Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment There can be huge differences in performance (Score 1) 361

Theres a nice little article here (basic reg. required) contrasting VMware and Citrix XenServer, where the end user was forced to abandon VMware (their default choice) after suffering performance problems and after 6 months of back and forth with tech support and engineering at the vendor. In the end XenServer delivered 2x the real world performance on identical hardware with a default install. Not all workloads are equally well virtualized! N.

Comment Re:I'm guessing VMWare isn't that worried (Score 1) 259

Re: unsupported trials.

If you'd dropped my company a line we'd have offered a supported trial with an allocated engineer (okay, time spent would depend partly on potential size of a deployment...) but you'd certainly have spent nothing finding out what the product could and could not do in a supported way. We'd probably both have learnt something, I love real-life tests :-) Sometimes there are benefits in NOT buying direct off the vendor's web store :-) End of outrageous plug! Oh, we also do VMware, I guess what Im saying is that deployment is about more than just the upfront sticker price of the product.
PK

Comment Has to be good news for the customer because.... (Score 1) 259

it will provide free access to competitive technology, keep the established vendor(s) straight, and (eventually) will give rise to cross-platform management tools and frameworks.

At last it looks like there will be a free, supported, commercial-grade virtualization solution for those of us who dont have the budget for VMware and have been disappointed with Hyper-V and its predecessors.

I can only imagine this is unhappy news for VMware who surely must now take a reality check on their pricing. I sincerely hope they do not go the same way as Netscape, having 3 strong vendors in the market stops a lot of the kind of bad behavior you see from ERP, CRM, and BI vendors (you know who you are guys!). There was a balanced 2 minute comparison of Hyper-v, XenServer, and VMware over at the 360 blog here.

For the VMware, Xen, and Hyper-V fanboys (are there any Hyper-V fanboys yet?), calm down and take a tip from that blog:

"Providers of the core hypervisor technology will continue to play a game of technical leapfrog with one another for at least a couple of years, while those with a management, enterprise framework, or suite will claim more strategic long-term positions around "liquid infrastructure" or something else suitably bendy. What is most important right now is that you have the right information processing architecture, not any one particular product within it."

Security

Submission + - 7 Wonders of the Security Software World (360is.com)

nickh01uk writes: "The guys over at Three Sixty Information Security have published the results of their annual analysis on 7 of the most popular security tools in common use by systems administrators. The articles examines the tools on their merits and attempts to pull together common threads running through each. Finally they put forward their answer to the question "What makes this software so uncommonly good?" If only all software was written like this..."
Security

Submission + - The Characteristics of Secure Software (360is.com)

nickh01uk writes: "Particularly topical in light of the widely reported Cisco IOS software vulnerability, Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating the robustness of future software. Finally it attempts to answer the question; "What makes this software so uncommonly good?""
Security

Submission + - Web under attack by Al Qaeda

shanen writes: Don't put my name on it, and I'm not going to provide any evidence, but if you dig around a bit, maybe you can find it. Just a tip to let you know the Internet is under attack by Al Qaeda sympathizers.
Security

Submission + - The Secret Sauce In Secure Software (360is.com)

An anonymous reader writes: Researchers at independent Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating future projects. Finally it attempts to answer the question; "What makes this software so uncommonly good?"

The results may surprise you.

Programming

Submission + - What makes for secure software? (360is.com)

An anonymous reader writes: Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating future projects. Finally it attempts to answer the question; "What makes this software so uncommonly good?""
Security

Submission + - Researchers Discover the Secret To Secure Software

nickh01uk writes: "The guys at Three Sixty Information Security have published the results of their analysis on 7 of the most popular security tools in common use by systems administrators. The articles examines the tools on their merits and attempts to pull together common threads running through each. Finally they put forward their answer to the question "What makes this software so uncommonly good?"

From TFA, the recommended tools are: nmap, ssh, syslog-ng, postfix, rsync, and sudo."
Networking

Submission + - Nmap from an Ethical Hacker's View Part 1 (ethicalhacker.net) 1

ddonzal writes: "What, another Nmap tutorial? Yes that's true, but I am hoping to approach it a little differently than what I have seen available. I want to describe Nmap from the viewpoint of an ethical hacker and at the same time give a clear, step-by-step method of attaining a good level of proficiency. After completing this 2 Part Series and having practiced the techniques described, one should not only be able to sit at a "roundtable" with advanced security professionals and "hold their own" in a discussion concerning Nmap, but also utilize this great tool in protecting their own network. http://www.ethicalhacker.net/content/view/155/1/"
Security

Submission + - What makes a great security tool? (360is.com) 1

Anonymous Coward writes: "Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating future projects. Finally it attempts to answer the question; "What makes this software so uncommonly good?""
Linux Business

Submission + - Citrix Announces Acquisition of Xensource (citrix.com) 1

dch24 writes: Citrix announced today in a press release that they will acquire XenSource for $500M. Over at ZDNet UK, "XenSource is a small company, claiming 500 paying customers and 5,000 production users."

This comes hard on the heels of the VMWare IPO. An eWeek article suggests, "The Citrix-XenSource deal might pressure VMware to drop the price on some of its products. To increase the pressure, Citrix announced that it will begin selling XenSource's products through its roughly 5,000 channel partners."

How will this affect the open-source Xen hypervisor? The press release says, "The acquisition will also strengthen each company's strong partnership with Microsoft and commitment to the Windows platform." Does that mean a change in direction?

Slashdot Top Deals

"And remember: Evil will always prevail, because Good is dumb." -- Spaceballs

Working...