Saturday, November 25, 2017

Microsoft brings Apache Spark, Cassandra, MariaDB to its Azure cloud

Microsoft has brought several third-party popular platforms to its Azure cloud aimed at developers and data analysts.


Microsoft brings Apache Spark, Cassandra, MariaDB to its Azure cloudThe new Azure capabilities include:
  • Azure Databricks, a beta Apache Spark cluster computing platform for developers to get insights out of enterprise data. Developers can request to participate in the beta.
  • An API for running the Apache Cassandra NoSQL database as a service on Azure. This service leverages Microsoft’s Azure Cosmos DB, a globally distributed database. Developers can use familiar Cassandra tools. Microsoft is offering a signup for the API by logging into an Azure account.
  • An upcoming preview of Azure Database for MariaDB, a fork of MySQL. Developers can sign up for the beta.
  • Azure Devops Projects, a beta service for configuring a devops pipeline. Azure Devops Projects lets developers set up Git repositories and automate build and release pipelines.

AWS launches C5 instances for EC2 alongside new 'cloud-optimised' hypervisor



Amazon Web Services (AWS) has announced the availability of C5 instances, aimed at more compute-intensive workloads for the EC2 cloud.
The C5 instances – three from the sharp end in Amazon’s compute class, behind G2, P2 and F1 – were introduced as the newest iteration back in November last year at the company’s Re:Invent show. The C5 promises 3.0 GHz Intel Xeon Scalable processors and double the vCPU and memory capacity – up to 72 vCPUs and 144 gibibytes of memory – when compared with previous C4 instances.
Applications the C5 instances are better equipped to handle include batch processing, distributed analytics, high performance computing (HPC), ad serving, video encoding, and multiplayer gaming. The instances will be available in three regions; US East (N. Virginia), US West (Oregon), and EU (Ireland), with support for additional regions in the pipeline.
Alongside this, AWS dropped a few customer names into the mix. One customer is particularly well-known – having been analysed by this publication on several occasions – and is arguably the poster child for AWS itself. Netflix said it saw up to a 140% performance improvement in industry standard CPU benchmarks compared with C4.
For the high performance computing side, Alces Flight offers researchers on demand HPC clusters, or ‘self-service supercomputers’ in minutes. The company, a member of the AWS Marketplace, said C5 had a ‘direct benefit’ for its user base ‘on both price and performance dimensions.’
The press materials also made mention of a new hypervisor which AWS is rolling out for C5 instances to ‘allow applications to use practically all of the compute and memory resources of a server, delivering reduced cost and even better performance.’
According to this page, accessed by CloudTech earlier today (screenshot), and first spotted by The Register, the new hypervisor for Amazon EC2 “is built on core Linux Kernel-based Virtual Machine (KVM) technology, but does not include general purpose operating system components.”
KVM’s best known user in this sphere is Google. In January this year, the search giant issued a blog post advocating seven methods they use to security harden the KVM hypervisor. As Ariel Maislos, CEO of Stratoscale, pointed out in this publication last year, AWS has long been partnered with Xen for its hypervisor needs.
The FAQ page added that all new instance types will ‘eventually’ use the new EC2 hypervisor, but for now some new instance types will use Xen ‘depending on the requirements of the platform.’ Yet, as The Register reports, references to KVM have been disappearing from the company’s pages.

Friday, November 17, 2017

NetApp unveils new Hybrid Cloud services

NetApp's Hybrid Cloud innovations allow customers to break down barriers to transformation by helping them to unify data across the widest range of cloud and on-premises environments.
Cloud firm NetApp on Friday introduced new Hybrid Cloud offerings to help customers efficiently use data for competitive advantage. 

NetApp introduced "NetApp HCI", the industry's first enterprise-scale hyper-converged solution for better performance, independent scaling, and Data Fabric integration. 

The other offerings include new consumption purchase models and improved all-flash capabilities. 

"The announcements of enterprise-scale HCI and new Hybrid Cloud .. 

