A bright future for Linux in Australia: IDC
- 27 February, 2013 13:52
“Linux is here in the prime time,” according to IDC Australia research director Matt Oostveen. The analyst, speaking at the Sydney leg of SuseConf Australia, said that the operating system is “accelerating in the Australian marketplace”.
“In 2011 I was predicting that one in every five servers shipped in the Australian marketplace would be a Linux server and this was a fairly provocative prediction,” Oostveen said.
“There were some -- I won’t mention names – Seattle-based software companies that were arguing this fact and didn’t believe this was going to be happening. And I will tell you, it happened and it happened much sooner than I expected. It happened in June of 2011. My forecasting said it was going to happen in August or September.
“A really strong amount of Linux uptake occurred in a very short period. So one in four servers shipped in the Aussie marketplace now is a Linux server.”
Oostveen said that by looking at Linux server shipments as a portion of revenue, it was clear that the ASV – average selling value – of Linux servers was above the market average. “And what of course I can extrapolate from that is that Linux is running more enterprise mission-critical and business-critical workloads than [its] Windows counterparts,” the analyst said.
As data centres move towards housing dense racks of servers powered by smartphone-style low-power, low-voltage processors – so-called “skinless servers” -- to run cloud infrastructure, IDC believes that in many cases Linux will be tapped to run them.
“The other thing we’re going to need if we’re going to have skinny servers is have a very skinny, nimble operating system,” Oostveen said. “And we believe at IDC that Linux is going to be the operating system of choice when we start building out these new infrastructures.”
In the more immediate term, Linux is benefitting as IT departments embark on migration efforts in an attempt to be rid of legacy applications and platforms. Linux is the least likely operating system to be migrated away from. By way of contrast, IDC has seen more organisations ditching Unix in favour of Linux.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
Messaging and collaboration platforms have emerged as mission critical applications, consuming a large portion of IT spending for organisations. The rich features in these applications have significantly changed the messaging requirements and needs of today’s information from anywhere with any device, the result is an ever increasing demand on storage systems both in terms of capacity and bandwidth. Many organisations are rethinking their storage strategies to meet the demanding criteria and to handle the future requirements. Read more.
The Big Data Security Analytics Era is Here
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.