Skip to main content

More solid Virtualization acquisitions to follow, says "The 451 Group"

Well, I said that too, but lets see why the 451 folks thinks it is still worthwhile to throw chunks of greens to a virtualization vendor.

Potential targets

Qumranet is a different kettle of fish, a far smaller company than SWsoft. Unlike SWsoft it is venture-backed: Sequoia Capital and Norwest Venture Partners have taken stakes. Cofounders Benny Schnaider, Rami Tamir and Giora Yaron are Cisco Systems veterans, having worked together at Pentacom before it was sold to Cisco in 2000; CTO Moshe Bar hails from XenSource and Qlusters, the sponsor of openQRM. Qumranet is the creator, maintainer and sponsor of the KVM Open Source Project, the main open source rival to the Xen hypervisor. Qumranet is still in stealth mode, but it's planning to unveil its commercial offerings any day now to an extremely attentive audience.

Virtual Iron Version 4 is also slated for a VMworld release. While it's functionally equivalent, more or less, to VMware Infrastructure 3 (VI3), the Virtual Iron software uses the Xen open source hypervisor, so it competes directly with XenEnterprise 4. Virtual Iron Version 4 integrates Novell's (Nasdaq: NOVL) SUSE Linux Enterprise Server 10 kernel and drivers, LiveConvert for P2V and V2V from PlateSpin, a new graphical management interface, support for the new Xen 3.1 64-bit hypervisor, and extra support for operating systems and for Windows SMP.

And potential acquirers:

Potential acquirers

The embedded hypervisor vendors, Open Kernel Labs, Trango and VirtualLogix, are special cases, likely to be snapped up by their OEM customers like Ericsson, Qualcomm or (in the case of VirtualLogix) Texas Instruments (NYSE: TXN). The enterprise hypervisor vendors are a bit different. EMC (NYSE: EMC)-VMware and Citrix-XenSource have each in different ways demonstrated that there's considerable upside to an enterprise IT vendor in adding hypervisor technology. It's reasonable to wonder whether SWsoft/Parallels, Qumranet or Virtual Iron might do the same. Virtual Iron, for example, partners with almost all of the logical suspects: Emulex (NYSE: ELX), EqualLogic and QLogic (Nasdaq: QLGC) in storage; HP and IBM (NYSE: IBM) in systems; and Microsoft and Novell in operating systems.

SWsoft, though, is strongly hinting at acquisition plans of its own, perhaps in automation. We would argue that many of the most interesting M&A moves around virtualization are, in fact, beyond the hypervisor per se. HP's Opsware (Nasdaq: OPSW) and Neoware (Nasdaq: NWRE) acquisitions are great examples. Opsware is a force multiplier for systems administrators, letting each one manage many more operating systems, whether physical or virtual; and Neoware is exactly the right sort of thin client to sit in front of VMware's Virtual Desktop Infrastructure. Hypervisors are interesting targets, certainly, but there are equally interesting targets in adjacent markets that, like automation, thin clients and VM management, will feel the salutary effects of a sudden and overwhelming proliferation of virtual machines.

It still needs to be seen who will acquire what. Acquirers should NOT shy away from this "in-the-face" opportunity. I can imagine, that it might look a bit too predictable to make a move like that but it is time to do it, and the time is now!

Check out 451 group's post.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!