Skip to main content

Citrix channel chief drilled

o you don't intend to replace VMware with XenSource? A customer could use both?
Monserrat: A person could use both. The intent is just to have it as an option. Ultimately, we trust the channel to drive those decisions.

What we foresee in terms of application delivery is [that] customers will always have mixed solutions. You always have specific individuals at an organization that want to use a typical desktop PC; you'll have individuals for whom a blade PC is the right solution; you'll have individuals for whom a virtual machine is the right one; and you'll have Citrix Presentation Server customers. Depending on the organization, depending on the actual users of the technology, the right choice may vary.

The benefits we have are that Citrix has nearly 200,000 customers. VMware is undoubtedly the No. 1 player in the virtualization market, but there's more than enough room for multiple companies to be successful in that space.

How can resellers make money selling XenSource?
Monserrat: For XenSource we are providing the same kind of profitable business growth opportunities that our channel partners have had with the rest of the Citrix product line in the past. The Advisory Rewards program that we have, we are going to adapt that program for the XenSource product.

Depending on deal size -- or if a reseller registers a deal -- resellers can make anywhere from 5% to 10%. That's 5% or 10% on the suggested retail price (SRP). We do run additional promotions for specific products, so for example this year, we've had an additional 5% bonus on the networking products.

When you think about the networking products in this example, [resellers] could be making the 10% on the deal plus the 5% bonus and -- because it's on SRP -- once you factor in any discounts that the channel may have had, they could be making 20% or 22%. That's actually very profitable for that space.



Link

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!