The Virtualization Practice

VMworld is clearly the largest dedicated virtualization conference, and yet from an Open Source perspective it is slightly disappointing because the VMware ecosystem naturally attracts proprietary software vendors, and also some of the more interesting activities in Open Source are through multi-vendor foundations which do not have the same marketing budgets as vendors themselves.

Nevertheless, there are a number of key Open Source players, and some interesting smaller players, represented at VMworld.

The countdown is on for one of the biggest virtualization conferences of the year, VMworld 2010 in San Francisco. I have been lucky enough to be able to attend all the VMworld conferences from 2005 on and the 2009 VMworld Europe in Cannes, France. These shows are pretty big and jam packed full of people, exhibits and sessions. Good old fun for the entire family!! Well not necessarily shared fun for the entire family, but if you have a passion for virtualization, then VMworld 2010 in San Francisco is the place you should be. Since it is San Francisco, you can even bring your entire family and your family can enjoy the Spouse Activities while you enjoy the talk about virtualization.

Virtualization Performance and Capacity Management spans Configuration Management, Resource and Availability Management, Infrastructure Performance Management, Applications Performance Management, and Service Assurance. A broad range of solutions in these areas exist from third party vendors as well as from virtualization platform vendors like VMware. Correctly choosing these solutions is essential for organizations that wish to virtualize business critical applications and guarantee the performance of both the virtual infrastructure and the applications.

The Virtualization Security Podcast on 8/5 was all about VMware vShield Zones and how the currently beta version will provide defense in depth, be a lever to achieve Secure Multi-Tenancy, and its impact on the virtualization security echo system. Dean Coza, Director of Product Management for Security Products at VMware joined us to discuss the vShield Zones Beta which consists of 3 parts given names and a nameless third part that was hinted at and we shall see more about at VMworld.

The Virtualization Practice’s Presentation Virtualization Comparison Whitepaper discusses PV in relation to business’ application and desktop delivery needs. This updated release adds Aqua Connect’s Terminal Services for Mac Series 3 to those products from Citrix Xenapp, Ericom’s PowerTerm WebConnect RemoteView, Geniut’s ThinWorx, GraphOn’s Go-Global, Microsoft’s Remote Desktop Services, Propalms’ TSE, Quest’s vWorkspace, Systancia’s AppliDis Fusion and 2x ApplicationServer.

The combination of Quest, Vizioncore and Surgient creates a company that for the first time has all of the management pieces required for an enterprise to be able to virtualize tier one applications and to automate the process of assuring service levels for these applications. This puts Quest in position to be a clear leader in the virtualization management market.

Have you ever considered the best way to plan, design and work with VMware Update Manager (VUM)? In the early days using VMware 3.x when VUM was first released, I would end up installing VUM on the vCenter server itself. After all, that was the recommendation from VMware at the time. I propose that this is no longer the case and I would like to present a list of best practices to follow when working with VMware Update Manager. This list came from VMware, but should only be considered as a guide. Each environment is different and your mileage may / will vary.

In the End-to-End Virtualization Security Whitepaper we review various aspects of server security with an eye to determining how the products would work together to create a secure virtual environment. While some of these tools are cross-platform, the vast majority of them are geared specifically to VMware vSphere.

In this post we will look at Server Security, and we will follow-up with another post about Desktop Security? Are these very different? I believe so, desktops have daily, second by second user interactions. For desktops, one of the most important aspects is look and feel such as response time for actions. So things need to be as fast as possible. With Servers however, user interactions are limited and therefore have slightly different performance and security requirements. What may be acceptable for a server may not be acceptable for a desktop. So what do the tools provide for servers?