Li Why Your Os Still Matters Ebook en
Li Why Your Os Still Matters Ebook en
Li Why Your Os Still Matters Ebook en
3 Take advantage of
open source software
4 Simplify operating
system management
2
Introduction | Why your OS matters | Open source benefits | System management | Get started
First developed in the 1950s, operating systems have continuously evolved to meet changing demands.
Early operating systems focused primarily on batch processing and simple task scheduling, executing 1
job at a time. However, with the introduction of time-sharing systems in the 1960s, multiple users could
interact with a computer simultaneously. Consequently, the following decades saw the emergence of
operating systems like UNIX, which introduced modularity and portability to computing environments.
Today, the influence of operating systems extends beyond core datacenters to include emerging
technologies like edge devices and the internet of things (IoT). Operating systems provide efficient
data processing at the network edge to reduce latency and enhance performance in use cases ranging
from smart cities to autonomous vehicles.
This e-book provides an overview of why the operating system—and specifically the Linux operating
system—still matters today and how it meets modern IT and business demands.
1
Introduction | Why your OS matters | Open source benefits | System management | Get started
87% of organizations have a multicloud strategy in place, and 50% of enterprise workloads run in a
public cloud today.1 Your operating system can serve as a unifying foundation across on-site and cloud
infrastructure, diverse hardware and software, and traditional and cloud-ready applications. Security,
management, portability, and life cycle planning all start with your operating system. Standardizing
on a single operating foundation across your datacenter and cloud environments can simplify your
IT operations, enhance flexibility, improve security, and support innovation.
Your operating system abstracts the underlying hardware components to allow applications to run on
diverse infrastructure without modifications for specific systems. It also manages resources—including
central processing units (CPUs), memory, storage, and networking—to optimize system performance
and prevent conflicts between multiple running applications. Operating system command-line
interfaces (CLI) and GUIs let you interact more intuitively with the computer and its applications.
Security features like user authentication, access controls, and encryption protect data and resources
from unauthorized access. And error and exception handling capabilities prevent system crashes and
enhance system reliability and overall user experience.
Modern operating systems like Linux usually implement two modes—kernel mode and user mode—to
determine which privileges are available to which applications, components, and users. Via kernel mode,
trusted core software components—like the operating system kernel and some device drivers—can
perform privileged operations, directly use hardware resources, and access restricted system memory.
All other software—including user applications, libraries, and tools—run in user mode with limited access
to system resources. These applications can only access the user space, isolated memory regions that
prevent applications from interfering with critical operating system components.
Look for a trusted Linux vendor with the experience and expertise needed to support your business.
Key aspects include:
3
Introduction | Why your OS matters | Open source benefits | System management | Get started
Applications and hardware resources communicate via device drivers. Operating systems manage
these drivers—ensuring proper installation, loading, and operation—to increase system stability and
compatibility between applications and underlying hardware components. For example, during system
initialization, your Linux operating system detects newly connected or integrated resources, identifies
known devices, and locates and loads the corresponding drivers. Operating systems also provide
hardware abstraction layers that let applications interact with hardware devices without knowing
underlying hardware details. These standardized interfaces simplify application development and
enhance portability across different hardware configurations.
Chipsets, storage, and networking are areas where device drivers and operating system management
are essential. Many compute-intensive workloads like artificial intelligence and machine learning (AI/
ML) can benefit from hardware acceleration in chipsets. Operating systems can make the features and
acceleration from graphics processing units (GPUs), systems on chips (SoCs), and field-programmable
gate arrays (FPGAs) available to these workloads.
4
Introduction | Why your OS matters | Open source benefits | System management | Get started
Applications are at the core of many digital businesses, and downtime is often unacceptable. Many
operating systems include advanced error-detection mechanisms that capture and manage runtime
errors during application execution. These mechanisms help to prevent system-wide crashes,
disruptions, and data corruption. Plus, operating systems monitor critical applications and system files
through file integrity checks, checksums, and digital signatures to ensure that only authorized and
unmodified code is executed.
Hardware errors are also a concern. By detecting and managing hardware errors like memory faults,
disk errors, and processor malfunctions, operating systems can increase system stability and prevent
catastrophic failures. Working with the error correction code (ECC) and cyclic redundancy checks
(CRC) protection built into memories and storage devices, operating systems can identify and manage
faulty hardware to improve the reliability of data stored and used by applications. Error detection and
correction mechanisms like journaling or checksums help operating systems quickly and accurately
retrieve data for applications and users.
Understanding and fixing problems on a system level is also important. Operating systems provide
logging and diagnostic tools that record information about errors and system events to assist
troubleshooting and proactive maintenance operations. Using these tools, system administrators can
analyze error patterns, identify potential vulnerabilities, and take corrective actions to maintain the
overall stability and reliability of the system.
5
Introduction | Why your OS matters | Open source benefits | System management | Get started
Modern IT environments often consist of multiple infrastructures and architectures. In fact, 85%
of organizations operate multiple deployment environments, and 31% deploy applications in 5 or
more environments.4 For example, you may use both on-site datacenters and public cloud providers
and deploy workloads on servers, workstations, and edge devices based on a variety of hardware
architectures like x86, Arm, and IBM Power.
Operating systems defend against threats that can compromise the integrity,
confidentiality, and availability of your infrastructure, applications, and data.