NetApp's Hybrid Cloud innovations allow customers to break down barriers to transformation by helping them to unify data across the widest range of cloud and on-premises environments. 


Wednesday, November 15, 2017

What are shielded virtual machines and how to set them up in Windows Server ?

What are shielded virtual machines and how to set them up in Windows Server


What are shielded virtual machines and how to set them up in Windows Server
Virtualization can expose data and encryption keys to hackers. Microsoft's shielded virtual machines and Host Guardian Service locks them down.
For all its benefits, the drive to virtualize everything has created a very big security issue: Virtualization creates a single target for a potential security breach. When a host runs 50 virtual machines (VMs) and is attacked, then you have a real problem. One compromised host compromises the 50 VMs running on it, and now you have what I lovingly call a “holy s**t” moment. Because you virtualized, you turned a whole bunch of servers and operating systems into just a couple of files that are super easy to steal.
The industry needs a way to protect against online and offline attacks that could compromise entire farms of VMs. Microsoft has done some work in this area in Windows Server 2016 with the shielded virtual machine, and its sister service, the Host Guardian Service (HGS). Let’s look at what the folks in Redmond have done.

Understanding the security problem with virtualization

Let’s frame the problem as a set of challenges that need to be solved for a security solution to mitigate the issues virtualization poses.
  1. On any platform, a local administrator can do anything on a system. Anything a guest does to protect itself, like encryption, can be undone by a local administrator. This is comparable to a data center, where all of the access control lists and fancy stuff you do on the inside of an operating system running on a racked server doesn’t matter when you can plug hacking tools into a USB port, boot off it, and copy everything there. Or I can take the system off the rack, drive off with it, and boot it up at home. Even drive encryption can be bypassed by some of these tools by injecting malware into boot sequences and stealing keys out of memory.
  2. Any seized or infected host administrator accounts can access guest VMs. As you might predict, the bad guys know this and target these individuals with increasingly sophisticated phishing attacks and other attempts to gain privileged access. The prized targets are no longer individual desktops and poorly protected home machines. The hacking target market has matured. The new targets are VM hosts in cloud data centers, public and private, with 10 or 15 guests on them, almost always packed to the gills with important information and the fabric administrator accounts that control those hosts. This virtualization fabric has to be protected, since more than just the host administrator has the ability to do harm. With VMs, the server administrator, storage administrator, network administrator, backup operator, and fabric administrator all have virtually unfettered access.
  3. Tenant VMs hosted on a cloud provider’s infrastructure (fabric) are exposed to storage and network attacks while unencrypted. The two main points here are: First, being encrypted at rest while not booted is worthless when your VM is infected while it is running in production. Second, the best offline defenses are worthless against network and storage attacks that execute while a machine is on.
  4. As technology currently stands, it is impossible to identify legitimate hosts without hardware based verification. There is no way you can tell a good host from a bad host without some type of function keying off a property of a piece of silicon.
Microsoft’s answer to these four points is new to Windows Server 2016—the shielded VM and the Host Guardian Service.

What is a shielded virtual machine (VM)?

A shielded VM protects against inspection, theft, and tampering from both malware and data center administrators, including fabric administrators, storage administrators, virtualization host administrators, and other network administrators.
Let me explain how a shielded VM works: It is a Generation 2 VM. The main data file for the VM, the VHDX file, is encrypted with BitLocker so that the contents of the virtual drives are protected. The big problem to overcome is that you must put the decryption key somewhere. If you put the key on the virtualization host, administrators can view the key and the encryption is worthless. The key has to be stored off-host in a siloed area.
The solution is to equip the Generation 2 VM with a virtual trusted platform module (vTPM) and have that vTPM secure the BitLocker encryption keys just like a regular silicon TPM would handle the keys to decrypt BitLocker on an ordinary laptop.  Shielded VMs run on guarded hosts, or regular Hyper-V hosts that are operating in virtual secure mode—a setting that provides process and memory access protection from the host by establishing a tiny enclave off to the side of the kernel. (It doesn’t even run in the kernel, and all it does is talk with the guardian service to carry out the instructions about releasing or holding on to the decryption key.)

