Feeds

Red Hat's open virtualization mob signs up 200 members

Assault on VMware grows

  • alert
  • submit to reddit

Remote control for virtualized desktops

The Open Virtualization Alliance (OVA) – the Red Hat-led corsortium that's campaigning for open source alternatives to the VMware hypervisor – has grown to 200 members since its launch in May.

On Monday, the OVA said that many of the new members come from emerging markets in Asia and Latin America and over half of its members are focused on cloud computing in their day-to-day business. Recent sign-ups include NEC, Hitachi, Platform Computing,and Tripwire.

"The tremendous growth in OVA membership is a very encouraging sign of the interest and potential for KVM in emerging markets and in the cloud, where open virtualization is poised to be a key technology. Over 200 members in three months is a rapid pace and really builds a solid foundation for a robust alliance,” read a canned statement from Gary Chen, research manager of enterprise virtualization software at IDC.

“With such a solid, and still growing, member base, it will be interesting to see what kind of output and influence the alliance can generate in the near future to promote KVM."

The goals of organization are ostensibly to promote open source virtualization, but some have pointed out that the bulk of the group’s efforts seem to be about promoting the Kernel-based Virtual Machine (KVM) software from Red Hat. It was inspired by the massive market share of VMware, and so far seems to be having minimal effect on Paul Maritz’s virtualization juggernaut, which has over 75 per cent by some counts.</pg>

The group also faces renewed competition from Microsoft, which spent last week extolling the virtues of Windows 8 Server as a virtualization platform, amid copious digs at VMware for perceived failings. Redmond said that this third attempt to offer virtualization tools for business in Windows will be its most complete ever and provide a valid competitor product to VMware. ®

Intelligent flash storage arrays

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.