Linux in Government: Linux Desktop Reviews, Part 3 - Red Hat Enterprise Linux
In addition to authentication in Microsoft networks, the RHEL desktop easily can browse and share folders with SMB/CIFS clients, such as Windows NT/2000/XP. Figure 5 illustrates a small workgroup as seen from the desktop's network browser window.
As a footnote, Linux desktops represent two of the desktops in this workgroup.
The RHEL desktop also provides support for the Windows Terminal Server and Citrix. In addition, you can run Win32 applications from an individual PC. For example, we installed several Windows applications during our pilot. Figure 6 shows us installing a Win32 application using CrossOver Office.
In Figure 7, we installed a popular Windows application using CrossOver Office.
CIOs may want to begin rethinking their options when it comes to deploying desktops now and in the future. Although some say that Linux isn't ready for the desktop, you might discover that it's ready for your organization. You can maintain your current infrastructure and provide seamless integration. In the meantime, you can provide your users with outstanding applications, including productivity suites, groupware, Web browsers, graphics and multimedia. If you still need Windows in some areas, then use it where it's needed. Meanwhile, you can cut costs and provide a safer environment for your enterprise.
Tom Adelstein works as a Distinguished Analyst and open-source software consultant with Hiser+Adelstein, headquartered in New York City. He's the co-author of the book Exploring the JDS Linux Desktop and author of an upcoming book on Linux system administration, to be published by O'Reilly and Associates. Tom has been consulting and writing articles and books about Linux since early 1999.
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
- The True Internet of Things
- Using tshark to Watch and Inspect Network Traffic
- September 2015 Issue of Linux Journal: HOW-TOs
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Firefox Security Exploit Targets Linux Users and Web Developers
- Concerning Containers' Connections: on Docker Networking
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects
- My Network Go-Bag
- Build a “Virtual SuperComputer” with Process Virtualization