What is the Host Guardian Service?

How does the VM know when the release the key? Enter the Host Guardian Service (HGS), a cluster of machines that generally provide two services: attestation, which double-checks that only trusted Hyper-V hosts can run shielded VMs; and the Key Protection Service, which holds the power to release or deny the decryption key needed to start the shielded VMs in question. The HGS checks out the shielded virtual machines, checks out the fabric on which they are attempting to be started and run, and says, “Yes, this is an approved fabric and these hosts look like they have not been compromised. Release the Kraken! I mean keys.” The whole shebang is then decrypted and run on the guarded hosts. If any one of these checks and balances failed, then keys are not released, decryption is not performed, and the shielded VM fails to launch.
How does the HGS know whether a virtual machine is permitted to run on a fabric? The VM’s creator—the owner of the data—designates that a host must be healthy and pass a certain number of checks to be able to run the VM. The HGS attests to the health of the host requesting permission to run the VM before it releases the keys to decrypt the shielded VM. The protections are rooted in hardware as well, making them almost surely the most secure solution on the market today.

How to create shielded virtual machines

Creating shielded VMs is not that different than creating a standard VM. The real difference, apart from being a Generation 2 VM, is the presence of shielding data. Shielding data is an encrypted lump of secrets created on a trusted workstation. This lump of secrets can include administrator credentials, RDP credentials, and a volume signature catalog to prevent putting malware in the template disk from which future secure shielded VMs are created from. This catalog helps validate that the template has not been modified since it was created. A wizard, called the Shielding Data File Wizard, lets you create these bundles. A Protected Template Disk Creation Wizard makes that process run a little more smoothly as well.

Differences between shielded VMs and regular VMs

A shielded VM truly is shielded even from the fabric administrator, to the point where in System Center Virtual Machine Manager or even the bare Hyper-V Manager, you simply cannot connect via VM console to a shielded VM. You must use RDP and authenticate to the guest operating system, where the owner of the VM can decide who should be allowed to access the VM console session directly.
The fabric administrator doesn’t get automatic access. This effectively means that the administrator on the guest operating system of the VM ends up being the virtualization administrator in shielded VM scenarios, not the owner of the host infrastructure as would be the case with typical standard virtualization deployment. This makes shielded VMs a perfect choice for domain controllers, certificate services, and any other VM running a workload with a particularly high business impact.
This transfer of virtualization administrator capabilities begs the question of what to do, then, when a VM is borked and you can no longer access it over the network. This is what the “repair garage” is for. An administrator can park a broken VM inside another shielded VM that is functional and use nested virtualization (Hyper-V within Hyper-V) to run it, connect to the shielded repair garage over RDP like any other shielded VM, and make repairs to the nested broken VM within the safe confines of the shielded garage VM. Once repairs are complete, the fabric administrator can back the newly repaired VM out of the shielded repair garage and put it back onto the protected fabric as if nothing had happened.
The guarded fabric can run in a couple of modes: First, to make initial adoption simpler, there is a mode where the fabric administrator role is still trusted. You can set up an Active Directory trust and a group in which these machines can register, and then you can add Hyper-V host machines to that group to gain permission to run shielded VMs. This is a weaker version of the full protection, since the fabric administrator is trusted and there are no hardware-rooted trust or attestation checks for boot and code integrity.
The full version is when you register each Hyper-V host’s TPM with the host guardian service and establish a baseline code integrity policy for each different piece of hardware that will host shielded VMs. With the full model, the fabric administrator is not trusted, the trust of the guarded hosts is rooted in a physical TPM, and the guarded hosts have to comply with the code integrity policy for keys to decrypt the shielded VMs to be released.
Other notes about how shielded VMs behave and requirements for running them:
  • Guarded hosts require you to be running Windows Server 2016 Datacenter edition—the more expensive one, of course. This feature does not exist in Standard edition.
  • Windows Nano Server is not only supported in this scenario, it is recommended. Nano Server can be both the guest operating system within a shielded VM as well as handle the guarded Hyper-V host role as well as run the HGS. Nano Server is a great lightweight choice for the latter two roles, in my opinion.
  • Shielded VMs can only be Generation 2 VMs, which necessitates that the guest operating systems be Windows 8 and Windows Server 2012 or newer (including Windows 10, Server 2012 and R2, and Server 2016.
  • Contrary to what you might think, the vTPM is not tied to physical TPM on any particular server. For one, dividing up a physical TPM securely would be a real challenge. Secondly, the TPM has to move with the VM so that shielded VMs maintain all of the high availability and fault tolerance capabilities (Live Migration and so on) that regular VMs have.

