AppSense, a leading provider of user virtualization technology, and Centrix Software, provider of unified end-user computing solutions, have announced a strategic partnership to provide organizations with a comprehensive, user-centric transformation program. Do you need a user-centric transformation program? How could this alliance help your business manage IT beyond the ‘single-PC-for-every-user’ era? If they can help you, are they your only hope? Will it justify your CFO’s iPad?
On 9/8 was held the Virtualization Security Podcast featuring Phil Cox, Director of Security and Compliance at RightScale, to discuss the impact of and need for automation of cloud security. Given that we create clouds by automating deployment of workloads we also need to automate the security of those workloads during the same deployment. This podcast delves into that need, and touches on where over automation is also a problem.
• • 0 Comments
Confio IgniteVM uniquely provides a consolidated view of resource utilization and latency across database servers like Oracle, SQL Server, DB2, and Sybase and the virtual machine layer, the physical host layer and the storage layer. This provides a valuable performance management perspective to DBA’s as well as to the virtualization team that often is held responsible for performance issues in database based applications.
Whether you use replication as a means of disaster avoidance or disaster recovery, replication of your virtual environment between hot sites has always been a win. With current technology it is even possible to replicate to a replication receiver cloud which could provide a measure of business continuity as well. So who are the players and who provides what service, and how do they do it?
• • 0 Comments
XenApp 6.5 is Citrix’s latest offering of their renowned Presentation Virtualisation (PV) service. Citrix are not alone in updating their feature set. Earlier in 2011 Microsoft introduced SP1 for 2008 enhancing the OS for the core Remote Desktop Services’ (RDS) session virtualization service, Ericom released PowerTerm WebConnect 5.7.1, ProPalms updated TSE to 6.5 and Quest announced vWorkspace 7.2 MR1.
“The latest challenge on the security front isn’t necessarily an exotic new threat vector: it’s the attackers themselves. They’re organized, well-resourced and patient. And there’s no silver technology bullet to effectively combat them.”
This is a very important point, and one that I have seen at other security conferences for the last 5 years or so. However, attacks are possible because there is a lack of confidentiality and integrity of the data held within the systems under attack. So the system becomes the week point.
There are many enhancements and new features that are part of VMware vSphere V5.0 from a storage and I/O perspective (See VMware vSphere v5 and Storage DRS posts). One of those enhancements is a new Application Programming Interface (API) called VASA (vSphere Aware Storage API) which joins other VMware vSphere APIs some of which are shown in table 1. Note that there is a three letter acronym (TLA) shown in table 1 that is part of the VMware vSphere 5.0 release that can be confused with VASA called VSA (VMware Storage Appliance) however for now, let’s leave VSA for a future discussion.
One of the cool things about attending VMworld every year is seeing what is new on the horizon and this year, ironically, there is something called Project Horizon and the first milestone of that project called VMware Horizon Application Manager. Horizon is a hosted service that will centrally manage the provisioning, access and usage of software-as-a-server (SaaS) applications while at the same time applying the companies standardized security and access controls. This will give the end users of the application the ability to use the applications via VMware ThinApp or View products to stream the application across multiple devices all with a single login. The end users will also have self-service access to a corporate store for their SaaS and Web-based applications. Managing these applications will be completely user based with no need to worry about the underlying device the software or application is running on.
If automated IT Operations is going to succeed and deliver its promised benefits then IT Operations is going to have to get reorganized – with supporting hardware teams part of the virtualization team. Furthermore Application Operations will have to be instantiated as a function that is responsible for the actual service level delivered by the applications to their constituents.