Everyone knows that Microsoft has a new anti-Linux strategy. Everyone knows it's based on promises of security.
Linux and Open Source
The latest news and views on all things Linux and open source by seasoned Unix and Linux user Steven J. Vaughan-Nichols.
Steven J. Vaughan-Nichols
Steven J. Vaughan-Nichols, aka sjvn, has been writing about technology and the business of technology since CP/M-80 was the cutting edge PC operating system. SJVN covers networking, Linux, open source, and operating systems.
Paula Rooney is a Boston-based writer who has followed the tech industry for more than two decades.
So why would Apple be talking to Intel? Assuming the conversation has been about primarysystem CPUs I can think of three possible reasons:
Two percent may not sound like much of a survival rate, but it comparesto the success rate of internally generated software ideas at companies like IBM or Microsoftthe way the Pentium IV does to the i80386.
Checking out Data Point, I found this Yankee Group release on heterogenous networks that states the obvious "Linux is here, Windows is not going away and heterogeneity is the order of the day." I'm glad we've finally established that.
Here is a question that lies beyond the normal Linux vs. Windows arguments we make here, but whose answer should concern even Linux users.
I'm a Mac user - we just double click and things work (of course)..
Contrary to the assumptions of many of us, a lot of people are going to find Microsoft's Eiger offer compelling. Eiger will be a version of Windows XP for "obsolete machines" -- obsolete in that they run operating systems Microsoft no longer supports.
Fundamentally most outsourcing contracts substitute tweedle dee for tweedle dumand it should be no surprise, therefore, when interchangeable people and technologiesproduce interchangeable disasters.
In his latest entry, Dana asks whether the Linux process is insecure, because it's not possible to warn the "vendor" before warning the general public about security flaws in Linux. He also notes that "Microsoft has theoretical control of this situation.
Time for me to play devil's advocate again.The Schneier Wave graph to the right may be the most famous diagram in computer security.