The last word

The rush to virtualize all things has left a key attack vector virtually unprotected until now. Using shielded VMs adds a super layer of security to the applications that you have right now, even those that are running on Linux. Think of shielded VMs as the anti-Edward Snowden -- protection against the rogue administrator. It could make Windows Server 2016 easily worth the price of admission for your business.

Qualcomm ships ARM chip to challenge Intel in cloud data centers

Qualcomm ships ARM chip to challenge Intel in cloud data centers


Boradcom's bid for Qualcomm and renewed competition in the server market muddy the waters for the launch

anand chandrasekher
Qualcomm
Qualcomm's much-anticipated ARM-based Centriq 2400 product line, which started shipping commercially this week, is a worthy contender to break Intel's virtual monopoly in the server processor arena, where data center operators are thirsting to see competition to help bring down costs.
An unsolicited acquisition bid for Qualcomm from Broadcom, emerging server-chip competitors and legal wrangles involving Apple and other vendors, however, cast a bit of a shadow on prospects for the new chip.
Qualcomm revealed some impressive specs at an industry event in San Diego Wednesday, bringing out a a variety of big-time cloud, hardware and software providers to show support.
qualcomm centriq 2400 wafer processor colorQualcom
The Qualcomm Centriq 2400 wafer processor.
ARM-based chips, which up to now have dominated smartphones and tablets, have the potential to be power-efficient alternatives to Intel's x86-based systems. Qualcomm says that with a list price of $1,995, the 48-core Centriq 2460 offers four-times better performance per dollar and up to 45 percent better performance per watt than Intel's high-end Skylake processors, released earlier this year. Though these figures are based on Qualcomm-directed tests, they bode well.
"It should be competitive -- there is a lot of interest in ARM server processors because no two workloads are the same," said Jim McGregor, principal analyst at Tirias Research.
The high core count and focused throughput of the Centriq line has benefits especially for cloud workloads, web servers, and enterprise data centers doing different instantiations for their corporate users, McGregor noted.
"This is gonna bring big changes to the way data centers are rolled out and one of the things I love is we brought this power efficiency from the mobile space into the data center space and that’s something that the world needs," said Paul Jacobs, the executive chairman of Qualcomm, at the launch event.
qualcomm centriq architectureQualcomm
Qualcomm's Centriq ARM-based architecture includes custom Falkor cores
Software built to run on Intel X86 chips have to be rewritten to run on the ARM instruction set, but a shift in the way applications are developed and data centers are built has already started to take place, helping to clear a path for new competitors, Jacobs noted.
Taking advantage of cloud services, Jabob said, users can procure virtual machines and get online in minutes, and this is changing the way apps are being developed.
"In the traditional IT environment apps and services are delivered through scaling up with bigger servers but in the cloud environment they are delivered through scaling out -- so, more and more servers, and the projections now are that 50 percent of servers are going to be deployed in cloud environments by 2020," Jabos said. "So what that means is that has really changed the design point for the server -- it creates this tremendous opportunity for Qualcomm."
It's not just mobile apps that are being developed for ARM architecture, but AI, IoT and data center software as well, Jacobs said.

