Skip to main content

2008: Tech outsiders to start using the term "Virtualization"

Well my wife and the rest of my extended family (here is Holland and India) already uses it! Thats what WBJournal thinks:

Research firm IDC predicts that spending on virtualization technology will surpass $15 billion worldwide in three years. More than double what it was in 2006.

And competitors and colleagues scattered throughout the region have big expectation for the technology in 2008. That's because the area is home to a number of other smaller companies that also specialize in virtualization technology.

"If you look at 2007, virtualization really started to get on people's radar screens, and some of that has to do with VMware," said Susan Davis, vice president of Marlborough-based virtualization firm Egenera. "But what has really been driving it is the recognition by everything from developers to large corporations that computing has become incredibly inefficient and this is a way to change that."

A number of other companies are already integrating virtualization technology into their products. Framingham-based server firm Netezza, for example, uses the technology in some of its products. Scali Inc. in Marlborough specializes in a form of virtualization known as clustering.

"Certainly from the vendor landscape there are more and more companies using it for a myriad of issues," Davis said. "And from a customer's perspective it represents a lot of opportunity where the technology can address a lot of problems they face."

The virtualization movement - and the growth enjoyed by companies specializing in it, builds on the recent successes of other MetroWest-area companies with products specialized in re-tasking the ways large organizations use data.
Its going to be an exciting year, thats for sure. I am interviewing PanoLogic today and we'll carry on this discussion there as well. I will post the written Q&A the minute I have them. I plan to talk to Dione , VP and Aly, CTO this week.

We will also start doing the recaps, starting by talking to our great friend, Ratmir, a really cool entrepreneur who is the CEO of Veeam , we did chat up last year when Veeam was sprouting up, we want to see how our friends are doing all the time.

So you get it, we want to walk with the "then startups, now established" leaders to watch where they are going. We don't just make friends, we want to keep them for life!'s the link to WBjournal.


Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to; 1st Jan 2009 live


I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)

Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…