The Virtualization Practice

VMware has already demonstrated a penchant for using open source technologies to fundamentally disrupt the value propositions for the products from competing vendors in the systems software and applications platform businesses. This has put the operating systems businesses at Microsoft and Red Hat, and the applications platform businesses at Microsoft, Red Hat, IBM and Oracle under pressure, by providing a cost effective and fully functional alternative to the traditional licensed software models of these companies. It is entirely possible that VMware will pursue the same approach in the management software industry thereby disrupting the business models and product positions of CA, IBM/Tivoli, HP, BMC as well as many of the vendors currently in the VMware ecosystem.

We’ve been following Eucalyptus over a series of posts, and recently seen the company strengthen its management team with the appointment of new CEO Marten Mickos the (only) ex-CEO of MySQL. This week they have released a new version of the Eucalyptus product, Version 2.0. which carries some of his strategy, particularly in putting clear water between the Open Source and the Enterprise version of the product.

There is a great deal of marketing hype about which hypervisor is better but I have spent some thinking about this and really have to wonder if the hypervisor is what we should really be focusing or concentrating on. A lot of third party vendors are starting to port their products to be able to work with both hypervisors but what about the management server itself? When third party application vendors design their applications to work with VMware or Microsoft hypervisors they have been writing plug-ins for their product to work inside the management server systems and or its client.

Can we use some of this Risky Social Behaviors post to aid us in finding an adequate definition for secure multi-tenancy? Perhaps more to the point it can define how we look at multi-tenancy today. On a recent VMware Communities podcast we were told two things that seem contradictory to current security thinking. The first is that going to the cloud reduces your risk, and the second was that the definition of the cloud must include multi-tenancy.

Systems Management Frameworks have provided an indispensable function to enterprises with large and business critical networks and data centers. However, frameworks have become a category of expensive and slow to innovate legacy software leading many enterprises to conclude that they must move beyond these products in order to properly monitor their newest environments including those that are based on virtualization and public clouds. New virtualization and cloud focused tools are providing support for these environments that is not present in legacy management frameworks. Self-learning analytics may replace the frameworks as the “manager of managers” or new frameworks may emerge out of the open source movement.

I you buy vSphere 4 (or 4.1) after June 9th, you get a free copy of SLES to run on any CPU on which you have a valid license for vSphere. This lines up SLES on vSphere alongside Windows on Hyper-v, in both cases the O/S and the hypervisor are supplied under the same license. This obviously lines up SLES on vSphere alongside Windows on Hyper-v, in both cases the O/S and the hypervisor are supplied under the same license. In the long term, Licensing SLES leaves out a tantalizing prospect that VMware can build its own semi-official version of Azure, using vSphere, SLES and Mono, without a Windows server operating system in the mix.

Virtualizing tier 1 business critical and performance critical applications will require that the virtualization team be able to provide assurances about infrastructure performance and applications performance to the applications teams and their constituents. This is a dauntingly complex requirement to meet due to the fact that meeting it requires the integration of tools that are not integrated today, and that virtualization adds risk to the equation due to the dynamic behavior of virtualized systems.