Skip to main content

The Next VMware: Analyst lures market with a sweet story

If you are sitting in a strategy team within VMware or drawing huge loads of cash as fees drawing diagrams of where VMware should go next, then you'll find a lot of information here as well. You can refer to that material but be thankful if anything out of this blog inspired you to help VMware do its internal 2.0.

VMware has done something very hard, and indeed like my talk at ProFoss (download the slide here) in Belgium, it was all about being change ready. Operations think that someone else wants to hijack their systems, but do they even realize that they hold their own firm at ransom? I know, harsh words, but it's true.

I've always maintained, technology is not the challenge, human resistance is! Anyways Sranama is doing the Qualys guys some favor by giving them a hip intro at Forbes but in my opinion, the next VMware can be VMware itself! Or is she suggesting that Qualys is a buy and trying to lure some VC or a firm like Microsoft with a honey-coated story.

My real-time advice:

But trust me, going for big buys and hoping to reap big gains is passe! Go for smaller firms, and I know many who are entering this game and are looking for smaller rooms with smarter technologies to pack their high-density blades in shanghai who are much agile and fast. This is globalization people, at its very best. The trick is not in being and having the biggest and the fattest data center but on some dynamic 24x7x7 which breathes in and out as the world wakes up and sleeps, distributing workload across inexpensive commodity grids via continents.

They are sprouting as we speak, the the youngest second-mover has the 4th generation knowledge and equipment!

I'll still link you to her story, although it only gets your attention as far as the mention of VMware goes, the rest we all know. VCs are beginning to understand fine.

BTW: I'll be meeting several VCs as well in Cannes in the VMworld.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

OS Virtualization comparison: Parallels' Virtuozzo vs the rest

Virtuozzo's main differentiators versus hypervisors center on overhead, virtualization flexibility, administration and cost. Virtuozzo requires significantly less overhead than hypervisor solutions, generally in the range of 1% to 5% compared with 7% to 25% for most hypervisors, leaving more of the system available to run user workloads. Customers can also virtualize a wider range of applications using Virtuozzo, including transactional databases, which often suffer from performance problems when used with hypervisors. On the administration side, customers need to manage, maintain and secure just a single OS instance, while the hypervisor model requires customers to manage many OS instances. Of course, the hypervisor vendors have worked hard to automate much of this process, but it still requires more effort to manage and maintain multiple operating systems than a single instance. Finally, OS virtualization with Virtuozzo has a lower list price than the leading hypervisor for comme...