So, Big Blue cranked up its PR machine, and pulled some statistics out of its, er, sales database and wanted everyone to know that more than 5,000 companies worldwide have replaced iron from HP, Sun Microsystems, and EMC since 2004 and moved to them to IBM alternatives.
Breaking this down a little, IBM is claiming that in less than one year, more than 150 customers have moved onto its System z mainframes from HP and Sun platforms. When pressed for more details about where these customers were coming from, IBM's PR people said they would get me some answers, but all I got was static. And since the inception of the so-called Migration Factory that IBM set up "several years ago," more than 1,300 customers have been moved to Power-based servers from Sun and HP platforms, and this year alone, another 800 customers have moved onto System x iron (which presumably also includes BladeCenter blade servers).
Yes, IBM is mixing different categories and different time scales, but this is what happens when people bicker. On the storage front, IBM says that since 2006, it has moved over 2,900 customers from EMC iron. (Any minute now, EMC will pipe up with how many IBM, HP, and Sun takeouts it has garnered).
vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus
Comments
Post a Comment