The Virtualization Practice

Now, of course, this is a simplified version of the question, because in almost all cases Infrastructure Clouds and Platform Clouds are built on Virtual Infrastructure, and in most cases Platform Cloud is built on Infrastructure Cloud, so the question is really about how far into the Cloud you should be prepared to go. My perspective here is of a development manager – someone who is charged with building a new application. I’m thinking as a development manager not a developer and I’m taking decisions to maximise the productivity of a development team – rather than on the “shininess” of the technology.

After many months of delay, VMware has finally made some progress towards delivering a PC-over-IP View client for Mac OS X. Given VMware’s constant affirmation that we are entering a post-PC world, it has been difficult to understand quite why VMware has failed to embrace the Apple Mac as fully as it might. The most visible aspect of this shortcoming has been VMware’s failure to provide support for the Teradici PCoIP remote display protocol in its View client for OS X. VMware is finally taking steps to address this deficit by releasing a Tech Preview of its View Client with PCoIP for Mac OS X.

Christmas is over and New Years is on its way. A time to make resolutions and see the year complete. A time to review what is old and plan for the future. This is a perfect time to review your defense in depth and look to see if there are security additions needed in 2012. So what cloud and virtualization security New Years resolutions should I make for 2012?

The 2012 Cloud Management Challenge

Private cloud management offerings are today very well suited to create and manage self-service scenarios for workloads that are either transient, or that require significant scaling of resources during the daily or weekly cycle of business activity. Private cloud management offerings are today not well suited to be the management solution through which all future workloads get provisioned an managed – but must become so, so as to participate in the further progress of virtualization. The best way for private cloud solutions to leverage the further progress of virtualization, is to help drive it- by helping to drive the concept of automated service assurance for business critical applications.

News: Wyse Extends PocketCloud to Personal Cloud

Following its recent acquisition of Trellia, Wyse Technology is further extending its software portfolio with the launch of a new PocketCloud app for Android users: PocketCloud Explore. PocketCloud Explore provides file search and transfer between the Android device and Windows and Mac PCs through a secure connection to an agent, the PocketCloud Companion, that is installed on the remote PC/Mac.

It has been a while since we last updated our Presentation Virtualization Solutions whitepaper. Has nothing happened in the market in 2011? On the contrary, there was a good deal going on for Presentation Virtualization in a year that saw a new benchmark setting XenApp release from Citrix, Apple remove terminal services functionality, RES Software launch their reverse seamless technology and Ericom their HTML5 client.

While the legacy enterprise management vendors might like to think of themselves as the Borg (prepare to be assimilated – there is no escape), the new technical requirements and the new buying patterns in the virtualization market do not lend themselves to a repeat of history. Legacy management vendors are unlikely to be able to acquire themselves into this market because their core platforms and business models do not work with the customers who are running virtualized environments and buying management solutions. So to my good friend Andi Mann, I respectfully disagree.

Data Protection is still an issue with many small businesses and smaller enterprises who virtualize; Specifically around the Data Protection Process and eventually where to store the data. When I speak to people they are struggling with whether or not to place the data on tape, blu-ray, into the cloud, or other disks. Medium and Large Enterprises already have such policies in place, but like everything else, when they virtualized the policies may have fallen by the road side and now need to be recovered, dusted off, and put into practice. The choice of where the data will ultimately reside when disaster strikes is an ongoing discussion in the virtualization community. Ultimately, Data Protection is just that, protecting the data from loss, destruction, and allowing for quick recovery.

There needs to be better Data Loss Prevention applied to Social Media than there exists today and how that will be applied globally is a huge issue. But it is a growing trend. I see on twitter from those I know many things that should not appear: from the discussion of internal only intellectual property to locations sent to 4 square. Add into this, the myriad forms of ‘U There’ requests. It is so easy to tell people anything on twitter, that it also becomes a problem with telling people too much even in 146 characters. Yet, I also see the same when using text messages, chat, and other technologies. So what is the solution?