IBM announced that they have closes its acquisition of Red Hat for $34 billion. The acquisition combines the power and flexibility of Red Hat’s open hybrid cloud technologies with the scale and depth of IBM’s innovation and industry expertise.
“Together, IBM and Red Hat will accelerate innovation by offering a next-generation hybrid multi-cloud platform. Based on open source technologies, such as Linux and Kubernetes,” reads the press release.
Ginni Rometty, IBM chairman, president, and CEO, said that “IBM and Red Hat are uniquely suited to meet these needs. As the leading hybrid cloud provider, we will help clients forge the technology foundations of their business for decades to come.”
Jim Whitehurst, president, and CEO, Red Hat, said, “We think open source has become the de-facto standard in technology because it enables these solutions. Joining forces with IBM gives Red Hat the opportunity to bring more open source innovation to an even broader range of organizations and will enable us to scale to meet the need for hybrid cloud solutions that deliver true choice and agility.”
Read hat remains Read hat, IBM has committed to preserving Red Hat’s independence, neutrality, culture, and industry partnerships. Jim Whitehurst and his current management team continue to manage Red Hat.
The acquisition may boost Red Hat’s pioneering business model of bringing the open sources such as Linux, Kubernetes, Ansible, Java, Ceph and many more to the enterprises.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.
Summit – New Most Powerful & Fastest Supercomputer on the Planet Designed by IBM
Best DNS Management Tools play a crucial role in efficiently managing domain names and their…
Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments…
Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them…
SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from…
In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse…
The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced…