Feeds

Oracle buys Virtual Iron

Pocket change for some Xen experts

Application security programs and practises

Software giant Oracle has announced its purchase of server virtualization wannabe Virtual Iron, confirming months of rumor.

Having already grabbed the open source Xen hypervisor as the basis of its free-standing Oracle VM hypervisor, Oracle did not need Virtual Iron for its own VT and AMD-V dependent implementation of Xen. But Virtual Iron has some expertise and management tools that Oracle needs if it hopes to compete against Red Hat, Microsoft, Citrix Systems, and VMware as they are delivering better server virtualization tools.

Virtual Iron started out as Katana Technology when it launched back in 2001, and it created a sophisticated clustering technology called VFe that could lash together multiple x86 and then x64 servers into a single system image supporting SMP-style memory sharing across up to 16 processor sockets and using InfiniBand fabrics to link the server nodes together. This is distinct from Oracle's Real Application Clusters, or RAC, clustering, which is a distributed database clustering tool that makes multiple nodes work together to do transaction processing and which manages those nodes as if they were a single system image.

Katana's VFe actually created a single image out of clustered machines, and it is debatable how well the software worked. It just so happened that VFe had its own virtualization hypervisor, which allowed a partition on this cluster of machines to be as small as 1/16th of a core all the way across all 16 cores in the system, with a maximum of 128 partitions per clustered systems.

This all sounded very cool - but InfiniBand didn't take off, the dot-com bust hit, and the VFe hypervisor wasn't compatible with VMware's ESX Server and the emerging alternative, the Xen hypervisor. And so Katana changed its name to Virtual Iron, dumped InfiniBand system clustering and its own VFe hypervisor, and transformed itself into a provider of a Xen hypervisor with an alternative set of system tools derived from the VFe stack.

By September 2005, Virtual Iron had raised $28.5m in three rounds of venture funding, backed by Intel Capital, Goldman Sachs, Highland Capital Partners, and Matrix Partners. Intel also agreed to help Virtual Iron tune its software for the on-chip VT virtualization features in its Xeon processors.

With the money and a revamped Xen stack, Virtual Iron tried to set itself up as a cheaper alternative to VMware and a better Xen implementation than the one that XenSource, the company behind the Xen project, delivered to the market. But once VMware went public, Citrix Systems bought XenSource, and Microsoft got its freebie Hyper-V into the field, Virtual Iron - even with its $65m in total venture funding - was just not up to the task of taking on these three companies. It has been very quiet in the past year after being very aggressive for the prior three.

Oracle put out a statement about the Virtual Iron deal, saying that until the transaction closes Virtual Iron will operate separately; it did not say how much it paid to acquire Virtual Iron, either. In a presentation on its website, Oracle said that it is reviewing Virtual Iron's product roadmap, and will eventually give Virtual Iron's customers guidance on product roadmaps and any changes in features or timing in the wake of the deal.

Oracle also wanted to be very clear that the product roadmap information provided by Virtual Iron in the past or Oracle in the future "does not represent a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decision." It expects the deal to close this summer, and at that time it will talk about how the Virtual Iron tools will be woven into its Oracle Enterprise Manager tools. In the meantime, Virtual Iron's tools are still being sold and supported.

The main bits of the Virtual Iron tool stack that Oracle was interested in are CPU and storage capacity management and power management, all features that Citrix and VMware have focused on in their latest hypervisor stacks (Essentials for XenServer 5.5 and vSphere 4.0, respectively, and neither shipping yet.)

Virtual Iron had also created a set of scriptable APIs that allowed system administrators to link the management of their Xen VMs into their other system management frameworks so physical and virtual machines can be orchestrated from a higher level and with the same tools. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.