A change to the Microsoft Client Access License (CAL) bundle is a rare event – the last time it happened was about 10 years ago; so any change to the CAL bundle has to be seen as a significant indicator of Microsoft’s core values. Or so you would think. Assuming that is right, last week’s announcement at the Microsoft Management Summit of changes to the Core and Enterprise CAL bundles need careful analysis. Changes to the CAL are a strategic driver towards new product adoption and represents a clear indication of Microsoft’s long-term goals and aspirations. With that in mind we can infer from this latest change how Microsoft views desktop virtualization.
Cisco has announced the intent to acquire newScale. This puts the leading service catalog into the hands of Cisco, who will certainly pursue deep integration between newScale and the UCS – providing enterprise customers breakthroughs in provisioning and workload management agility. This also sets up Cisco and VMware to compete in the IT as a Service management stack business.
IT as a Service ...
• • 0 Comments
BlueStripe has integrated its applications topology views and end-to-end response time monitoring information into Microsoft SCOM. This creates an appealing solution to manage applications performance on a response time basis across virtualization platforms, and across both physical and virtually host applications.
With the diversity of cloud’s available today, data being sent from one to another could appear to be a hodge-podge of security. As one colleague put it recently when I asked what he was expecting to maintain integrity of data in motion between clouds:
“… what kind of kludge can things end up being when you have multiple connections to multiple hybrid clouds all doing different things” — Steve Beaver
So how does data transfer between the clouds? Is it a kludge? or can it be done using a uniform security policy, procedures, and protocols while maintaining Integrity and Confidentiality and auditability?
VMware released 3 versions of vCenter Operations, standard, advanced, Enterprise. We have already discussed the abilities of vCenter Operations vCenter Operations – vSphere Performance, Capacity and Configuration Management with Self Learning Analytics but is this an integrated and secure implementation of monitoring or do we need more security than what is provided?
At the time the first article was written there was a bit of vital information we did not have available to us. That is how to access vCenter Operations Standard or Advanced in a multi-tenant manner, that has now been provided. vCenter Operations Alive functionality can be accessed directly from a web browser using your VMware vCenter Credentials, which allows you to see the Alive status of any VM you have the permissions to view. This capability is a huge capability, as it now allows me to provide a non-vSphere Client mechanism to view the status of the virtual environment.
The VMware Community Roundtable, which is recorded every Wednesday, has been available for download from iTunes for the last couple of years or about as long has the podcast has been presented on TalkShoe.com. Other than the community podcast and The Virtualization Security Podcast there have not really been too many other things available on iTunes for VMware technologies or products. You could find a VCP study guide, VCP Exam Cram from Pearson Education and some other third party tools to control VMware vCenter from your iPhone and/or iPad. Within the last couple of years there have been hundreds if not thousands of iPads that have been given away at the different technology conferences and the sneak peak from VMware at these conferences, on the iPad application that they are working on, it was just a matter of time and that time has come with VMware releasing the VMware View for iPad and the VMware vSphere Client for the iPad.
Last week I spoke with two different Security as a Service vendors, each with their own approaches to security as a service. The first company I spoke to was CloudPassage who just exited stealth mode in time for RSA Conference, and Zscaler who is a well known company. Both provide Security as a Service with a similar approach by a different design. Both make use of large grids or computers to do all the heavy lifting of security, but from there they differ completely. While there is some overlap in the products, the different designs show us multiple ways to implement Security as a Service.
IT as a Service ...
• • 3 Comments
Transaction rate, an average response time goal, and an allowable upper bound, combined with transaction rate will come to define performance and capacity. These new metrics will get monetized allowing applications owners to shop for price/performance curves across internal and external service providers on a rational and economic basis.
Business Agility ...
Virtual Computer collaborates with Lenovo-NxTop the industry’s best enterprise-class type 1 client hypervisor?
• • 0 Comments
Virtual Computer are to optimize their NxTop client virtualization and management solution to operate with select models of Lenovo laptops and desktops PC platforms. For their part, Lenovo will allow customers to have Virtual Computer’s NxTop client loaded onto their custom images, direct from the factory. There are a number of client hypervisor solutions that can be used by enterprises today. The focus for these have been on security. At moment, the only vendor offering an enterprise ready PC management solution based on client hypervisor is Virtual Computer. The partnership withLenovo is likely first in line of tie-ups. Nxtop is Enterprise ready, with such deals Enterprises will be better ready for NxTop.