Skip to main content

Virtual Iron signs global reseller agreement with Dell

Both Dell and Virtual Iron have a CEO on a war-footing. That helps companies define their "next-level" strategy much faster than the ones who aren't ready for change.

The news snippet:

Virtual Iron Software (www.virtualiron.com), a provider of enterprise-class server virtualization and virtual infrastructure software, announced a new worldwide authorized reseller agreement with Dell Corporation. Dell will work through Virtual Iron's distribution channel and resell the software to end-users as part of an extensive portfolio of server virtualization and storage offerings.

Dell servers provide an ideal platform for Virtual Iron and virtualization is a key component of Dell's scaleable enterprise strategy that aims to help customers cost-effectively scale, improve utilization and simplify IT operations. Virtual Iron simplifies enterprise server virtualization with a comprehensive solution that is easy to use and easy to afford. Many of Virtual Iron's existing customers run on the Dell Precision and Dell PowerEdge server platforms.

"We're running Virtual Iron on Dell PowerEdge servers and getting great performance and huge operational cost savings," said Paul Joncas, president and co-founder of Meganet Communications, Inc., a regional hosted server provider serving the New England area. "The efficiencies and advantages we gain using Dell and Virtual Iron translate directly into increased service levels and better performance for our hosted customers."

"End users are asking for a choice in server virtualization solutions as they look to refresh and 'virtualize' their data centers at multiple tiers including servers, network, and storage," said Mark Bowker, Analyst with Enterprise Strategy Group. "Virtual Iron's reseller agreement with Dell helps to position these options in front of the customer during the evaluation and purchasing process helping Virtual Iron become increasingly visible in a rapidly growing marketplace."



AndhraNews is covering it.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!