Linux ecosystem spins around Red Hat

Silly name, serious company

Open...and Shut By Silicon Valley standards, Red Hat is a loser. It doesn't have an app store (though it once tried to create one). Its chief executive isn't a fresh-faced kid (though Jim Whitehurst doesn't look much older than 20). And its headquarters isn't in San Francisco or Silicon Valley, but rather in the comparative backwoods of North Carolina.

Yes, Red Hat does have a somewhat silly name, but it hardly compares to goofy names that pass for creative genius in the Valley.

And yet Red Hat is very cool with three sets of people that matter a great deal - customers, partners, and investors - and its growth suggests that the company could well become the defining technology company of the 21st Century. Just like its former CEO, Matthew Szulik, always said it could be.

Why? Because Red Hat is building a gravitational force that investors, customers, and partners can't easily ignore.

Quarter after quarter, Red Hat delivers exceptional results. Not just good, but consistently great. This despite free food or deep-tissue massages in its break rooms. As The 451 Group analyst Matthew Aslett suggests, it's questionable that "any other [open source] vendors will achieve or better the scale achieved by Red Hat."

This is why investors are paying a premium on Red Hat's stock with one of the highest price-to-forward-sales ratios in the software industry.

It's also why customers collectively shell out hundreds of millions of dollars each year for Red Hat products, despite the fact that they may actually be paying a premium for Red Hat's open-source goodness.

A big part of this is the pull of Red Hat's money machine to a widening array of third-party developers. Red Hat has become the central unifying agent for the broad Linux ecosystem, with Novell's SUSE in sharp decline and Canonical's Ubuntu still catching up.

Over time, the centripetal force around Red Hat should cement its ability to make ever larger mountains of money, a principle Dan Woods captures on his Forbes blog:

The theory of enterprise software is that it is cheaper to buy an off-the-shelf solution and configure it to your needs instead of building exactly what you need from scratch. Some companies are great at using off-the-shelf products and others waste a lot of money. But for most companies, the trade-off works. It is cheaper to buy and configure than to build.

What is less widely known, is that the range of processes covered by standard software is modest. [S]tandard software covers about 20 percent of the processes in any given business....An IDC report I once read estimated that 33 per cent of the revenues of the enterprise software industry went to the big players and the rest, 67 per cent, went to the huge collection of smaller companies that developed software for specialized industries and functions.

In other words, there is a persistent long tail opportunity in business software. The big products solve the most common problems but 80 per cent of the processes and 67 per cent of the revenue go to niche players.

The big players realize this and seek to encourage developers to fill those niches based on their development platforms.

Some of these big players are better at the developer-attraction game than others. Microsoft mastered this game long ago, while and VMware are increasingly adept at rallying developers around their flags.

And then there's Red Hat, king of the Linux and open-source crowd. It's also sitting at a fortuitous moment in software history, when the industry is shifting to the cloud, which is essentially an open-source phenomenon in terms of its composition.

In fact, Red Hat has become so essential to enterprise infrastructure, that even competitors like Salesforce build on Red Hat technologies.

Red Hat Salesforce screen shot's cloud powered by Red Hat's Linux

Yet, Red Hat has its challenges. Despite Dan Woods' declaration of the importance of the "long tail opportunity in business software," Red Hat has never proved particularly good at embracing this group, preferring instead to focus on its biggest partners (IBM, Oracle, HP, Dell, SAP and others).

Red Hat, of course, has always had a laser-like focus on tight operations and near-term revenue opportunities, which makes it hard for the company to dabble in the second and third tiers of the software community - its RHX program perhaps demonstrating this most poignantly.

Also, though Red Hat dominates the Linux field, it's not much of a rendezvous point for open-source businesses or developers, generally. It's telling that the big buyers of open-source companies have been VMware, Salesforce, and Oracle.

And it's also problematic for Red Hat that many enterprise developers are moving to non-paid Linux distributions like CentOS and Ubuntu.

