The Virtualization Practice

ApplicationVirtualization

Java is currently the leading exploit vector for Windows machines, and Java vulnerabilities are packaged into many of the “exploit kits” available in the darker corners of the Internet (see http://krebsonsecurity.com/2010/10/java-a-gift-to-exploit-pack-makers/). Internet Explorer, Flash Player, and even the Windows operating system itself have done a good job of either improving the security of their products or…

VirtualizationBackup

At The Virtualization Practice, we have systems running in the cloud as well as on-premises. We run a 100% virtualized environment, with plenty of data protection, backup, and recovery options. These are all stitched together using one architecture: an architecture developed through painful personal experiences. We just had an interesting failure—nothing catastrophic, but it could…

CloudComputing

Amazon recently let slip the news that its new Amazon EC2 C4 instances, based on Intel’s Haswell processor, would soon be available—only to kill the post shortly afterward. Although the post has disappeared from aws.amazon.com, some minor detective work revealed a remarkably similar post by AWS Chief Evangelist Jeff Barr. “Private: Now Available—New C4 Instances” is…