The world's first 10nm server chip

The Centriq 2400 line is based on the ARMv8 64-bit architecture and Qualcomm has contracted with Samsung to use its 10-nanometer silicon fab process to manufacture the chips. On its part, Intel which will not be shipping chips manufactured with the 10nm process until later this year or early 2018. Qualcomm is boasting that the Centriq is the world's first 10nm server chip.
Generally, the smaller the manufacturing process technology, the greater the transistor density on processors, leading to cost- and performance efficiency.
The incredible demand for smartphones over the last few years has led manufacturers to invest in technology to build mobile chips with the 10nm process, said Anand Chandrasekher, speaking at the San Diego event.
"Volume economics are required to effectively drive the learning curves down and the smartphone volume economics are effectively outweighing the PC volume economics by a substantial amount," Chandrasekher said.

What are the Centriq's specifications?

Samsung’s 10nm FinFET process puts 18 billion transistors on only 398mm2. The Centriq 2400 family contains up to 48 high-performance, 64-bit, single-thread cores, running at up to 2.6 GHz frequency.
The cores are connected with a bi-directional segmented ring bus with 250GBps of aggregate bandwidth to avoid performance bottlenecks under full load, Qualcomm says. To maximize performance under various uses, the design has 512KB of shared L2 cache for every two cores, and 60MB of unified L3 cache distributed on the die.
In addition, it has 6 channels of DDR4 memory and can support up to 768 GB of total DRAM capacity with 32 PCIe Gen3 lanes and 6 PCIe controllers. The Qualcomm Centriq 2400 processor family also supports supports hypervisors for virtualization.
The Centriq 2400 family initially includes, the 40-core/2.5GHz Centriq 2434 priced at $888, the 46-core/2.6GHz Centriq 2452, priced at $1,383 and the 48-core/2.6GHz Centriq 2460, priced at $1,995.
The Centriq chips may not be able to meet Intel head-on in every workload. For example, workloads with huge data sets may not be the Centriq's strength, considering that while it has  32 lanes of PCIe connectivity, Intel's scalable line offers 48 lanes and AMD's Epyc line offers up to 128 lanes.

Strength in customization

To help make up for that, Qualcomm is likely to be much more flexible than Intel about customizing its chips for specific customers, since ARM modular architecture allows for easier customization than x86 architecture.
Matthew Prince, co-founder and chief executive officer, Cloudflare, took to the stage in San Diego to say the chips hold out the promise of bringing data center costs down. "While testing Qualcomm Centriq 2400, we found it to be twice as power efficient as the Intel Skylake 4116 processors," he said.
Tech industry havyweights voicing support for the chip line included Microsoft, Alibaba, HPE.
Qualcomm, however, faces a number of rivals who are starting to emerge as competitors to Intel in the server market, as well as potentially costly distractions -- chief among them, for the moment, being Broadcom's unsolicited $130 billion bid, announced earlier this week.
Broadcom had quietly shut down its business unit developing ARM server technology, raising the question of what it would do to the Centriq product line if its bid for Qualcomm succeeds.
Meanwhile, while the debut of the new 10nm-process ARM server chips has been long awaited -- Qualcomm has been developing the chip for the better part of five years and dropping hints about it for two years -- the competitive landscape has changed recently.

Who are the other ARM chip server contenders?

Earlier this year, Microsoft embraced Cavium, another maker of ARM server chips, as a participant in its Project Olympus open-architecture server initiative, even as it voiced support for Qualcomm. Other ARM server contenders include The X-Gene 3 server platform developed by AppliedMicro -- that technology has found a new home in the Carlyle Group after Macom acquired AppliedMicro earlier this year.
AMD's Epyc chip, released in June, is also a powerful contender for the data center, and has the advantage of running on the X86 platform, Tirias Research's McGregor said.
“Everyone was waiting for Qualcomm to come out with their server chip, and then all of a sudden we got a surprise earlier this year with AMD," McGregor said. "It was like, whoa, they’re actually competitive again."
In addition, Qualcomm's patent dispute with Apple has broadened to include cases not only in the U.S. and Europe, but Asia as well, leading Apple to direct some of its manufacturing partners to withhold payments to Qualcomm -- another ongoing distraction.
In any case, the server market moves slowly. Server-processor testing can take the better part of a year. So no matter how Qualcomm's legal issues turn out, it's likely to take 12-18 months before any of the new server-chip contenders make a significant dent on Intel's server stronghold
.

