Skip to main content

The Next VMware: Analyst lures market with a sweet story

If you are sitting in a strategy team within VMware or drawing huge loads of cash as fees drawing diagrams of where VMware should go next, then you'll find a lot of information here as well. You can refer to that material but be thankful if anything out of this blog inspired you to help VMware do its internal 2.0.

VMware has done something very hard, and indeed like my talk at ProFoss (download the slide here) in Belgium, it was all about being change ready. Operations think that someone else wants to hijack their systems, but do they even realize that they hold their own firm at ransom? I know, harsh words, but it's true.

I've always maintained, technology is not the challenge, human resistance is! Anyways Sranama is doing the Qualys guys some favor by giving them a hip intro at Forbes but in my opinion, the next VMware can be VMware itself! Or is she suggesting that Qualys is a buy and trying to lure some VC or a firm like Microsoft with a honey-coated story.

My real-time advice:

But trust me, going for big buys and hoping to reap big gains is passe! Go for smaller firms, and I know many who are entering this game and are looking for smaller rooms with smarter technologies to pack their high-density blades in shanghai who are much agile and fast. This is globalization people, at its very best. The trick is not in being and having the biggest and the fattest data center but on some dynamic 24x7x7 which breathes in and out as the world wakes up and sleeps, distributing workload across inexpensive commodity grids via continents.

They are sprouting as we speak, the the youngest second-mover has the 4th generation knowledge and equipment!

I'll still link you to her story, although it only gets your attention as far as the mention of VMware goes, the rest we all know. VCs are beginning to understand fine.

BTW: I'll be meeting several VCs as well in Cannes in the VMworld.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op