Barney's Blog

Blog archive

EMC and Microsoft Extend Their Love

EMC and Microsoft have a tricky but generally positive relationship, one that has been formalized through long-standing interoperability and cooperative agreements.

The rub in all this was VMware, a company owned by EMC and which competes 100 percent with Microsoft. EMC played it smart and ignored VMware as if there was no connection at all. In the past, you could search through EMC.com all day long and not find a reference to VMware. But today, if you mosey over to EMC.com, you'll see that VMware has come out of its shell; it only takes an hour or so find detailed VMware product information.

Now EMC and Microsoft have come to terms with VMware, and a new cooperative Redmond-EMC agreement talks about virtualization -- though the details are less explicit than "Sesame Street," "Blue's Clues" and Barney the Dinosaur put together. I've read the press release and struggled to find some real details of how VMware and Hyper-V will work together.

On the plus side, the two companies are giving the right broad-brush messages: Interoperability is good. Now let's see how it all plays out!

Posted by Doug Barney on 02/09/2009 at 1:16 PM


Featured

  • Microsoft Bolsters Windows IoT with NXP and SQL Server Support

    Microsoft's Internet of Things (IoT) product line is continuing to grow, with a few new developments highlighted this week.

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.