On October 22nd, Microsoft announced that it has partnered with Cloud.com to provide integration and support of Windows Server 2008 R2 Hyper-V to the OpenStack project. The announcement caused a great deal of interest here at the Virtualization Practice, as it signals an unexpected willingness on Microsoft’s part to pursue interoperability at the IaaS layer, allowing users to break out of the Hyper-v stack, whilst still retaining Hyper-v at the bottom. The fact this announcement came from Microsoft (not Cloud.com, Rackspace or OpenStack) seems to signal the seriousness of the intent.
• • 0 Comments
Wyse Technology has announced a new computing platform designed to capitalize on the growing market for cloud hosted virtual desktop environments that has the potential to un-jam one of the most emotive roadblocks towards the widespread adoption of desktop virtualization. Announced at Microsoft’s Tech Ed conference in Berlin, the Wyse Cloud PC presents an intriguing twist in the junction between desktop virtualization and thin client technologies that gets right to the heart of many IT professionals opposition to desktop virtualization.
• • 0 Comments
rPath has delivered automation for a crucial process, the management of software deployment across these new dynamic and scaled out environments that no one else has addressed, and that addresses a critical source of friction and errors for enterprises seeking to benefit from the agility inherent in the new ways of building and operating applications systems.
• • 6 Comments
Is virtualizing Citrix XenApp a waste of time and effort? In spite of the hardware abstraction allowing easier image management and OS upgrades; in spite of options for higher availability and faster recovery, even fail-over; in spite of enabling silo consolidation; in spite of enabling managing user capacity on servers – especially for x32 environments, but also x64; … what could virtualization of your Presentation Virtualization environment possibly do for you?
I was invited to CSI 2010 this year to speak on the Low Hanging Fruit of Virtualizaiton Security. This presentation brought to light some simple to implement features that would give you the most security for what I consider very little cost or effort. These 7 items if implemented will improve the overall security of your virtual environment.
I got a call from a client today that is running a VMware ESXi server as a proof of concept in their SMB environment. The admin that setup the VMware ESXi Server configured the ESXi server to boot and run ESXi from a USB memory stick. Things have been running fine but the company and the administrator that setup the server had a falling out, so to speak, and the administrator left the company and took the USB memory stick with him. The server continues to run fine as ESXi basically runs from memory but, rebooting this host is now not an option since there are no files available for the host to boot from. So what is the best way to recover and get things back to normal? I did a little research and the information that I have found will work will both ESXi 3.x as well as vSphere ESXi.
Cloud Computing ...
• • 0 Comments
newScale, rPath and Eucalyptus have partnered to provide an elastic infrastructure (Eucalyptus), automated software deployment and management (rPath), and a service catalog (newScale). This provides an interesting alternative to the monolithic stack offered by VMware with vSphere and vCloud Director.
The Freemium sales model is a business model innovation best suited to inexpensive products that are very easily understood (and therefore not very new or very different) and that solve an obvious problem in a manner that is more convenient for the customer to acquire and implement. There are not many new virtualization and cloud technology companies who set out to produce undifferentiated products which suggests that a general application of the Freemium model to startups in our ecosystem is ill advised. Enterprise customers should pay great attention to products that are being marketing in this manner to ensure that they do not end up growing the use of something that was purchased in a tactical manner into a strategic use case.
Last week, there were several major virtualization security announcements, that taken singularly may only apply to the specific products, but taken together show the growth of the virtualization security ecosystem.