Feeds

Linux on desktop is a diverse market - really

Move along, no monopoly here

Combat fraud and increase customer satisfaction

Don't expect hegemony from a single Linux vendor on the desktop comparable with Microsoft's Office, as rival frameworks and implementations tackle different markets.

That's according to Red Hat fellow Alan Cox, who said research indicates users are adopting KDE and Gnome to serve different scenarios. He added that business users are less interested in the technical aspects of their desktops than technology experts, and simply want something that's familiar, reliable and comes at a low cost.

Cox, speaking at LinuxWorld in London, said the slowly growing market for Linux desktops is largely dominated by Gnome and KDE. Evidence from different reports suggests KDE is more widely used in Europe and Gnome in the US.

"Everything else in the free software world gives you a package and the best [package or distribution] is used. The fact KDE and Gnome exists suggest they serve different groups of users," Cox told LinuxWorld. "KDE provides more configuration and control, and Gnome more ease of use while giving up that control."

He said it is unlikely that the leading Linux and open source distributors would co-operate on a single desktop offering until the market matures. "That will only happen at the point where there is no commercial differentiation in those tools," Cox predicted.

Cox noted that, with much debate over the desktop as the next platform for Linux, end-users are not interested in the technology debate that fuelled much of the development of KDE and Gnome. "What matters are the applications," Cox said.

Business users want a desktop that can be immediately used by those familiar with a Windows and Office interface, that provides centralized management, and that comes at a low purchase and management price.

Sticking points for desktop Linux, Cox said, are the ability for systems to scale beyond pilot projects that involve 2,000 and 5,000 machines, to provide file compatibility that is better than that provided by OpenOffice, that does away with the OpenOffice spreadsheet, and that provides a replacement to Microsoft Access.®

3 Big data security analytics techniques

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.