There are some applications that are “never” going to go into a public cloud and the monitoring of those applications is not going to be done on a MaaS basis either. However, the ease with which these solutions can be purchased, initially deployed and then managed on an ongoing basis means that for applications that fit into a public cloud deployment scenario (you can live with the security and performance issues of the public cloud), MaaS is a very viable option for the monitoring of these applications and may represent the future of monitoring just as Cloud Computing may represent the future of computing.
The Consolidated server stack has been the big items over the last year using converged network adapters, blades, and integrated storage that is designed around providing an order-able element that is a single SKU that provides enough resources for a set number of VMs. Currently the VCE colition has the VBlock which combines VMware, Cisco, and EMC products into a single stack. HP has its Matrix stack. But where is IBM’s and Dell’s stacks. Could the acquisition of 3Par be the beginning of a integrated stack play from Dell?
VMworld is clearly the largest dedicated virtualization conference, and yet from an Open Source perspective it is slightly disappointing because the VMware ecosystem naturally attracts proprietary software vendors, and also some of the more interesting activities in Open Source are through multi-vendor foundations which do not have the same marketing budgets as vendors themselves.
Nevertheless, there are a number of key Open Source players, and some interesting smaller players, represented at VMworld.
• • 3 Comments
Virtualization Performance and Capacity Management spans Configuration Management, Resource and Availability Management, Infrastructure Performance Management, Applications Performance Management, and Service Assurance. A broad range of solutions in these areas exist from third party vendors as well as from virtualization platform vendors like VMware. Correctly choosing these solutions is essential for organizations that wish to virtualize business critical applications and guarantee the performance of both the virtual infrastructure and the applications.
Cloud Computing ...
, • • 2 Comments
The combination of Quest, Vizioncore and Surgient creates a company that for the first time has all of the management pieces required for an enterprise to be able to virtualize tier one applications and to automate the process of assuring service levels for these applications. This puts Quest in position to be a clear leader in the virtualization management market.
In the End-to-End Virtualization Security Whitepaper we review various aspects of server security with an eye to determining how the products would work together to create a secure virtual environment. While some of these tools are cross-platform, the vast majority of them are geared specifically to VMware vSphere.
In this post we will look at Server Security, and we will follow-up with another post about Desktop Security? Are these very different? I believe so, desktops have daily, second by second user interactions. For desktops, one of the most important aspects is look and feel such as response time for actions. So things need to be as fast as possible. With Servers however, user interactions are limited and therefore have slightly different performance and security requirements. What may be acceptable for a server may not be acceptable for a desktop. So what do the tools provide for servers?
Cloud Computing ...
• • 2 Comments
Cloud.com had lined itself up with Citrix by using only XenServer in the commercially-licensed version of its IaaS product, and now is being used by Citrix to ensure OpenStack supports XenServer (which it doesn’t at the moment), presumably to keep Red Hat’s KVM under control and VMware out. We’ve also been trawling through the available OpenStack documentation to understand why NASA thinks its cloud is more scalable than Eucalyptus. It seems to be all to do with how the state information is passed amongst the various servers that make up the system. GPL-based Open Core models break down when you move to multi-vendor foundations because the cross-licensing of IPR under GPL immediately infects the recipient codebase, and precludes commercial licensing of the resulting combined work. The result is that the GPL Open Core business model doesn’t work in the same way, and both Eucalyptus and Cloud.com cannot apply their current business model in these multi-vendor foundations. It is a big blow for Eucalyptus. They have turned their biggest potential customer into a massive and credible competitor, built in their own image (only – at least from a PR perspective – much more scalable).
In OpenStack the API is implemented in a separate service which translates external http requests into commands across the internal message bus, and so it looks (on the face of it) possible for someone (preferably Oracle) to implement the Oracle DMTF submission as a separable new API server module without disrupting the OpenStack architecture. In OpenStack the API is implemented in a separate service which translates external HTTP requests into commands across the internal message bus, and so it looks (on the face of it) possible for someone (preferably Oracle) to implement the Oracle DMTF submission as a separable new API server module without disrupting the OpenStack architecture.
Virtualizing business critical systems requires that a layer of virtualization management solutions be added to the virtualization platform. Virtualization management solutions in the areas of virtualization security, virtualization configuration management, virtualization service and capacity management, virtualization service and capacity management, virtualization provisioning and lifecycle management and backup and recovery should be added to the platform.
The Wall Street Journal had an interesting article on the United States General Services Administration has approved the acquisition of some cloud services for use by the Federal Government including many of the Google Apps such as Gmail, Google Docs, etc. Since these services are for sale as well as freely available this sounds more like an admission that they can be used. Will other governments follow suit? But should they be used? That is really the question.
There are two sides to any government, the classified and the unclassified. These are general terms that quantify how the government can use services. While all services require quite a bit of security, classified utilization requires even more, in many cases what most would consider to be “uber-security” requirements. The types of requirements that impact usability in some way. Can these tools provide adequate security?