The VMware Community Roundtable, which is recorded every Wednesday, has been available for download from iTunes for the last couple of years or about as long has the podcast has been presented on TalkShoe.com. Other than the community podcast and The Virtualization Security Podcast there have not really been too many other things available on iTunes for VMware technologies or products. You could find a VCP study guide, VCP Exam Cram from Pearson Education and some other third party tools to control VMware vCenter from your iPhone and/or iPad. Within the last couple of years there have been hundreds if not thousands of iPads that have been given away at the different technology conferences and the sneak peak from VMware at these conferences, on the iPad application that they are working on, it was just a matter of time and that time has come with VMware releasing the VMware View for iPad and the VMware vSphere Client for the iPad.
IT as a Service ...
• • 3 Comments
Transaction rate, an average response time goal, and an allowable upper bound, combined with transaction rate will come to define performance and capacity. These new metrics will get monetized allowing applications owners to shop for price/performance curves across internal and external service providers on a rational and economic basis.
User Virtualization makes your user’s information manageable and portable. With User Virtualization the components of a desktop relating to the user are decoupled from the operating system and applications. Goldman Sachs investment is not to gain market share per se, but to allow AppSense to rapidly expand to meet the demand that their product has generated and helps drive a rapidly expanding desktop virtualization and management market.
I just finished reading, yet another Multi-Tenancy Design/Overview that claims to be secure or trusted. While I will agree that this particular design does cover Availability and some GRC (Governance, Regulatory, and Compliance) it is severely lacking in Integrity and Confidentiality. The design even went as far as saying the cloud/virtual administrator requires “COMPLETE VISIBILITY.” I was really taken aback by those words. Why does an administrator need ‘COMPLETE VISIBILITY?’ Which leads me to the question is Integrity and Confidentiality possible within any cloud or virtual environment? Or is it purely based on TRUST?
If so this is an appalling state of virtual and cloud environment security.
In July 2009 I wrote an article entitled Cloud Computing Providers — are they content providers or carriers? and in January of 2011 Chuck Hollis wrote an article Verizon To Acquire Terremark — You Shouldn’t Be Surprised. Now with the Terremark acquisition almost complete and RSA Conference 2011 also over, at which I talked to Terremark about the benefits of belonging to Verizon, a picture is starting to emerge. Yes, my predictions in 2009 make sense and still hold forth today, but is there more of an impact than we realize?
One of the very first questions presented to the Virtualization Architects when planning and designing a new deployment, for as long as I have been working with virtualization technology. To scale up or scale out, that is the question and philosophy that has flip flopped back and forth as the technology itself has improved and functionality increased.
vCenter Operations – vSphere Performance, Capacity and Configuration Management with Self Learning Analytics
• • 3 Comments
On the 2/24 Virtualization Security Podcast we were joined by Davi Ottenheimer and Michael Haines of VMware to discuss vCloud security. This is of quite a bit of interest to many people these days. As VMware adds more and more Cloud functionality, how to secure the environment is becoming more and more important. The podcast started with the question what aspects of the cloud do customers want secured. The answer was intriguing to say the least.
On the third Virtualization Security Podcast of 2011 we were joined by Charlton Barreto of Intel to further discuss the possibility of using TPM/TXT to enhance security within the virtual and cloud environments. We are not there yet, but we discussed in depth the issues with bringing hardware based integrity and confidentiality up further into the virtualized layers of the cloud. TPM and TXT currently provide the following per host security: