BEST OF ECT NEWS

Keeping the Desktop Dream Alive: Q&A With Jim Zemlin, Part 1

This story was originally published on June 17, 2011, and is brought to you today as part of our Best of ECT News series.

In 2007, Linux was heralded as the desktop of the future. However, the history of Linux on the desktop has been a story of strong support from a relatively small group of diehards but little real impact on the market as a whole. And by last year, there was even talk that the dream of the Linux desktop had been shattered.

What happened, and where is Linux going? LinuxInsider sat down with Linux Foundation Executive Director Jim Zemlin for an exclusive interview to get to the bottom of things.

LinuxInsider: Why is Linux not doing so well on front-end desktops and on laptops? Lack of content? Fragmentation of the Linux platform? The poor quality of drivers?

Or could it be the lack of a hub of some sort to coordinate Linux content development — perhaps a large company such as Microsoft or Apple, or an organization such as the Linux Foundation?

Jim Zemlin:

Let’s look at what we think of as the traditional desktop PC. Clearly Windows has a momentum that’s powerful, and platform confusion tends to happen in slow-moving albeit very powerful waves, but tsunamis are rare, although they do occur. So that momentum that Microsoft has had for years on the desktop continues to benefit them.

Having said that, what’s not benefiting Microsoft … is that desktop computing is starting to become less relevant, and the definition of such is changing more towards what’s probably better characterized or called “client computing.”

The thing people used to care about, and the reason they chose Windows, was because there was a huge number of applications available for the platform, so they had the inertia of having lots of installed users and that led to lots of applications users could use.

What users care about now from the applications perspective is the Internet. Their data, applications and services are meant to be utilized online, and that’s changed the nature of what we think of as desktop computing.

I suspect there’s an entire generation that will accept their smartphone, car, tablet, maybe a traditional PC that looks at all of these devices collective as client computing because all of those modalities get them to what they truly care about, which is the data they have online, the information they may want to share with others, the music they want to stream.

That was most recently validated by Apple’s iCloud product and companies like Google, which has a search product and online mail and other services.

We’ve moved towards a services industry where the client that’s used to access services can be any one of a number of things.

Linux has become used in automobiles, smart connections, and has become the underpinning of a new form of computing. But clearly in the desktop space, Microsoft has hung on to its inertia, albeit that has been significantly encroached upon by Apple. In some sectors of technology, and in business computing where thin clients or specific desktops are needed, Linux has made its mark.

LIN: But the consumer is the key, and in that respect, Microsoft has the ground troops.

Zemlin:

Microsoft has made its money in two products, Windows and Microsoft Office. In terms of future operating systems, people aren’t betting on Windows. In fact, Microsoft stock hasn’t moved in over a decade, whereas competitors to Microsoft are moving up. I won’t dispute that Microsoft will continue making a massive amount of money off Windows and Office, but will it grow? The global community obviously doesn’t think so.

LIN: You can say that Microsoft has X share of the market and Apple has Y share, but when you say Linux has Z share of the market, you can’t point to any one company because there are so many. Linux is the underpinning of many desktop operating systems, and then there’s Android, but the market is very fragmented.

Zemlin:

That, I think, is an argument that perhaps Microsoft would have made a decade ago to criticize Linux in their traditional desktop market, but the reality is that today, computing is leaning towards a services model. We see that [fragmentation of the Linux market] as a strength — that Linux has multiple contenders.

The first thing you should know about Linux is that, at the kernel level, the component that manages the interfaces on the upper level software and the hardware in the operating system is not fragmented.

All operating systems based in Linux pull their primary code from the project hosted at the kernel.org website. This is where Linus Torvalds maintains and develops collectively the Linux kernel.

What you call fragmentation is that core kernel, which is a multibillion-dollar investment, and what people are doing is taking that and building products in the marketplace based on it, whether it’s Google Search, Android, Samsung TV, Facebook ,a music service or the New York Stock Exchange.

You could characterize all these things as fragmentation, but I’d characterize that as an efficient market — in other words, the market is solving the problems today.

What’s important is that Linux as an underpinning can help all these different computing efforts get to market faster and cheaper and, most importantly, allow firms creating these products and services to own their own destiny because no one else controls that destiny.