HPE and Rackspace reveal pay-as-you-go OpenStack offering

HPE and Rackspace reveal pay-as-you-go OpenStack offering

HPE and Rackspace reveal pay-as-you-go OpenStack offering


Hewlett Packard Enterprise (HPE) has partnered with Rackspace to offer OpenStack Private Cloud in a pay-per-use structure.
The company’s claim this is the first pay-as-you-go OpenStack private cloud offer in the industry delivered as a managed service. The service will be available to all regions as of 28 November.
Customers will have the benefits of a public cloud offer, such as the pricing structure, elastic infrastructure and a simplified IT in a private cloud environment managed by Rackspace.
“With this innovative delivery model, Rackspace and HPE are removing the barriers to private cloud adoption, giving customers even more choice of technology platforms that best fit their application needs,” Rackspace executive vice president of private cloud, Scott Crenshaw, said.
“We are proud to partner with HPE to continue enabling customer success with private clouds. And, with this common goal in mind, our companies plan to extend this model to Rackspace’s entire managed private cloud portfolio in the future, including VMware and Microsoft Azure Stack technologies.”
Through HPE’s Flexible Capacity customers will pay for what they use, making it easier to handle burst capacity and traffic spikes without the need to pay for additional fixed capacity.
Rackspace claims that the flexible capacity model delivers better cost than public cloud, typically saving customers 40 per cent or more versus the leading public cloud. These figure is based on Rackspace internal pricing analysis, savings are measured against the leading public cloud vendor.
“Customers consume OpenStack Private Cloud with pay-per-use infrastructure as a managed service with an industry-leading 99.99 per cent API uptime guarantee from Rackspace,” the company said in a statement.
Michelle Bailey, group vice president, general manager and research fellow at IDC Research said the offering specifically addresses organisations’ needs to provide security and performance benefits, the “cornerstone of a private cloud environment”.
Rackspace is one of the creators of OpenStack, along with NASA, and is the largest operator with more than one billion server hours of OpenStack expertise.
HPE and Rackspace reveal pay-as-you-go OpenStack offering

Tuesday, November 7, 2017

30 Big Companies and Devices Running on GNU/Linux

30 Big Companies and Devices Running on GNU/Linux

Linux is a most popular Operating System compared to Windows and Mac. Linux is everywhere even at those places where most of us have not even thought. Tiny machines to Gaint Supercomputers are powered by Linux. Linux no more remains a Geeky thing.
Companies Running on Linux
Here in this article we would be discussing some of those Linux powered devices and company running them.

1. Google

Google, an American based multinational company, the services of which includes search, cloud computing and online advertising technologies runs on Linux.

2. Twitter

Twitter, famous online social networking and micro-blogging site that is Powered by nix.

3. Facebook

Facebook, one of the most famous and most widely used Social Networking service runs on the same platform.

4. Amazon

An American based international company which deals with International Online Retailing is in the list of Linux powered Company.

5. IBM

IBM (International Business Machine Corporation) the American based company which for sure don’t requires any introduction, is again powered by nix.

6. McDonalds

The world’s largest chain of hamburger fast foot restaurant uses GNU/Linux (Ubuntu) too.

7. Submarines

The submarines in the United State Navy are controlled by same platform.

8. NASA

National Aeronautical and Space Administration, The United nation’s Space program widely uses Linux in many of their programmes.