This wouldn't be a big deal except for the fact that some of these companies - like SpringSource, acquired by VMware - have million-strong developer communities, communities somewhat shielded from Red Hat's pull by the demands of the new owner.

Going forward, Red Hat may become more acquisitive as it seeks to offer a full product portfolio to satisfy developers and the enterprises for which they work, which Red Hat CEO Jim Whitehurst pointed out in the company's most recent earnings call:

[M]ost companies are looking to standardize on one or at most two vendors for their middleware needs and therefore, we believe that it's important to have that full portfolio, certainly anchored by the application server that's something that's relatively ubiquitous that you need to have. So I do think it's necessary to have that full portfolio, when company's look for who they are going to partner with in their core application infrastructure. So, we think it's important to have those in various pieces. We continue to release new version and add to our product portfolio there. So, it's still really primarily the other full-line Oracle and IBM as our key competitors.

Whitehurst was referring to the company's JBoss business, but the same is true of its cloud portfolio, recently augmented by the Makara acquisition.

No, Red Hat is not without its faults, and remains vulnerable to competitors with deeper pockets and strong developer communities. But as the primary open source game in town, with a growing gravitational pull, Red Hat looks increasingly tough to beat. ®

Matt Asay is senior vice president of business development at Strobe, a startup that offers an open source framework for building mobile apps. He was formerly chief operating officer of Ubuntu commercial operation Canonical. With more than a decade spent in open source, Asay served as Alfreso's general manager for the Americas and vice president of business development, and he helped put Novell on its open-source track. Asay is an emeritus board member of the Open Source Initiative (OSI). His column, Open...and Shut, appears twice a week on The Register.

Other stories you might like

  • Demand for PC and smartphone chips drops 'like a rock' says CEO of China’s top chipmaker
    Markets outside China are doing better, but at home vendors have huge component stockpiles

    Demand for chips needed to make smartphones and PCs has dropped "like a rock" – but mostly in China, according to Zhao Haijun, the CEO of China's largest chipmaker Semiconductor Manufacturing International Corporation (SMIC).

    Speaking on the company's Q1 2022 earnings call last Friday, Zhao said smartphone makers currently have five months inventory to hand, so are working through that stockpile before ordering new product. Sales of PCs, consumer electronics and appliances are also in trouble, the CEO said, leaving some markets oversupplied with product for now. But unmet demand remains for silicon used for Wi-Fi 6, power conversion, green energy products, and analog-to-digital conversion.

    Zhao partly attributed sales slumps to the Ukraine war which has made the Russian market off limits to many vendors and effectively taken Ukraine's 44 million citizens out of the global market for non-essential purchases.

    Continue reading
  • Colocation consolidation: Analysts look at what's driving the feeding frenzy
    Sometimes a half-sized shipping container at the base of a cell tower is all you need

    Analysis Colocation facilities aren't just a place to drop a couple of servers anymore. Many are quickly becoming full-fledged infrastructure-as-a-service providers as they embrace new consumption-based models and place a stronger emphasis on networking and edge connectivity.

    But supporting the growing menagerie of value-added services takes a substantial footprint and an even larger customer base, a dynamic that's driven a wave of consolidation throughout the industry, analysts from Forrester Research and Gartner told The Register.

    "You can only provide those value-added services if you're big enough," Forrester research director Glenn O'Donnell said.

    Continue reading
  • D-Wave deploys first US-based Advantage quantum system
    For those that want to keep their data in the homeland

    Quantum computing outfit D-Wave Systems has announced availability of an Advantage quantum computer accessible via the cloud but physically located in the US, a key move for selling quantum services to American customers.

    D-Wave reported that the newly deployed system is the first of its Advantage line of quantum computers available via its Leap quantum cloud service that is physically located in the US, rather than operating out of D-Wave’s facilities in British Columbia.

    The new system is based at the University of Southern California, as part of the USC-Lockheed Martin Quantum Computing Center hosted at USC’s Information Sciences Institute, a factor that may encourage US organizations interested in evaluating quantum computing that are likely to want the assurance of accessing facilities based in the same country.

