Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:27 PM
Connect Directly

Red Hat CEO On Recession, Virtualization, Ballmer

Jim Whitehurst says his firm has encountered a "perfect storm" of conditions furthering its growth in recession.

Whitehurst is hoping a similar story will emerge with Red Hat's backing of KVM as the open source hypervisor of choice. He sees Red Hat competing with VMware to virtualize the enterprise. KVM was produced by the Israeli firm, Qumranet, which Red Hat acquired in September 2008. KVM is the hypervisor that has been built into the Linux kernel and was made part of the RHEL 5.4 release in early September. Red Hat also supports use of the open source Xen hypervisor.

KVM embedded in the Linux kernel uses the kernel's scheduler and memory manager, unlike standalone hypervisors. That gives RHEL a performance advantage when used as a host for virtual machines.

Whitehurst thinks that within a few years customers will want virtualization to be a part of the operating system, not a separate layer of software. That stance, he admitted, brings him closer to Microsoft's position than most other vendors. "Twenty years ago, people bought a separate TCP/IP stack for networking. Now it's just part of the operating system. Virtualization will be the same thing," he said.

With KVM in the RHEL 5.4, customers have "better performance and better hardware enablement" for starting up fresh virtual machine servers. KVM has already emerged "with better traction among open source developers" than Xen, he added.

Whitehurst travels to Silicon Valley often from his Raleigh, N.C., headquarters in order to talk to fellow open source code company executives, venture capitalists, and the press. He hosts a dinner for his fellow CEOs on each visit and collects an update on the status of open source affairs.

Red Hat was successful under his predecessor, Matthew Szulik, who brought a maturity to the young company's operations. But it was also more isolated. Whitehurst is ensuring that the major open source players share ties that would allow them to rally to one another's cause, if the occasion ever demanded.

Whitehurst considers the possibility unlikely. In some ways he seems to find dealing with Microsoft, which has expressed open hostility to open source code in the past, easier than with Oracle, a company that owns two open source code companies and is trying to acquire a third, MySQL AB, as part of Sun Microsystems.

2 of 3
Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-19
Clustered Data ONTAP versions prior to 9.3P20 and 9.5 are susceptible to a vulnerability which could allow an authenticated but unauthorized attacker to overwrite arbitrary data when VMware vStorage support is enabled.
PUBLISHED: 2021-01-19
A flaw was found in jackson-databind before FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
PUBLISHED: 2021-01-19
SOOIL Developments CoLtd DiabecareRS, AnyDana-i ,AnyDana-A, communication protocol of the insulin pump & AnyDana-i,AnyDana-A mobile apps doesnt use adequate measures to protect encryption keys in transit which allows unauthenticated physically proximate attacker to sniff keys via (BLE).
PUBLISHED: 2021-01-19
SOOIL Developments CoLtd DiabecareRS, AnyDana-i, AnyDana-A, The communication protocol of the insulin pump and AnyDana-i,AnyDana-A mobile apps doesn't use adequate measures to authenticate the pump before exchanging keys, which allows unauthenticated, physically proximate attackers to eavesdrop the ...
PUBLISHED: 2021-01-19
SOOIL Developments Co Ltd DiabecareRS,AnyDana-i & AnyDana-A, the communication protocol of the insulin pump and its AnyDana-i & AnyDana-A mobile apps doesn't use adequate measures to authenticate the communicating entities before exchanging keys, which allows unauthenticated, physically prox...