenOffice.org productivity suite its default office suite ahead of schedule, and now has 83% of employees actively using it on a daily basis. A voluntary migration also saw the company beat its goal to get 50% of users onto Linux by the end of October 2004.
Under the Novell scenario, Microsoft becomes a small niche player in the desktop space. Looking at functionality and feature lists, most serious analysts actually would place Microsoft in such a niche role. When less than 10% of an enterprise uses the features included in a Microsoft desktop, why would the remaining 90% be required to use the same platform?
I wrote my first review on NLD9 on November 15, 2004, shortly after the release of the evaluation version became available on Novell's Web site. Our group then began to pilot the product, using it in comparison to another Linux desktop offering that was built similarly. In short, we lived with NLD for approximately five months, and we found NLD to be suitable for desktop use in the home as well as in the office.
Of the desktop offerings we have piloted, NLD offered the broadest range of functionality in what we designated as the desktop and mobility space. From the desktop point of view, the system provides a user-friendly environment, ease of administration and an excellent enhancement of the OpenOffice.org productivity suite.
We also found NLD to provide a superior laptop experience. For example, Novell calls one of its premiere laptop features netapplet. For mobile users, netapplet allows for rapid transfer from numerous wireless access points, a feature that compelled one of my colleagues to stay with NLD on his IBM Thinkpad. In addition, we found that we could utilize VoIP with Skype on NLD effectively. We utilized the Linux SUSE9 download and immediately began reaping benefits on our Internet phones.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide