The Virtualization Practice

Threat Analysis: Layers upon layers

When we think of the threat to a virtual environment or the cloud, what do we think about? First it is important to understand how the cloud is layered ontop of the virtual environment. Given a cloud stack, where are the entry points for SaaS, PaaS, IaaS, and Cloud management? At the recent Minneapolis VMUG I attempted to relay that information to the attendees. Once we understood the layers we could then concentrate on the threat vectors to the cloud and virtual environment.

The Virtualization Disaster Avoidance & Backup space has change fairly significantly within the last year. These changes are cumulative but have a great impact on the virtualization ecosystem. I include Disaster Avoidance in this review as there have been some great strides made in this arena that could impact the entire environment. Disaster Avoidance technologies were demonstrated at EMC World 2010 as well as at other conferences throughout the year. The impact was quite huge, but there are technological hurdles involved with its deployment within any organization.

Virtualization Backup vendors have pushed the envelope once more targeting fast backup and fast recovery of data as well as ensuring that the backups actually work. Here is a list of this years improvements in this space.

Net Neutrality and the Cloud

Cloud Computing will rely upon adequate Internet bandwidth being available to ensure that users of cloud computing services have an acceptable end user experience, and that providers of these services can promise that acceptable experience to their customers. The Internet needs a funding model that ensures that the right capacity is available to the applications (cloud services) that need it. We face a choice as to whether or not FCC regulation will help or hurt the progress towards the correct funding (and ultimately payment for Internet services model). Choosing incorrectly may severely inhibit the growth of Cloud Computing services due to confusion over bandwidth and pricing decisions.

The desktop virtualization year opened with a bang at CES with the explosion of vendor announcements introducing the next generation of mobile tablets. The obvious winner this year being Apple and the iPad but with many more vendors showing off Windows-based tablets including HP, Archos and Pegatron, as well as Android tablets from manufacturers such as Archos (again), Compal, Dell, HP (again), and Motorola. The key challenge of course being the delivery of existing enterprise applications onto these platforms, something that’s desktop virtualization and presentation virtualization is ideally suited for. The inescapable consequence of this was a steady stream of announcements from Citrix, VMware, and Wyse as they leapfrogged each other’s announcements on availability, functionality, and usability of their respective mobile tablet client offerings. The level of competitiveness here producing major benefits for potential adopters as each strove to outdo the other in terms of user experience innovation and performance.

It is the last few days of the year and time for a review of virtualization 2010. Although VMware was founded in 1998 it was not until 2001 that I first heard of VMware and played with the workstation product to be able to run different flavors of Linux. So for me, 2010 closes out a great year in virtualization as a whole as well as a decade of virtualization and what a ride it has been.

IT as a Service Reference Architecture

Implementing IT as a Service requires a virtualization platform, and virtualization aware configuration and change management, secure multi-tenancy, provisioning and lifecycle management, orchestration and automation, and service catalog. These capabilities are available from VMware, DynamicOps, Embotics, Eucaplyptus, ManageIQ, newScale, Quest, rPath and Reflex Systems.