Cisco and Citrix announced a joint initiative to drive mainstream adoption of Virtual Desktop environments through a five-year agreement to integrate technologies and jointly market their respective desktop virtualization solutions.
• • 0 Comments
Citrix have released XenClient v2.0, their second generation bare-metal client hypervisor. XenClient allows centrally managed virtual desktops to run directly on corporate laptops, even when they are disconnected from the network. This version is intended to add ease-of-use and scalability features, and introduce a wider hardware compatibility list. In addition Citrix also launched the new XenClient XT, a standalone product designed to give advanced levels of security, isolation and performance for organisations with very specific and unique client computing requirements.
Less than 5% of the applications that matter to enterprises world wide are under management by an APM solution that can help ensure application response time, application availability and the integrity of the critical transactions within the application. This is because first generation APM solutions have been too expensive to purchase, too limited in their scope and too expensive to configure, maintain and own.
• • 3 Comments
This month (October 2011) there are a slew of conferences on virtualization and cloud technologies being held in Europe. The question becomes which to attend! If you are in the United States, this could be expensive considering the current Euro to Dollar exchange rate but if you are already in Europe one of these events is well worth attending, each has there own take and focus. But after the success of VMworld US, is there anything more to announce?
Whether you are building a new or adding to an existing virtual or cloud environment on a shoestring budget, whether for work or for home use, there is quite a bit to consider before you purchase anything and it all boils down to your requirements which will dictate the technology you need for your virtual environment. In addition, this is a perfect time to address any deficiencies in your environment to not only address capacity issues, requirements, and security. Along with those considerations, planning the environment for the next three to five years can help shape the overall design. In fact that design, will be based on the answers from a growing list of questions.
There are few people who get to be classified as true innovators – among them Henry Ford, Thomas Edison, the Wright brothers. Steve Jobs has earned his place with these great agents of change. From the initial release of the Apple II, Jobs’ vision has changed the way we look at and interact with all of our technology.
Whether or not to put data into the cloud has been a debate since clouds were first formed. At a recent conference I was asked:
with all the security issues you brought up, why should I go to the cloud, I do not know the administrators, nor can I gain cloud visibility, so why go to the cloud at all? and if so which cloud?
There are a myriad of reasons to go to the cloud, not the least of which is politics or being told to go to the cloud. When the real question is:
which cloud services is my organization already using and how can I gain control over the data being placed into the cloud.
The focus upon sharing real response time and transaction load data by SalesForce.com is notable when compared with the pre-historic approach to performance that is used by many cloud vendors (and for a matter of fact many enterprise IT organizations). Response Time correlates directly to end user experience and at the end of the day that is all that matters. Hopefully the industry will learn from SalesForce.com and advance this concept further.
AFORE Solutions has created AFORE Cloudlink, which won the Best of VMworld for Security at VMworld 2011 in the United States. Yet, many people were scratching their head saying, who are AFORE and why did they win. AFORE moved from a physical appliance to a virtual appliance about 3 years ago providing a way to move data between data centers in an encrypted fashion, which at the time was desperately needed. After three years they have made quite a few changes, but still have their core functionality, but now included data at rest encryption and the ability to stretch layer-2 and layer-3 networks between locations amongst others.