The Virtualization Practice
podio

Citrix acquire Podio – Podio’s focus is to provide a platform for small/medium sized organisations to get up and running with standard business function applications offered from Podio’s own App Store. Does this mark the a Citrix foray to better accomodate mobility and consumerisation while stepping outside the microsoft windows desktop delivery environment.

OnLive Desktop Inching Towards Viability

OnLive, the desktop pundits favorite DaaS provider, is one step closer to being able to offer a viable and fully compliant virtual “desktop” service following the stealth update of its platform from a Windows 7 based VDI service to a Windows Server 8 R2 Remote Desktop Services offering. While this move eliminates the threat to the service that attempting to run a set based on a licensing model that was not compliant with Microsoft’s licensing policies, OnLive is still not out of the woods.

CloudComputing

While at InfoSec World 2012’s summit on Cloud and Virtualization Security, the first talk was on Securing your data. The second was on penetration testing to ensure that data was secure. In essence it has always been about the data but there is a huge difference between what a tenant can do and what the cloud or virtual environment provider can do with respect to data protection and security. This gap is apparently becoming wider instead of smaller as we try to understand tenant vs cloud provider security scopes. There is a lack of transparency with respect to security, but at the same time there are movements to gain that transparency. But secret sauces, scopes, legislation, and lack of knowledge seem to be getting in the way.

Hotlink SuperVISOR – vCenter for Hyper-V, KVM, and XenServer

If you are going to have more than one virtualization platform, you should not have more than one virtualization management stack. Hotlink SuperVISOR lets you use the market leading virtualization console (vCenter) to manage other virtualization platforms like Hyper-V, KVM, and XenServer. Furthermore it extends the vCenter API data used by third party management vendors with data from these other platforms, turning Hotlink into the management data broker for the virtualization management industry.

Microsoft100x30

16 years after it introduced roaming profiles with the launch of Windows NT 4.0 Microsoft has decided to give it another go. In a blog post on Wednesday Karri Alexion-Tiernan (Director of Product Management for Microsoft Desktop Virtualization) announced the public beta of two new technologies, a major update to Microsoft App-V and an all new roaming profile solution User Experience Virtualization (UE-V). Both products will ship as part of a future Microsoft Desktop Optimization Pack (MDOP) release.

CloudComputing

There is a difference between outsourcing layers of your infrastructure and making the organization to whom you have outsourced those layers responsible for them, and losing all rights to change those layers in support of your business and application needs. Careful contract and product decisions need to be made in order to ensure that when you used a managed cloud service, you are not giving up the control you need to be agile and responsive to you business constituents.

DesktopVirtualization

Dell continues its expansion into the cloud and virtual desktop market with the announcement on Monday that it has reached agreement with Wyse Technologies to acquire the company.

Dell has had a long partnership with Devon IT,the Dell OptiPlex FX 130 and FX 170 thin clients and the Dell FX100 Zero Client are OEM editions of the Devon IT TC2, TC5, and TC10. Dell also OEMs Devon IT’s VDI Blaster software thin-client and its Echo Management Console software. All of which are considered to be high quality products. So if Dell already has access to its own thin client products and management software why did it need a thin client vendor of its own, and why didn’t it pick Devon IT instead of Wyse.

CloudComputing

VMware’s Project Octopus and others like ownCloud and Oxygen Cloud have stirred some interesting ideas about Application Security. Those applications that make use of SSL, nearly every web application, can make use of secure data storage for certificate verification means. What makes SSL MiTM attacks possible, is mostly related to poor certificate management. If there was a way to alleviate the need for the user to be involved in this security decision, then SSL MiTM attacks would be significantly reduced.