Also, the price of building a phone is significantly dependent on software development, which is very expensive; and the timeline is short, so Linux is a great way to save money and to make money, because if you own your own platform, you can create your own services and charge for those services and not be dependent on a third party.

LIN: Are there any attempts to move Linux forward?

Zemlin:

I’d like to consider a more subtle argument than “Linux is fragmented, Microsoft is not.” The reality is that most applications people care about are accessed today through Web browsers and/or are native apps that access service on the Internet, whether that’s streaming music or any other variety of service, so that makes the operating system less important.

As the operating system becomes less important, being the free alternative, in other words, the place where people can collectively develop to reduce cost and bring innovation to the market, is a much better place to be because people will launch their services on top of Linux, as it’s the quickest and most effective means to bring products to market.

2 Comments

  • Sure, tell all the gamers that play hard drive installed games that os doesn’t matter and what people want is acess to data in cloud.

    Even worse, mum only plays in browser, open java had problems, installed sun java but still there are some problems.

    Also, still there is a lack of applications. Having mobile computing I still prefer to do most of the tasks (related to word processing, photos, videos) offline on my desktop. So.don’lie to.yourself

  • As a retailer I can tell you why Linux isn’t gaining traction, and it isn’t the iShiny or the iTalky, its because the community won’t listen! I wrote an article here over 2 years ago by the title "What I need to help sell Linux" and not a single one of those things I pointed out exist yet! Not one!

    The community acts like the world is full of nerd and programmers, when reality is more like .03%, they act like Suzy the checkout girl is reading bash programming manuals in the tub or that grandma is working on their CS degree, but that ain’t reality.

    What are your competitors doing right that you are doing wrong? I can answer that, their products are easy, simple, all GUI, and "just work" which Linux isn’t even close. Try my "is it safe" test for yourself. download a distro from 3 years ago and upgrade/date it to current. this is less than half the average lifespan of a MSFT support cycle, yet when i try this simple test I end up with a broken OS. Broken drivers, screwed up settings, it just falls apart. I have WinXP boxes in the field that have been running since early 2002, that is three service packs and probably a couple of thousand patches and it ALL "just works". no broken drivers, no messed up settings, it just goes.

    finally the hardware situation is a mess. How does Suzy shop for a printer? USB wireless dongle? TV Tuner? What does she do? She plays hardware roulette and often loses the game, that’s what! Linux needs an online "Linux store" where ALL the hardware "just works" and has competitive prices, it needs a "Help Me!" button where a Linux Guru volunteer can take control of the system and fix problems, and it needs a hardware ABI so no matter what Linus twiddles with on the kernel or how many times you upgrade hardware NEVER fails!

    Do this and you WILL gain share. Me and all the mom&pop retailers are frankly begging for a Linux distro that will meet our customers needs. At $100 a pop windows eats up our profits and we are already getting pallet loads of XP desktop and laptops coming off lease that will never be cost effective to upgrade to Windows 7. Give us a product that will do what we need it to do and we will be HAPPY to be your support system, imagine how easy it would be for Linux users if every small shop in the land carried and supported Linux. But you haven’t listened to us and in its current form your software just doesn’t work for us. Help us and we will help you. Stay on the current path and don’t be surprised if Apple and MSFT continue to dominate the planet.

Leave a Comment

Please sign in to post or reply to a comment. New users create a free account.

E-Commerce Times Channels

BEST OF ECT NEWS

The Cybersecurity Outlook for 2021 and Beyond

Cyberattacks in the first half of 2021 have escalated globally to affect virtually every industry. Earlier this year TechNewsWorld spoke with cybersecurity experts about the expanding threat landscape, imminent threats, and what can be done to counter the ongoing offensives against the IT systems of companies, organizations, and government agencies.

This story was originally published on Feb. 16, 2021. As a result of its popularity, it is brought to you today as part of our Best of ECT News series.

Some cybersecurity experts agree with a report by Cybersecurity Ventures and expect financial damages from cybercrime to reach $6 trillion by the end of this year. Industry studies show that cyberattacks are among the fastest-growing crimes in the United States.

Cyberattacks are absolutely on the rise. Based on everything we know and every single analyst we have spoken with, there is no doubt that attacks are increasing, according to Robert McKay, senior vice president, risk solutions at Neustar.

