One of the very first questions presented to the Virtualization Architects when planning and designing a new deployment, for as long as I have been working with virtualization technology. To scale up or scale out, that is the question and philosophy that has flip flopped back and forth as the technology itself has improved and functionality increased.
• • 0 Comments
The phenomenal growth of the tablet market has left many industry analysts scrambling to reassess sales forecasts for both tablets and PCs. Last week Gartner was forced to acknowledge that its previous forecasts were way off the mark when it issued a revised 2011 sales forecast that reduced its November 2011 PC sales growth estimate by a staggering 25%. Gartner research director, Ranjit Atwal, said his company had not fully appreciated the impact that tablet devices were having on the market, and the new figures “reflect marked reductions in expected near-term unit growth based on expectations of weaker consumer demand, due in no small part to growing user interest in media tablets such as the iPad.” Given that this is the same Gartner that in September 2010 instructed CIOs everywhere to go out and buy iPads, it shows just how badly it underestimated the tablet’s impact on the PC market. As tablet sales (and for the moment we can read that as being almost exclusively iPad sales) continue to cut in to sales of PCs and laptops, PC manufacturers are under pressure to offer their own alternatives and IT organizations are under similar pressure to provide ways to integrate tablets into their core service offerings.
vCenter Operations – vSphere Performance, Capacity and Configuration Management with Self Learning Analytics
• • 3 Comments
On the 2/24 Virtualization Security Podcast we were joined by Davi Ottenheimer and Michael Haines of VMware to discuss vCloud security. This is of quite a bit of interest to many people these days. As VMware adds more and more Cloud functionality, how to secure the environment is becoming more and more important. The podcast started with the question what aspects of the cloud do customers want secured. The answer was intriguing to say the least.
On the third Virtualization Security Podcast of 2011 we were joined by Charlton Barreto of Intel to further discuss the possibility of using TPM/TXT to enhance security within the virtual and cloud environments. We are not there yet, but we discussed in depth the issues with bringing hardware based integrity and confidentiality up further into the virtualized layers of the cloud. TPM and TXT currently provide the following per host security:
• • 0 Comments
In “A Perfect Storm in Availability and Performance Monitoring“, we proposed that legacy products from the physical environment should not be brought over into your new virtualized environment and that you should in fact start over with a horizontally layered approach, choosing a scaled out, and highly flexible product that can integrate with products at…
Given all the past ingenuity and accomplishment why is it, in 2011, the mere task of assigning valid licenses to desktop virtualisation should appear an arcane process?
How do different virtualization models impact how you license your desktop services? What are the current licensing models and do they apply in all instances of desktop virtualisation? Do the models impact on provisioning of services be they laptops, thin clients, Bring Your Own Computer (BYOC), or mobile devices?
Is desktop virtualization licensing an intentionally complex process and what other options could there be?
It is often very hard to plan which virtualization and cloud conferences to attend and why. You may need to start your planning now as justification from work could be hard to come by. It may mean you make the decision to go on your own dime. If you do the later, there are some alternative mechanisms that could work for the bigger conferences. The conferences and events I attend every year depend on my status with the organization hosting those events, and whether or not I can get a ‘deal’ as a speaker, analyst, or blogger. So what conferences do I find worth attending? That will also depend on your job role. There is one I would attend regardless of role, and a few I would attend as a Virtualization and Cloud Security person. All are good conferences.
When VMware first announced that it was going to license Teradici’s PCoIP protocol for inclusion in View 4.0, its most visible shortcoming was that VMware did not plan to update the View Security Server at the same time. Setting aside any debate as to the performance characteristics of PCoIP on the WAN, the lack of support for the View Security Server was a significant obstacle to widespread adoption of View in enterprise environments. So the inclusion of direct support for PCoIP tunneling through the View 4.6 Security Server comes as a most welcome update. Also included with View 4.6 are new USB enhancements, as well as support for Windows 7 SP1.