The State of Linux Adoption - Slide 10

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13
Next The State of Linux Adoption-10 Next

Interoperability and skills top the list.

Even coming out of a challenging year, Linux momentum continues to build. A new survey of 428 IT professionals from organizations with $500 million or more a year in revenues or over 500 employees, from The Linux Foundation, finds that a huge number of IT organizations plan to expand their use of Linux in 2012.

Obviously, a fair number of the participants taking this survey may be biased towards Linux. Nevertheless, the study clearly shows Linux gaining in use with new application workloads, including mission-critical applications, Big Data projects and virtual server environments.

More Slideshows:


Cloud Apps: The Seven Deadly Sins Applications are the heart and soul of winning new cloud business, securing recurring revenue, and ensuring customer satisfaction.

Twelve Virtualization Myths Debunked Global Knowledge takes on some of the most common myths about virtualization.

Fifteen Hot Android Apps for On-the-Go Business Execs Popular business and productivity apps for busy executives.

 

Related Topics : Android, Linux Distributions, Linux Kernel, Open Source Software Development, UNIX

 
More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.