Skip to main content

Who should acquire XenSource?

And why? I had posted a link on the rumours about Microsoft buying XenSource and now this rumour is playing that Citrix (a major acquiree-wannbee itself - is that a word? Now it is!) is contemplating getting itself a hypervisor. Is it a bait for Microsoft or Oracle? Is XenSource wanting to cash-in, realizing that the market momentum is a way too much out of reach? Or is it time for the big war, remember the Big Blue is coming at you. All of you!

Brian reporting:

But should Citrix be hypervisor agnostic? Remember that Citrix calls Desktop Server a “DDI” solution, which they define as a solution can be used to deliver three types of desktops: multi-user (Terminal Server + Presentation Server), blades, and VMs. This is all well and good, but the reality is that as server power increases, people are not using blades for desktop delivery (except in extremely specific circumstances). Citrix already owns the multi-user shared desktop with Presentation Server. So why not also own the whole solution stack in the VM desktop space? Citrix is currently hypervisor agnostic because they don’t own a hypervisor.

Now imagine if Citrix did own a hypervisor. They could sell a single product that would truly deliver desktops to users no matter where they were. The customer would only have to provide their own Windows images to make this all happen—Citrix could handle the rest. (And again, Citrix components like Ardence could greatly simplify this process.) Thinking like this, it’s easy to see why Citrix would want to own a hypervisor too.


Why isn't anyone talking about a VirtualIron acquisition? Anyways here's the link, do however note that it is speculative.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!