9. Watches

Most of you would not be knowing that there are Linux Powered Watches in the market, already. The watch developed by IBM running Linux.

10. Mobile Devices

True, you all know that Linux is powering Mobile Phones, Tablets and Kindle. If the news is true, Nokia is all set to come with its First Android based Mobile (Though the decision of Nokia is too late and Nokia has paid for this and still paying).

11. Space

A Specific Linux Distro (Debian) is already in the space. Debian led all the rest.

12. Raspberry pi

The business card sized computer designed for electronic projects as well as desktop computing which is very cheap in cost and is fully functional. Raspberry is a landmark in Linux Development.

13. Desktop Computing

Though a little late, Linux made a notable presence in the desktop computing market. In school and academics as well as in government offices Linux are being widely used, these days.

14. Corporates

The corporate offices are using Linux and finds it more productive than any other alternatives.

15. New York Stock Exchange

New York Stock Exchange (NYSC) which provides means for buyers and sellers in order to trade shares of stock in companies registered for public trading relies solely on Linux.

16. Traffic Controlling

The Traffic controlling system in most of the countries be it Road Traffic or Air Traffic Linux proved to be the best than any other available alternative.

17. Nuclear Projects

When it comes to Nuclear Ambitious projects, Linux is the best option. One of such OS is QNX, which lately is acquired by Blackberry Ltd.

18. Bullet Trains

The Bullet Trains in Japan runs at the speed of 240-320 km/h. All train tracking, maintenance, scheduling and controlling is Linux based.

19. Tianhe-2

The fastest Supercomputer of the world, China’s Tianhe-2, which is capable of performing 33.86 petaflops operations per second is running Kylinos, a Linux based Operating System.

20. Internet Hosting

More than 70% of Internet Hosting and service providers are Linux based. Thought this statistic is difficult to figure out but based upon the Linux compatible hardware sold, and demand for cross platform compatible hardware, the above statistics is a rough estimation.

21. Missiles and Weapons

The Missiles and destructive weapons of next generation is themed to be much advanced and Intelligent system than its predecessors. Well what else would have been its alternative.

22. Hackers

Hackers be it ethical or non-ethical prefers Linux over any other Platform. The availability of a variety of tools, the architecture, the security, the technique to handle things intelligently and control everything to the point required makes it perfect choice for Hackers.

23. Other Industries

The Wikipedia, PIZZA Hut, Aviation industry, Parliaments of countries like France are using Linux. When it comes to work in distributed system, multi-user supported system, the only thing that comes to mind is the Nix.
The OLX and Just dial have their user base just because of Linux. The service providers relied on Linux for developing Application that has a huge database and act as local google and Amazon.

24. Postal Services

The US Postal Services and banking sector of most of the countries are using Linux. Well USA uses Linux not only as mission critical application, but have tried building their system around. The use of nix in US Postal Service is a brilliant Example.

25. Education

Schools, colleges and Universities in Russia, Germany, Philippines, Georgia, Switzerland, Italy, India specially Tamil Nadu are using Linux even for basic computer education.
The availability of specific Linux distro for every task makes Linux the most sought after platform. Edubuntu is a distro specially developed for computer LABS from educational point of view. (At my time RedHat was used for educational purpose, when I was pursuing my major in Computer Application.)

26. Movies

For those who think Linux is not for Graphical editing we need to mention that Oscar winning Titanic and Avatar were Edited and Graphics were created using Linux only. Moreover the video cameras these days are Linux centred.

28. Networking

Cisco, the networking and routing gaint are completely Linux Based. Real-Time Communication and Integration Solutions providing company finds Linux best suited to their Application Development and Delivery.

29. Cars

Recently, cars developed around Linux was exhibited. Making cars more intelligent which can work in odd situations, nix is the best choice.

30. Future of ROBOTICS

Again an intelligent critical application, which should work in odd situations and act accordingly, specially when robotics is supposed to be tied with army and security and there remains no place for any flaws, Linux and Only Linux………