Feeds

Rooster Cogballmer

Microsoft virtualization splash on Monday?

Beginner's guide to SSL certificates

Remember Rooster Cogburn, that aggressive old man with one last stand left in him? Word is that Microsoft will make a splash on Monday around Hyper-V and System Center Virtual Machine Manager with a host of supporting supplier statements.

Microsoft CEO Steve Ballmer pictured as Rooster Cogburn

Microsoft CEO Steve Ballmer pictured as Rooster Cogburn

Anyway, it got me thinking ... Hyper-V is Microsoft's answer to VMware, the software that is itself an answer to Windows' appalling multi-tasking. Somehow a server can run more applications if, instead of the OS alternating resources between them, a hypervisor alternates resources between OS+app combinations. Seems odd to me, kind of like an interstate being able to take more trucks than cars. Then I'm no computer scientist.

We can look at Hyper-V as the traditional kill-the-competition Microsoft response which has been so successful in the past against things like Word Perfect, the Lotus spreadsheet and the Netscape browser. Or we can pause a mo' and think that maybe the world is changing. Adding new software integrated with your OS isn't going to cut it any longer for Microsoft.

Firefox is doing nicely and the assorted Berkely bunch, the aggregated Unix-Linux hordes, haven't been killed by Windows. Google has shown what a burst of great software engineering can do with Chrome - that browser flies like a fighter plane it's so quick.

Windows is a gigantic customer base across Server, PC, notebook and gaming console platforms but it is no longer all-powerful and alternate software platforms and apps exist and grow. Somehow I doubt that Netbooks will find Windows Vista much use. Why slim the hardware and load bloated software? (Dell's latest Inspiron uses XP and Linux and not Vista.)

Midori, the return to basics and think again, let's think the unthinkable and ditch the Windows legacy baggage, development shows that Redmond isn't about to relax into a keep-the-base-happy mode of operating, like Unisys say. But it isn't a spring chicken any more, strutting around instead like an ageing rooster. Is Steve Ballmer really Rooster Cogballmer? Is Hyper-V Cogballmer's last stand?®

Remote control for virtualized desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.