    Continue reading
  • Bosses using AI to hire candidates risk discriminating against disabled applicants
    US publishes technical guide to help organizations avoid violating Americans with Disabilities Act

    The Biden administration and Department of Justice have warned employers using AI software for recruitment purposes to take extra steps to support disabled job applicants or they risk violating the Americans with Disabilities Act (ADA).

    Under the ADA, employers must provide adequate accommodations to all qualified disabled job seekers so they can fairly take part in the application process. But the increasing rollout of machine learning algorithms by companies in their hiring processes opens new possibilities that can disadvantage candidates with disabilities. 

    The Equal Employment Opportunity Commission (EEOC) and the DoJ published a new document this week, providing technical guidance to ensure companies don't violate ADA when using AI technology for recruitment purposes.

    Continue reading
  • How ICE became a $2.8b domestic surveillance agency
    Your US tax dollars at work

    The US Immigration and Customs Enforcement (ICE) agency has spent about $2.8 billion over the past 14 years on a massive surveillance "dragnet" that uses big data and facial-recognition technology to secretly spy on most Americans, according to a report from Georgetown Law's Center on Privacy and Technology.

    The research took two years and included "hundreds" of Freedom of Information Act requests, along with reviews of ICE's contracting and procurement records. It details how ICE surveillance spending jumped from about $71 million annually in 2008 to about $388 million per year as of 2021. The network it has purchased with this $2.8 billion means that "ICE now operates as a domestic surveillance agency" and its methods cross "legal and ethical lines," the report concludes.

    ICE did not respond to The Register's request for comment.

    Continue reading
  • Fully automated AI networks less than 5 years away, reckons Juniper CEO
    You robot kids, get off my LAN

    AI will completely automate the network within five years, Juniper CEO Rami Rahim boasted during the company’s Global Summit this week.

    “I truly believe that just as there is this need today for a self-driving automobile, the future is around a self-driving network where humans literally have to do nothing,” he said. “It's probably weird for people to hear the CEO of a networking company say that… but that's exactly what we should be wishing for.”

    Rahim believes AI-driven automation is the latest phase in computer networking’s evolution, which began with the rise of TCP/IP and the internet, was accelerated by faster and more efficient silicon, and then made manageable by advances in software.

    Continue reading
  • Pictured: Sagittarius A*, the supermassive black hole at the center of the Milky Way
    We speak to scientists involved in historic first snap – and no, this isn't the M87*

    Astronomers have captured a clear image of the gigantic supermassive black hole at the center of our galaxy for the first time.

    Sagittarius A*, or Sgr A* for short, is 27,000 light-years from Earth. Scientists knew for a while there was a mysterious object in the constellation of Sagittarius emitting strong radio waves, though it wasn't really discovered until the 1970s. Although astronomers managed to characterize some of the object's properties, experts weren't quite sure what exactly they were looking at.

    Years later, in 2020, the Nobel Prize in physics was awarded to a pair of scientists, who mathematically proved the object must be a supermassive black hole. Now, their work has been experimentally verified in the form of the first-ever snap of Sgr A*, captured by more than 300 researchers working across 80 institutions in the Event Horizon Telescope Collaboration. 

    Continue reading
  • Shopping for malware: $260 gets you a password stealer. $90 for a crypto-miner...
    We take a look at low, low subscription prices – not that we want to give anyone any ideas

    A Tor-hidden website dubbed the Eternity Project is offering a toolkit of malware, including ransomware, worms, and – coming soon – distributed denial-of-service programs, at low prices.

    According to researchers at cyber-intelligence outfit Cyble, the Eternity site's operators also have a channel on Telegram, where they provide videos detailing features and functions of the Windows malware. Once bought, it's up to the buyer how victims' computers are infected; we'll leave that to your imagination.

    The Telegram channel has about 500 subscribers, Team Cyble documented this week. Once someone decides to purchase of one or more of Eternity's malware components, they have the option to customize the final binary executable for whatever crimes they want to commit.

    Continue reading

Biting the hand that feeds IT © 1998–2022