Oracle said Thursday that rival hardware vendors Dell and Hewlett-Packard intend to certify and resell its Solaris and Enterprise Linux operating systems as well as Oracle VM on their x86 servers. Oracle said Thursday that rival hardware vendors Dell and Hewlett-Packard intend to certify and resell its Solaris and Enterprise Linux operating systems as well as Oracle VM on their x86 servers.The announcement “demonstrates Oracle’s commitment to openness,” company co-president Charles Phillips said in a statement. In addition, Solaris is simply in demand for use on multiple x86 server platforms, he added.An HP executive put it another way. Many customers simply “have hardwired stacks of applications and infrastructure that can’t rapidly change,” said Paul Miller, vice president, solutions and strategic alliances, enterprise servers, storage and networking, in a statement.Users of Dell and HP x86 servers will be able to purchase Premier Support contracts from Oracle as a result of the agreement, and gain access to future updates. Questions have been raised on the latter front with regard to OpenSolaris, the open-source distribution of the Unix operating system. Frustrated by what they consider a lack of communication from Oracle, OpenSolaris governing board members have threatened to disband if conditions don’t change soon.Chris Kanaracus covers enterprise software and general technology breaking news for The IDG News Service. Chris’s e-mail address is Chris_Kanaracus@idg.com Related content news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe