Feeds

VMware: We will virtualize entire world in six years

Deeper and deeper penetration

Application security programs and practises

VMware is unquestionably the bellwether of virtualization on the x64 server platform, particularly within corporate data centers that run companies not in the internet business. And among VMware's customer base, the penetration of virtualization is on the rise.

Virtualization use is not just expanding in terms of the percentage of workloads that are resting atop a hypervisor (and blissfully unaware that their operating systems are not in absolute control of physical hardware, as operating systems like to be). Virtualization is also being more widely applied to workloads, large and small.

Speaking at yesterday's launch of the vSphere 5.0 in San Francisco, VMware president and CEO Paul Maritz said that back in 2009, in the wake of the Virtual Infrastructure 3 launch a year earlier, about 30 per cent of the workloads among the VMware customer base running on x86 and x64 machines that could be moved to a hypervisor and virtualized. A lot of these workloads were relatively lightweight, what he called tier 2 and 3 software.

But after the vSphere 4.0 stack came out in 2009, significantly increasing the virtual CPU and memory capacity of a virtual machine as well as its virtual network and disk bandwidth, virtualization penetration at the x64 shops that are VMware customers continued to rise. By 2010, about 40 per cent of the workloads at VMware shops had been virtualized, and Maritz said that the company is expecting to break through the 50 per cent level by the end of this year. "50 per cent means there is still 50 per cent to go," Maritz said.

Interestingly, VMware believes it can add about 10 per cent of additional virtualization penetration per year going forward. The implication is that around five or six years from now, at the current pace, all of the workloads VMware can practically get on its hypervisors will be moved to an ESXi hypervisor. (There will no doubt be a smattering of Hyper-V, KVM, and Xen at VMware shops, of course.)

Wall Street, don't panic

The workloads on x64 machinery are growing, and growing fast, says Bogomil Balkansky, vice president of product marketing at VMware. He cites IDC data that suggests the workloads on x64 servers are growing at around 15 per cent per year, and the analysts at Gartner suggest it is more like 30 per cent per year.

Thanks to the fattening up of the ESXi hypervisor in the past three generations, and the increasing capacity of guest virtual machines running atop that hypervisor, as well as the increasing physical capacity of x64 machines, even a high level of overhead that might be incurred by using server virtualization can be technically and economically absorbed. And that is why some denser applications database and email servers, ERP suites, and other fat code ­are making their way onto hypervisors.

VMware virtualization penetration

Hypervisors are lifting heavier jobs in data centers

Clearly, companies that use VMware's ESXi hypervisor have no problem virtualizing their SharePoint servers, and they are getting used to the idea of virtualizing Exchange Server and SQL Server, too. It might surprise some people to see the penetration that VMware is getting with Oracle's middleware and databases in the past year, and the rate of virtualization for SAP suites has made the biggest jump in the past year. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.