The team at Sun continue to update VirtualBox – 3 releases in 1 month. Of these the 3.0.12 release (November 17) and the 3.1.2 release (December 17) were maintenance releases with bug-fixes, whereas the 3.1.0 release (November 30) was a fairly substantial release containing new features, including Live Migration.
• • 3 Comments
Just as Milton Friedman (the Nobel prize winning economist) once said “There is no such thing as a free lunch”, there is also no such thing as free software. The minimum cost of a supposedly free piece of software is the opportunity cost of your time spent using it, and the forgone value of that time spent doing something else. Therefore neither Microsoft Hyper-V, nor VMware ESXi are really free.
Xangati for ESX is a line of virtual appliances providing real-time, continuous visibility into the activity of a VMware ESX/ESXi host, its virtual machines (VMs) and the infrastructure resources they use. Xangati for ESX products uniquely display the relationships between your VMs and other resources on your infrastructure in a continuous manner to answer questions…
• • 2 Comments
I recently participated in the InformationWeek Dark Security Virtual Event as a panel member with Hoff, Craig Balding, Chris Wolf, Glenn Brunette, and Jon Oberheide. A very far ranging group of individuals from research, security organizations, analysts, and authors. What is interesting is that most of these same people have joined me on the Virtualization Security Podcast, and the others I hope to have as guests next year. There was one question that set me to thinking even more, do we need a new way of thinking about virtualization security?
Cloud Computing ...
• • 0 Comments
The last Virtualization Security Podcast covered PCI, Kurt Roemer and Jeff Elliot who were guests represented PCI. PCI as you hopefully know is working on compliance guidance for payment systems running within virtual machines and the cloud. This early discussion is a plea for people to get involved in reviewing the currently developing white-paper. While…
• • 1 Comment
2010 will be the year that many enterprises confront two very important changes to how they will use server virtualization. The first change is that as VMware vSphere has proven its maturity, performance and scalability enterprises will increasingly put business critical tier applications, at least in part on virtualized platforms. The second change is that at the same time, these very same enterprises will start to evaluate virtualization platforms from other vendors, in particular Hyper-V from Microsoft.
• • 2 Comments
When considering your VDI deployment hosting your workspaces is not the only consideration. Careful consideration needs to be made on the management of the performance, license use and user’s environment to give, not only a good user experience, but a timely return on your investment.
Microsoft’s announcement yesterday of Massachusetts based Sentillion extends its reach into healthcare solutions and added a new component to its virtualization portfolio. Sentillion’s vThere is a type-2 hypervisor (hosted virtual machine) built on Parallels virtualization whose strength is in its ability to provide a highly secured desktop image on a normally non-secured solution.
• • 0 Comments
There has been quite a bit of discussion between myself, Tim Pierson, and other with respect to SSL man-in-the-middle attack possibilities within the virtual environment. But what are the chances that such an attack will happen, or that someone would know how to perform the attack? What does the attack depend upon?