Feeds

Microsoft running late in virtualization

Hardware advantage to Linux?

  • alert
  • submit to reddit

3 Big data security analytics techniques

Microsoft's Next Generation Secure Computing Base (NGSCB), conceived originally as hardware-based Digital Rights Management (DRM) for Longhorn, is morphing into server virtualization, Gartner Group says.

The analyst expects NGSCB to appear in a second release of the Longhorn client, which it thinks will ship between mid-to-end 2007 and the end of 2008.

Virtualization is a relatively new category of server technology that is growing in importance, as vendors are forced to re-think the way they charge for their software. Among prime concerns is whether to charge a one-time fee or multiple fees for customers who use their software in virtual environments

Microsoft's expected shipment date for the much-delayed Longhorn operating system means that it will be late to market with virtualization and - critically - allow Linux a foothold in controlling the underling hardware. Earlier this year, Linus Torvalds' right-hand-man, Andrew Morton, said he would include the Xen open source virtualization technology in the next Linux kernel.

Virtualization technologies, also called hyperviser, are in the pipeline from the hardware manufacturers to. AMD and Intel are courting software vendors with their Pacifica and Virtualization Technology offerings.

At Gartner's Symposium and IT/xpo 2005 in San Francisco yesterday, Tom Bittman, Gartner's research director, spoke on the state of the Microsoft nation. He noted that: "Microsoft is late with hyperviser... Microsoft will ship [the first version of Longhorn], but it won't hold up the release."

Microsoft would also be late in setting pricing of software running in virtual environments. But he added that Microsoft "will have to be a leader in pricing changes in the next few years".

Gartner says the first Longhorn client could slip into 2007, from 2006 as promised by Microsoft, while the first Longhorn server will appear between 12 and 18 months after the client. ®

Related stories

AMD tells software companies to re-think dual core
AMD to reveal 'Pacifica' processor virtualisation spec
Intel drops 'Vanderpool' handle
Novell woos CeBIT with SUSE Linux 9.3

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.