Barney's Blog

Blog archive

Virtual Survey Virtually Wrong

If you haven't read Virtualization Review magazine or its Web site VirtualizationReview.com, it's pretty good stuff. The print and Web versions are driven by Keith Ward, editor in chief. And Mr. Ward has a knack for calling 'em as he sees 'em.

I've been looking for some good research on hypervisor market share, but the most recent figures were from last fall -- not real current given that that's about when Hyper-V first shipped. Keith has a similar passion for real data, and was excited by a new survey by Virtualization.com that purported to detail which vendor has what share.

Keith is a journalist through and through. At first he was alarmed that the relatively new Hyper-V had the most share. That didn't make sense so he looked into the methodology and discovered...there was none! Vendors like VMware and Microsoft could load up the results, and load they did.

On the other hand, the leader of the Web site was pretty open about his approach and was clearly not trying to sell it as $100,000 Gartner report.

Posted by Doug Barney on 02/09/2009 at 1:16 PM


Featured

  • Microsoft Bolsters Windows IoT with NXP and SQL Server Support

    Microsoft's Internet of Things (IoT) product line is continuing to grow, with a few new developments highlighted this week.

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.