Linux on the desktop is so hot there's now a fight over it

Citrix joins VMware in virtual penguin desktop ploy


Citrix has made good on its April promise to deliver virtual Linux desktops, today announcing it's ready to roll out penguin-powered pretend PCs.

The company snuck the penguin-powered desktops into Feature Pack 2 for XenApp and XenDesktop 7.6. For now, Citrix says says you can choose from Red Hat Enterprise Linux 6.6 Workstation and Server, or SUSE Linux Enterprise Desktop and Server 11 Service Pack 3, the two distros the company says its customers have asked for the most.

Citrix is pitching virtual Linux desktops at a couple of markets, one of which is users of Windows apps. It's just as easy to pipe a Windows app into Citrix Receiver on Linux as it is Citrix Receiver on any other operating system. Users of “2D applications ranging from mission critical research and development environments for chip-design, high performance computing projects, financial and scientific modeling, big data analysis and engineering tools” are also welcome. Citrix also knows that vertical market customers who’ve invested in Linux apps, “particularly in oil and gas, manufacturing, digital media and entertainment industries,” are keen on Linux desktops.

VMware, which released its own virtual Linux desktops in June is going after similar markets, claiming its also fit for 3D duties.

Beyond the fact that Citrix and VMware have found virtual Linux represents a new battlefield, we now have two big enterprise IT concerns backing Linux desktops. Might that make 2016 the fabled Year of Linux On The Desktop?

Probably not, because desktop virtualisation remains a niche. But the pair's activities may well give penguinistas hope!

Citrix mouse is a hit


Other stories you might like

  • Failed gambler? How about an algorithm that predicts the future
    Hopefully an end to '... and you'll never guess what happened next!'

    Something for the Weekend Another coffee, please. Yes, I know we're about to start. There is always time for one more coffee. It's good for your brain. Thanks.

    Could you hold my cup for a moment? I need to visit the restroom. Yes, I know we're about to start; you told me that already. There is always time for coffee AND a comfort break. Yes, I know the two are related but I don't have time to chat about it. I'm bursting here.

    How about I drink the coffee straight away, nip to the WC, and return pronto? Slurp argh that's hot. Thanks, I'll be right back.

    Continue reading
  • Seriously, you do not want to make that cable your earth
    Network? What's that when it's at home?

    On Call This week we bring you a shocking incident for a Register reader who was party to an electrical engineer's earthly delights.

    "Andrew" takes us back to the 1980s, the days of DECNet, DEC Rainbow PCs, and the inevitable VAX or two.

    Back then, DECnet was a big noise in networking. Originally conceived in the 1970s to connect PDP-11 minis, it had evolved over the years and was having its time in the sun before alternative networking technologies took over.

    Continue reading
  • Protecting data now as the quantum era approaches
    Startup QuSecure is the latest vendor to jump into the field with its as-a-service offering

    Analysis Startup QuSecure will this week introduce a service aimed at addressing how to safeguard cybersecurity once quantum computing renders current public key encryption technologies vulnerable.

    It's unclear when quantum computers will easily crack classical crypto – estimates range from three to five years to never – but conventional wisdom is that now's the time to start preparing to ensure data remains encrypted.

    A growing list of established vendors like IBM and Google and smaller startups – Quantum Xchange and Quantinuum, among others – have worked on this for several years. QuSecure, which is launching this week after three years in stealth mode, will offer a fully managed service approach with QuProtect, which is designed to not only secure data now against conventional threats but also against future attacks from nation-states and bad actors leveraging quantum systems.

    Continue reading

Biting the hand that feeds IT © 1998–2022