The Linux kernel includes many security capabilities to help protect your infrastructure, applications,
and data. For example, Linux operating systems contain the authentication and authorization tools
needed to implement zero trust architectures. Authentication via usernames, passwords, biometrics,
or security tokens identifies the individuals or applications that want to access IT systems and assets.
Authorization and access control mechanisms like Security-Enhanced Linux (SELinux) define the
permissions and privileges granted to these users, groups, or applications. Together, these tools help
prevent unauthorized access to sensitive resources and system configurations.
Using process scheduling technologies, operating systems optimize CPU and memory use, balance
workloads across resources, and maintain system responsiveness. For example, process scheduling
algorithms and load balancing mechanisms ensure efficient use and fair distribution of CPU time.
Scheduling algorithms also allow multiple processes to make progress simultaneously by rapidly
switching CPUs between several processes.
Operating systems also enhance memory performance through caching and buffering mechanisms
that store frequently accessed data in faster, more expensive caches and other data in larger, slower
random-access memory (RAM) and storage devices. And by swapping data between memory and hard
disks, virtual memory lets operating systems give processes a larger address space than is actually
physically available. Virtual memory increases multitasking efficiency and allows larger applications to
be run on systems with smaller memory footprints.
8
Introduction | Why your OS matters | Open source benefits | System management | Get started
► Resource allocation. Hypervisors allocate resources like CPU time and memory to virtual machines,
allowing multiple virtual machines to run on the same physical hardware with a guaranteed quality of
service. They also present physical hardware like network adapters, storage controllers, and graphics
cards to guest operating systems as virtual devices to let multiple virtual machines use the same
resources without conflict.
► Snapshots and cloning. Many hypervisors include virtual machine snapshot and cloning capabilities
to enhance the flexibility, scalability, and efficiency. Snapshots capture virtual machine state and
data at specific points in time. These can be used to recover or rollback to known configurations.
Cloning capabilities duplicate existing virtual machines to speed deployment of new instances.
► Live migration and recovery. Live migration and high availability features help balance workloads,
optimize resource use, and improve virtual machine uptime. Live migration moves running virtual
machines between physical hosts without service interruption. Virtual machines remain powered
on, network connections remain active, and applications continue to run. If virtual machines are
interrupted due to a host failure, the hypervisor automatically restarts them, within seconds and
without human intervention.
► Security and isolation. Hypervisors enforce strict boundaries that prevent virtual machines from
accessing the memory or resources allocated to other virtual machines. These boundaries help to
enhance security and contain the effects of potential vulnerabilities and cyberattacks.
9
Introduction | Why your OS matters | Open source benefits | System management | Get started
Linux operating systems partition kernel resources related to process spaces, file systems, and network
access to give each container its own unique set of resources. As with traditional virtualization, this
isolates each container to prevent conflicts and interference between containers and allows multiple
containers—each with unique user spaces and runtime environments—to execute on the same host. To
allocate resources fairly and appropriately, operating systems manage and limit resource use—including
CPU, memory, and disk input/output (I/O)—on a per-container basis.
Finally, operating systems provide mandatory access controls (MAC) to enforce strict and predefined
resource access policies. Containers can only interact with specified system resources to increase
isolation and protect against widespread security threats and vulnerabilities.
5 Red Hat e-book. “How enterprises approach legacy application modernization,” 6 Feb. 2023. 10
Introduction | Why your OS matters | Open source benefits | System management | Get started
Take advantage of
open source software
Within these communities, developers propose, contribute, and test new operating system capabilities
and features. Releases are made available via free community and paid enterprise distributions.
Enterprise—or commercial—distributions are often offered via subscriptions and provide additional
features, services, and support tailored to business needs and concerns. For example, enterprise
operating system subscriptions frequently include 24x7, production-grade technical support to speed
troubleshooting and reduce downtime. They may also include training and tutorials that help users
efficiently administer, optimize, and troubleshoot issues in the operating system.
6 IDC White Paper, sponsored by Red Hat, “The Business Value of Red Hat Solutions vs Non-Paid Open-Source
Alternatives,” Document #US50423523. March 2023. 11
Introduction | Why your OS matters | Open source benefits | System management | Get started
Performance management
Gain insights into system performance to identify bottlenecks, monitor utilization,
and troubleshoot performance issues.
IT automation
Automate routine tasks to reduce manual intervention, minimize errors, and ensure
consistent system configurations.
Configuration management
Apply updates and upgrades to ensure that operating systems stay current with the
latest security patches and feature enhancements. Maintain consistent configurations
across multiple systems to reduce configuration drift across IT environments.
No matter where you are headed in your IT journey, Red Hat Enterprise Linux can help you build
an efficient, security-focused foundation for innovation across hybrid and multicloud environments.
This cloud-ready operating system provides a consistent, tailored experience across footprints—
including physical, virtualized, hybrid cloud, multicloud, and even edge infrastructure. Standardizing
on Red Hat Enterprise Linux for both on-site datacenter and cloud environments can help you improve
productivity, security, and operations as you move to the cloud and adapt to a more digital world.
Copyright © 2024 Red Hat, Inc. Red Hat and the Red Hat logo are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries
in the United States and other countries. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
1051224_0324_KVM