Skip to main content

Blackhole rush continues: Symantec devours Appstream

I will be writing an article soon on my blog and will talk about hobbits, orks, middle earth and how it is beginning to look the same with the mad rush to get a control of the data center stage.

But will all these firms still win the battle. My sharp warning is: No. Some have realized that they will have to face extinction. That is where I will try to demonstrate the M&A strategy and also align it with individual firmss' (or collective amalgam of all its aquirees) multi-mapped convergence cycles (global card, re-startup cycles and kondratieff effect)

I was talking to some folks in Cannes last month and suggested that Symantec will soon find its home in a bigger castle. That will be our case study when we do our first "M&A: Funnel Strategy and Puddle Convergence" test case.

So yes, you've heard it right, Symantec is just about as good (or bad) a candidate for acquisition as any other out there.

Blackhole is the Data Center BTW ;-)

But for now we will just carry out this report for you from David:

Today, I met with Ken Berryman, Symantec VP of EndPoint Virtualization Group, and Srinivasa Venkataraman, CEO of AppStream. When asked why the acquisition took so long (the company's have been working together for nearly two years as partners), Berryman said that Symantec was waiting to get the organizational structure together before bringing AppStream into the company. And at the same time, Symantec wanted to validate that there was a sufficient market for the technology. Both are now accomplished.

Organizational changes have taken place, and AppStream will be brought into the EndPoint Virtualization Group to join and remain part of the Altiris SVS Pro application virtualization product.

It is from this group that I expect to see some great new products hit the virtualization market in the next 12 months. The people who created and brought us Altiris SVS really know what they are doing and have created a successful application virtualization solution. InfoWorld put their product to the test in a shoot out against some of the competition back in September last year - one of those competitors was Thinstall now owned by VMware


Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to; 1st Jan 2009 live


I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)

Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…