Skip to Content
Computing

IBM’s $34 billion purchase of Red Hat is a mega-bet on a coding revolution

October 29, 2018

The world’s biggest-ever deal for a software company points toward a significant change in how code is being developed for the computing cloud.

The news: Big Blue is swallowing Red Hat, a company that has made its reputation in open-source software development. The open-source movement makes core code freely available so that a community of developers can keep updating it. Companies like Red Hat create services to help businesses deploy and use that code.

Not just a business deal: IBM is interested in Red Hat because of its infrastructure for managing various kinds of cloud platforms. But its move is also a big bet on what’s known as containerization, a new way to create applications for use in the cloud. This involves bundling together an application with all of its related libraries, configuration files, and other things needed for it to run efficiently. A huge headache with traditional software development is that code developed in one computing environment can prove glitchy when deployed in another. These packages, or containers, can be used to create applications that run smoothly on any cloud service.

Container shipping: Containerization’s fans claim that companies using it will be able to create and deploy applications faster than rivals. But managing containers is still a costly headache. That’s one reason why venture capitalists have been pouring billions of dollars into container startups. Red Hat already has a popular service called OpenShift, which is an open-source platform for managing containers in popular ecosystems like Docker and Kubernetes. So buying the company gives IBM an automatic edge in the emerging field.

There’s no guarantee that containerization will become the de facto way to develop cloud-native applications. But if it does catch on more broadly, it could help justify Big Blue’s record-breaking deal.

Deep Dive

Computing

Everything dies, including information

Digitization can help stem the tide of entropy, but it won’t stop it.

Moving money in a digital world

Security is the critical element to expanding digital-first payments.

Cyber resilience melds data security and protection

Organizations face pervasive and sophisticated cyberattacks, but modern data protection techniques can provide a multifaceted defense.

A new age of disaster recovery planning for SMEs

How cybersecurity threats have morphed, why SMEs need to plan for disaster recovery, and what they should do about it.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.