VMware Acquires SpringSource
Virtualization provider VMware has purchased open source firm SpringSource for $420 million.
In May, SpringSource had itself bought Hyperic, the company behind the monitoring software by the same name. SpringSource and VMware release their software under open source licensing, albeit VMware not always in the most generous spirit. Nonetheless, the acquisition should not change the underlying open source strategy. According to VMWare's announcement, "VMware plans to continue to support the principles that have made SpringSource solutions popular: the interoperability of SpringSource software with a wide variety of middleware software, and the open source model that is important to the developer community."
The purchase will cost VMware about $362 million in cash and $58 million in stocks and options. SpringSource stockholders have already approved and the deal should close in the third quarter of 2009.
Strategically VMware wants to use the acquisition to broaden its presence in cloud computing, where computing resources are pulled from the Web instead of being processed locally. The rather nebulous concept still gets weight in their announcement as one of their goals to "deliver compelling new solutions that enable companies to more efficiently build, run and manage applications within both internal and external cloud architectures."
For productization, VMware has already chosen a partner in Siemens IT Solutions and Services. According to their joint announcement, the two partners will try to convince their customers of the blessings of cloud computing.
Experts believe that VMware, an EMC affiliate, has come under pressure in the virtualization realm ever since Microsoft released its Hyper-V drivers under General Public License. VMware, which had experienced a revenue explosion in 2008, was beginnning to show a slowdown in Q2 of 2009.
One stop shop for all manufacturing needsHi,
Seems like it’s a nice blog. So let us also add something useful in it. With all positive manufacturing data scope of import and export is increasing day by day. In mechanical field everyone want to have one stop shop for there manufacturing needs. So Relicaexpo is the ultimate solution for them.
. <a href="http://www.relicaexpo.com" title="Relicaexpo">Relicaexpo</a>
Different types of compression springsSprings as we all know are elastic objects that can store mechanical energy in it and can also consequently release it when required. Now springs can be classified into many types, depending on the properties that each spring possesses. One such property on the basis of which springs are classified is the load that each spring carries. On the basis of the load that each spring can carry, springs can be divided into three types, which are tension spring also known as extension spring, torsion spring and lastly compression spring. So you should have some idea about the different types of compression springs.
About compression springs
Let us deal on the various types of compression springs. But before we start explaining its types you should at first know what a compression spring is. The name compression springs it self suggest that it is a spring that can be compressed. But when dealt in details it refers to a spring which is designed in such a way, that whenever any form of compressive load is applied on the these springs, the springs gets reduced in its size. Generally by compression springs we usually refer to the coil compression springs but that does not mean that all compression springs are coil compression springs. In fact there are many other types of springs and even certain other objects which resemble a spring that can be used as compression springs in certain special cases and applications.
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm