The world’s biggest-ever deal for a software company points toward a significant change in how code is being developed for the computing cloud.
The news: Big Blue is swallowing Red Hat, a company that has made its reputation in open-source software development. The open-source movement makes core code freely available so that a community of developers can keep updating it. Companies like Red Hat create services to help businesses deploy and use that code.
Not just a business deal: IBM is interested in Red Hat because of its infrastructure for managing various kinds of cloud platforms. But its move is also a big bet on what’s known as containerization, a new way to create applications for use in the cloud. This involves bundling together an application with all of its related libraries, configuration files, and other things needed for it to run efficiently. A huge headache with traditional software development is that code developed in one computing environment can prove glitchy when deployed in another. These packages, or containers, can be used to create applications that run smoothly on any cloud service.
Container shipping: Containerization’s fans claim that companies using it will be able to create and deploy applications faster than rivals. But managing containers is still a costly headache. That’s one reason why venture capitalists have been pouring billions of dollars into container startups. Red Hat already has a popular service called OpenShift, which is an open-source platform for managing containers in popular ecosystems like Docker and Kubernetes. So buying the company gives IBM an automatic edge in the emerging field.
There’s no guarantee that containerization will become the de facto way to develop cloud-native applications. But if it does catch on more broadly, it could help justify Big Blue’s record-breaking deal.
Everything dies, including information
Digitization can help stem the tide of entropy, but it won’t stop it.
What’s next in cybersecurity
“When it comes to really cutting off ransomware from the source, I think we took a step back.”
Cyber resilience melds data security and protection
Organizations face pervasive and sophisticated cyberattacks, but modern data protection techniques can provide a multifaceted defense.
A new age of disaster recovery planning for SMEs
How cybersecurity threats have morphed, why SMEs need to plan for disaster recovery, and what they should do about it.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.