Feeds

Intel, Netscape buy stakes in Red Hat Linux

Don't you think they're all plotting something?

  • alert
  • submit to reddit

High performance access to file storage

Intel, Netscape and two venture capital companies have taken minority stakes in Linux distribution company Red Hat Software. The presence of two VCs circling doesn't mean a lot, while Netscape already supports Linux, so we're not necessarily talking major breakthroughs here - but the presence of Intel, and the presence of Netscape and Intel - that's important. Intel can play down the significance of its investment if it wishes to, because the company has a long track record of seeding money into start-ups and small outfits with good ideas. Some of these investments might even be entirely philanthropic. But before it announced the Red Hat deal it made it absolutely clear that it saw Linux as a strategic platform, and that it was going to put it together with Intel hardware to make it a standard, commodity platform (Earlier story) That won't play well with Microsoft. Meanwhile, Netscape's interest in Red Hat may have a lot to do with the venue. The announcement was made at ISPCON in San Jose, where Netscape will have been working hard to get ISPs to adopt or stick with its software as their platform. And as right now everybody thinks Linux is the happening OS, well, Netscape software on Intel is clearly something worth pitching to the ISPs. But with Intel trying to figure out how to reduce its dependency on Microsoft, and scoping Linux as a possible escape route, Netscape may actually have run into a couple of companies that it has quite a few things in common with. And could you seriously believe that Intel and Netscape just happened to both invest in Red Hat at the same time by accident? Quite... ® Other current Linux stories include: The Linux challenge to NT in the enterprise Informix becomes latest Linux recruit Intel puts its weight behind Linux - and Linus Click for more stories

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.