{"id":468,"date":"2003-11-11T00:00:00","date_gmt":"2003-11-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/11\/ibm-backs-desktop-linux\/"},"modified":"2021-12-30T11:37:24","modified_gmt":"2021-12-30T11:37:24","slug":"ibm-backs-desktop-linux","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/11\/ibm-backs-desktop-linux\/","title":{"rendered":"IBM Backs Desktop Linux"},"content":{"rendered":"<p>As RedHat moved away from the individual user to concentrate on Enterprise, IBM is throwing it&#8217;s weight behind  desktop Linux.  Until now, IBM has favoured Linux for use on servers, which are networked machines for data storage and processing that typically are run by technically proficient administrators.<\/p>\n<p>The company has avoided pushing Linux for desktop computers, where Microsoft is overwhelmingly dominant.  There&#8217;s an opportunity for desktop Linux in &#8220;running a fixed-function machine like a kiosk or ATM, a transactional workstation like a bank teller&#8217;s station, or a basic office workstation that runs applications that drive business processes,&#8221; the IBM agenda information said.<\/p>\n<p>More info: [url=http:\/\/news.zdnet.co.uk\/software\/linuxunix\/0,39020390,39117736,00.htm]http:\/\/news.zdnet.co.uk\/software\/linuxunix\/0,39020390,39117736,00.htm[\/url]<\/p>\n<p>RedHat is not totally abandoning it&#8217;s user with launch of the Fedora initiative.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As RedHat moved away from the individual user to concentrate on Enterprise, IBM is throwing it&#8217;s weight behind desktop Linux. Until now, IBM has favoured Linux for use on servers, which are networked machines for data storage and processing that typically are run by technically proficient administrators. The company has&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-468","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=468"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/468\/revisions"}],"predecessor-version":[{"id":2955,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/468\/revisions\/2955"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}