“Cybersecurity experts predict that in 2021 there will be a cyberattack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016),” he told TechNewsWorld.

The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses in order to better protect their computer networks from intrusions. Cyberattacks not only are increasing in frequency, but they are costing victims larger financial losses.

The Growing Price of Cyber Risk

Worldwide, cybercrime cost businesses, government agencies, and consumers in general more than $1 trillion in 2020, according to the data analyzed by researchers at Atlas VPN. That is around one percent of the global GDP.

While $945 billion was lost to cyber incidents, $145 billion was spent on cybersecurity. Those costs increased by more than 50 percent compared to 2018, when over $600 billion was spent to handle cybercrime.

But twenty percent of organizations worldwide have no plans on how to protect against cybercrime events, according to the Atlas VPN report. That leaves a gaping hole in networks for cybercriminals to extend their attack strategies to steal even millions of dollars more.

The only sure defense, warn cybersecurity experts, is to step up efforts to pass legislation that bolsters technological defenses. That may be the only way to alter the course of ongoing cyberattacks.

Despite all the efforts into protecting systems and data, cloud breaches are likely to increase in both velocity and scale, said John Kinsella, chief architect at Accurics about his company’s 2020 summer research report on the State of DevSecOps.

“This [analysis] comes as cloud breaches have been rampant over the last two years. More than 30 billion records have been exposed as a result of cloud infrastructure misconfigurations,” he told TechNewsWorld.

In order to keep pace with an evolving economy that requires more digital transformation, organizations must place cyber resilience and the practice of DevSecOps at the top of their priority list, he added.

Not Just in the Clouds

Much more results in the growing pace of cyberattacks than rampant migration to cloud storage and misconfigured cloud infrastructure. Still, misconfigurations in cloud infrastructure lead to data exposure and are among the biggest concerns for cyberthreats facing business and government agencies today, noted Kinsella.

Nearly 98 percent of all cyberattacks rely on some form of social engineering to deliver a payload such as malware or ransomware. One of the most successful attack formats cybercriminals use regularly to initiate a social engineering attack is through phishing emails. Therefore, threat actors distribute malware via email approximately 92 percent of the time.

Cloud use and the continued stampede to cloud services is not going away. That ongoing shift in computing practices must be managed with more vigilance.

COVID has accelerated organizations’ digital transformation. Therefore, the ability to set up workloads in the cloud and get them through compliance and security challenges is in demand, noted Mohit Tiwari, co-founder and CEO at Symmetry Systems.

“Part of the reason is that the workloads that had resisted moving to the cloud were exactly the highly regulated ones, and the forced move out of on-site data centers managed by IT staff is driving up demand for cloud-based compliance and security skills,” he told TechNewsWorld.

Thus, cloud-based security techniques will be vital in the fight to curtail the worsening cybersecurity landscape. These include learning to work with cloud-native identity and access management (IAM), he noted.

“Those looking after cloud-based security need to broadly learn to manage infrastructure through structured programs, instead of shell scripts pieced together. As networks and application tiers become ephemeral, the most important persistent asset for any enterprise will likely be their own and their customers’ data. So data-security on the cloud will be a major theme going forward,” he cautioned.

Providing Cloud Cover

The world pandemic has hastened the cyber intrusions. So has complacency and poor training among office workers and inadequate IT surveillance.

Organizations need to consider a balanced approach to training their employees and investing in automation tools to minimize the risks of cyberattacks, offeredBrendan O’Connor, CEO and co-founder at AppOmni. Extensive training and around-the-clock manual monitoring are not necessary when the right automation tools can complement the IT staff as they build up their skill set.

“IT workers specializing in security need to shift their focus to supporting the new model of business many enterprises are adopting. Some enterprises are shifting their business model to focus on virtual workforce, de-emphasizing the need to secure office networks,” O’Connor told TechNewsWorld.

In other cases, offices are being eliminated altogether. IT workers need to change their focus from traditional network security of a campus/office to application security of the work-anywhere model, he continued.

“With the employee location and devices under constant flux, organizations will rely on the consistency and security of cloud service applications. IT workers should look to the management and security of these SaaS (software as service) applications as the new skills and technology to embrace,” O’Connor said.

