Skip to main content

Virtualization: Linux's bandwagon to the enterprise?



Irrespective of what you pick, the only thing to conclude here from Neil's trip to the Virtualization Exec Forum is that Linux is getting a legit entrance into the enterprise. And you have to thank Microsoft for it. They are letting Linux in themselves. But again we are talking about what vendors are providing.

From traditional systems management software vendors such as CA, HP, and IBM, to newer companies such as Hyperic, to such niche players as PlateSpin, Virtuozzo, and Virtual Iron, the industry is turning toward solving the problems of server management like never before. Virtualization is at the heart of this trend. And because Linux and virtualization are practically synonymous, Linux customers can expect to benefit more than any other segment of the market.


So I don't really agree that it's just Linux customers. I think Virtualization is set for bigger goals. It will probably accelerate the "Kondratiev"* curve and help IT become a regular GPT (General Purpose Technology).

So the big picture: IT will change like never before.
Small picture: 2007. Lots of niche players (Thin computing, Desktop Virtualization, Provisioning tools, Mobile computing etc). Linux. KVM. Xen. Lots more.

So ask yourself this question: What kind of responsibility you'd rather shoulder. Help IT be like never before Or explode the market with an array of "clever rebranding"?

* I'll dedicate an article on how Virtualization is set to change the way we work and live on its road to becoming a regular commodity like water and electricity.

Check out Neil's report.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op