The Virtualization Practice

1040 search results for "vmware"

Indeed a challenge in migrating to a Hosted Virtual Desktop (HVD) solution is what to do with existing devices. Citrix’s High Definition User EXperience (HDX) technologies for example, typically relies on the end device supporting a Microsoft Windows operating system to deliver the best user experience. If that is the case, how will you manage the end device that delivers the user’s HVD? Vendors such as DevonIT, Igel, and 10ZiG would naturally suggest you replace your traditional PC with a Thin Client: vendors such as PanoLogic, Teradici and Wyse would highlight the advantages of Zero Client devices – yet moving away from existing devices is a costly exercise in terms of providing replacement devices. And indeed – still does not address off-line working.

Just as Milton Friedman (the Nobel prize winning economist) once said “There is no such thing as a free lunch”, there is also no such thing as free software. The minimum cost of a supposedly free piece of software is the opportunity cost of your time spent using it, and the forgone value of that time spent doing something else. Therefore neither Microsoft Hyper-V, nor VMware ESXi are really free.

Xangati for ESX is a line of virtual appliances providing real-time, continuous visibility into the activity of a VMware ESX/ESXi host, its virtual machines (VMs) and the infrastructure resources they use. Xangati for ESX products uniquely display the relationships between your VMs and other resources on your infrastructure in a continuous manner to answer questions…

I recently participated in the InformationWeek Dark Security Virtual Event as a panel member with Hoff, Craig Balding, Chris Wolf, Glenn Brunette, and Jon Oberheide. A very far ranging group of individuals from research, security organizations, analysts, and authors. What is interesting is that most of these same people have joined me on the Virtualization Security Podcast, and the others I hope to have as guests next year. There was one question that set me to thinking even more, do we need a new way of thinking about virtualization security?

The last Virtualization Security Podcast covered PCI, Kurt Roemer and Jeff Elliot who were guests represented PCI.  PCI as you hopefully know is working on compliance guidance for payment systems running within virtual machines and the cloud. This early discussion is a plea for people to get involved in reviewing the currently developing white-paper. While…

Applications Performance Management Vendors – Cross Platform Support

2010 will be the year that many enterprises confront two very important changes to how they will use server virtualization. The first change is that as VMware vSphere has proven its maturity, performance and scalability enterprises will increasingly put business critical tier applications, at least in part on virtualized platforms. The second change is that at the same time, these very same enterprises will start to evaluate virtualization platforms from other vendors, in particular Hyper-V from Microsoft.

Microsoft’s announcement yesterday of Massachusetts based Sentillion extends its reach into healthcare solutions and added a new component to its virtualization portfolio. Sentillion’s vThere is a type-2 hypervisor (hosted virtual machine) built on Parallels virtualization whose strength is in its ability to provide a highly secured desktop image on a normally non-secured solution.