The Virtualization Practice

I was involved with the design and deployment of a small proof of concept that would introduce virtualization to a local SMB in my area. The idea was to build them something small that they would grow into and at the same time demonstrate all the really cool things that virtualization can bring to the table. I built a couple of hosts and deployed virtual center virtually, as well as added the VMware Management Appliance and the VMware Mobile appliance. It is really fun to get a chance to introduce virtualization to people, it is almost as fun as bringing a child to a candy store. Showing the client what they can do with virtualization as well as what they can do on their iPad is just priceless.

My answer to my computing needs is a very high end Windows 7 desktop, a very low end Windows 7 Netbook and an Android phone. I am and will always be a non-fan of the vertically integrated Apple model. I will probably always pay a price in terms of complexity of my computing life for this bias. But being a free market economist at heart, I like Shrek believe in the value of layers. I believe that processors, system software, device design, operating system design, applications development and content are all separate disciplines with completely separate bases of comparative advantage. I believe that attempts to integrate across these layers in a proprietary and closed way will fail. Windows computers have always outsold Mac’s for this reason. Android phones are already outselling iPhones for this reason. If Microsoft could get its act together on the phone and tablet front, it could restore the natural economic order of the marketplace to the device industry. But that is the subject of another post.

Application Security within the Virtual and Cloud Environments

Virtualization and Cloud Security architects, pundits, and writers like myself often talk about protecting the data within the virtual and cloud environments. However, in order to protect that data we need to be able to determine how the data will be used, accessed, modified, and eventually removed. So, how can we understand data security without understanding the application around it. But there is an even more fundamental problem, how do we define the application and the security measures we should take?

PerformanceManagement

Virtualization is such a profound change to how systems operate that it not only creates new management requirements, but it also breaks legacy management solutions. For these reasons, enterprises should look outside of traditional legacy management vendors for their virtualization performance and capacity management solutions. The focus should be on the richness of the virtualization aware functionality in the solutions, their support of multiple platforms, and how easy the solution is to try, buy and implement.

SSD options for Virtual (and Physical) Environments, Part II: The call to duty, SSD endurance

Let’s continue by taking a look at endurance for storing and retaining data using nand flash SSD. The importance of the first part of this series is to understand the basics of nand flash based SSD in order to make informed decisions on what is the best for your virtual or physical environment. In addition to SLC (high cost, improved duty cycles) and MLC (higher capacity, lower cost), there is also EMLC or Enterprise MLC which is striving for a balance between SLC and MLC characteristics.

Mitel and VMware combine technologies to Bring VDI to the Call Center

While desktop virtualization may never achieve the desktop dominance that was foretold by many analysts, new technologies continue to appear that both reduce costs and increase deployment opportunities. This week, Unified Communications (UC) vendor Mitel Networks announced its first foray into the virtual workspace market by announcing support for the VMware View UC APIs within its Contact Center Solution to offer contact center employees access to cloud-based unified desktop and communications services wherever they may be.

HP Delivers High Performance and Security to Thin Client Line

As Virtual Desktops become standard components of the entire desktop environment there are increasing demands on the end point devices to provide the performance of legacy desktop computers they are replacing. Devices with more memory, faster processors and expandable peripheral device support are quickly replacing the utility devices most associated with thin clients. On Monday February 13, 2012 HP announced the release a new class of thin client devices that are designed to address the end user performance needs and adds security architecture to combat increasing security threats.

The 2/9 Virtualization Security Podcast was a discussion on when would one use a virtual firewall. This was in response to being told that there are some people that would never use a virtual firewall for anything, and that got me thinking. Outside of the politics involved with using virtual vs physical firewalls, when would you use one? What are the cut offs, and best practices around using virtual firewalls. We were joined by Rob Randell of VMware to discuss this point.