Feeds

XenSource calls VMware a cash-hogging automobile

Open source explained through car talk, bandits

HP ProLiant Gen8: Integrated lifecycle automation

LinuxWorld XenSource CTO Simon Crosby wishes all the best for the folks at VMware. But he has one simple request; please stop hogging all the money.

Open source virtualization has a long way to catch up with VMware's slice of market pie, but Crosby assured a panel at LinuxWorld the industry will be a happier place if open code does keep pace.

So why is open source better for everyone? Crosby expounds using that time-tested old chestnut, the automobile metaphor; Xen sells an engine. VMware sells a car.

Selling the "engine" for virtualization alone lets vendors add their own value to the product. Vendors can customize the rest of the package to meet specific customer needs and get to use their own brand. Everyone gets a piece of the pie. It's the sort of strategy seen with the storage management pact between XenSource and Symantec announced last month.

Crosby said this model not only serves customers best, but creates a powerful ecosystem of vendors with a viable economic model. But for this vision to work, the code needs to be open source and available to everyone. Something like — oh maybe— Xen.

Meanwhile, VMware is providing the whole car. It might be sleek, shiny and complete, but what you see is what you get — all at the mercy of VMware. Their proprietary code may get VMware rich, but it leaves everyone else in the cold. And as VMware's platform expands, it's bound to step on partner's toes more and more.

"We want people to use our codebase and have everyone make out like bandits," said Crosby. "Otherwise, only VMWare makes out like bandits. That's not good for the rest of us."

Hey, everyone making money sounds great, but we can't help but think Crosby's engine is running on unleaded sour grapes. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.