Looming Threats

Over the next year, ransomware will continue to be the biggest threat and financial risk to enterprises, observed Joseph Carson, chief security scientist and advisory CISO at Thycotic. Most organizations should be very concerned about ransomware as the biggest cybersecurity challenge and threat, he advised.

“Organizations should prioritize to invest in security solutions that help reduce the risks and also plan and test an incident response plan to help ensure the business is resilient to high-risk attacks,” he told TechNewsWorld.

Ransomware continues to evolve into more than just a security incident. Cybercriminals now seek data breaches with organized cybercrime groups to steal the data before they encrypt on corporate servers. Companies are not just worried about getting their data back but also who it gets shared with publicly.

Cybercriminals use ransomware to target anyone, any company, and any government including hospitals and transportation industries at a time when they are under extreme pressure, Carson added.

Another major cybersecurity attack trend focuses on the protective tools and security vendors within the industry, noted Brandon Hoffman, chief information security officer at Netenrich. The tools that the industry relies on and their providers are becoming more targets for attacks.

“It is a big concern because practitioners need tools they can depend on for detection and defense. By crippling or repurposing the very tools meant to thwart these attempts, the adversaries stand to gain a complete upper hand in the ongoing battle to combat cyber threats,” Hoffman told TechNewsWorld.

“The attacks targeting security organizations and vendors were always high up on the adversary list, but success begets further success.”

Fighting the Battle

The trust factor is an internal battle of sorts between security vendors and the corporations hiring them for cyber protection. That trust must be constantly reassessed, suggested Tim Wade, technical director of the CTO Team at Vectra AI.

“Strategically, security practitioners must continue to pivot away from preventative-based security architecture into resilience-based security architecture,” Wade told TechNewsWorld.

That is where the focus shifts to accepting the reality that things will go wrong, but when they do, the impact is minimized through rapid detection, response, and recovery, he added. Vendors and suppliers have always been lucrative targets for adversaries.

Many of the cyberattackers belong to organized criminal gangs that are sanctioned by foreign nations. The best defense such adversaries is acknowledging that you cannot stop them. But then focus on making their lives as difficult as possible, Wade said.

Cybersecurity Higher Education

One of the often unspoken ways of safeguarding against cybersecurity assaults is through education. This approach goes beyond teaching company workers to be better aware of safe computing ideals. Rather, recruiting the next crop of computer specialists to pursue a degree in cybersecurity.

Cybersecurity prospers because so many professionals come from different backgrounds and skill sets, noted Heather Paunet, senior vice president at Untangle.

“Groups who are traditionally marginalized in other industries, when pivoting or starting a career in cybersecurity, can benefit from multiple industry-leading organizations offering certification programs,” she told TechNewsWorld.

The emerging field of cybersecurity is a very viable career path, noted Michael Kaczmarek, vice president of product management at Neustar. Industry reports show that the number of unfilled cybersecurity jobs is expected to grow by 35 percent.

“Given the increases in attacks and the changes in tactics used by bad actors and organizations, cybersecurity will most certainly be a career choice that will see net employment for the long term,” he told TechNewsWorld.

The demand for cybersecurity jobs has certainly increased in the past year, agreed Dov Lerner, security research lead at Cybersixgill. A career path in the field is a great choice for someone interested in IT and security.

“An increase in the number of tools utilized increases security operations and analytics complexity and requires an increase in personnel. However, according to a recent ESG survey, nearly 70 percent of security teams say it is difficult to recruit and hire additional SOC (security operations center) staff,” Lerner told TechNewsWorld.

Security analysts have the opportunity to impact more than just their specific industry. Cybersecurity reaches into the world of politics, economics, and other sectors of the world. While breaking into the field can be challenging, it is incredibly rewarding, he concluded.

Jack M. Germain has been an ECT News Network reporter since 2003. His main areas of focus are enterprise IT, Linux and open-source technologies. He is an esteemed reviewer of Linux distros and other open-source software. In addition, Jack extensively covers business technology and privacy issues, as well as developments in e-commerce and consumer electronics. Email Jack.

Leave a Comment

Please sign in to post or reply to a comment. New users create a free account.

Related Stories