Feeds

Dell moves 40,000 Ubuntu PCs

Frugal faithful

High performance access to file storage

Dell agreed to ship PCs and laptops with the Ubuntu operating system after more than 130,000 people promoted the notion on the company's IdeaStorm web site. It would seem, however, that only a fraction of these zealots were willing to back their votes with cash.

Dell has shipped close to 40,000 systems pre-installed with the Ubuntu flavor of Linux, according to multiple sources. By most accounts, that's a heck of a total for what remains more or less a fringe operating system. Ubuntu fans are urged to hold back their virtual quills of vitriol following that last sentence and remember that the OS trails major desktop and notebook OSes by quite a margin.

David Lord, a spokesman at Dell, declined to discuss the 40,000 figure, saying the company "does not break out" those types of numbers. Lord was, of course, willing to say that, "Adoption has been very good" and the IdeaStorm push where Dell asks customers to promote things they would like to see represents "a two-way street" where Dell hopes users "will vote with their minds and wallets."

The Ubuntu experiment marks the second time Dell has flirted with letting any old customer order a Linux PC off its web site. Grizzled open source warriors will remember CEO Michael Dell telling the 2000 LinuxWorld that "the only thing growing faster than Linux is the number of Linux systems Dell is shipping" after Dell revealed that Red Hat Linux would appear across its entire computer and server line.

Dell quickly gave up on a broad Linux desktop push, citing a lack of demand. More inquisitive types came up with other reasons for Dell's Linux abandonment.

Is 40,000 units over a number of months enough to keep Dell interested?

Your guess is as good as ours. The company sells about 10m machines per quarter.

For more on Dell's relationship with Ubuntu, check out our interview with Canonical chief Mark Shuttleworth. ®

Register editor Ashlee Vance has just pumped out a new book that's a guide to Silicon Valley. The book starts with the electronics pioneers present in the Bay Area in the early 20th century and marches up to today's heavies. Want to know where Gordon Moore eats Chinese food, how unions affected the rise of microprocessors or how Fairchild Semiconductor got its start? This is the book for you - available at Amazon US here or in the UK here.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.