The Virtualization Practice
DesktopVirtualization

Dell continues its expansion into the cloud and virtual desktop market with the announcement on Monday that it has reached agreement with Wyse Technologies to acquire the company.

Dell has had a long partnership with Devon IT,the Dell OptiPlex FX 130 and FX 170 thin clients and the Dell FX100 Zero Client are OEM editions of the Devon IT TC2, TC5, and TC10. Dell also OEMs Devon IT’s VDI Blaster software thin-client and its Echo Management Console software. All of which are considered to be high quality products. So if Dell already has access to its own thin client products and management software why did it need a thin client vendor of its own, and why didn’t it pick Devon IT instead of Wyse.

CloudComputing

VMware’s Project Octopus and others like ownCloud and Oxygen Cloud have stirred some interesting ideas about Application Security. Those applications that make use of SSL, nearly every web application, can make use of secure data storage for certificate verification means. What makes SSL MiTM attacks possible, is mostly related to poor certificate management. If there was a way to alleviate the need for the user to be involved in this security decision, then SSL MiTM attacks would be significantly reduced.

DesktopVirtualization

In supporting increasing needs for agility in a world driven by the increasing consumerization of IT (CoIT), desktop transformation can no longer be seen as an infrequent process. To quickly deliver change, you need to best understand what the impact of that change is. Auditing should be continuous as seasonal or limited use applications that may be missed through manual processes will be identified and flagged as they occur. Centrix look to assist with the latest release of Workspace IQ which includes Management Reporting, Business Group Reporting, Integration with License Dashboard and Windows 7 hardware compatibility assessment.

VirtualizationSecurity

The 3/22 Virtualization Security Podcast brought to light the capabilities of Symantec Critical System Protection (CSP) software. This software successfully implements a manageable version of mandatory access control policies based on role-based and multi-level security functionality within the virtual environment. More specifically on those systems that are critical to the well being and health of your virtual and cloud environments such as all your management and control-plane tools (VMware vCenter, Microsoft SCVVM, XenConsole, etc.). In addition, Symantec CSP will monitor your virtualization hosts for common security issues. This in itself is great news but why are we just hearing about this now? Is this a replacement for other security tools?

StorageNetworking

There are many different types of metrics pertaining to storage and IO that can be grouped into Performance, Availability, Capacity, Economics and Energy (PACE). Every application or workload has some characteristics attribute of Performance, Availability, Capacity, Economics and Energy that can be further broken down into metrics that are more detailed.

DesktopVirtualization

There has been a lot of buzz and coverage about Windows 8 since its consumer preview. There will be some very cool features with this release and one feature that really stands out with me is that Microsoft added an additional supported processor type in that Windows 8 will run on Intel, AMD and now ARM based processors. That gives Windows 8 the ability to run on desktops as well as mobile phones and tablets.

Hyper-V.Extensible.Switch

One of the areas where VMware vSphere has had a large advantage over Microsoft Hyper-V has been in the architecture and capabilities of the VMware vSphere Virtual Switch. The most important of these capabilities has been the ability to designate one or more ports on the switch as promiscuous or mirror ports. These ports make a read only copy of all of the data flowing through the switch available to whatever virtual machine is sitting on that port. This is an essential capability for many security products and also performance management solutions like those from ExtraHop Networks that rely upon deep packet inspection to work.

DesktopVirtualization

Virtualizing Presentation Virtualization Workloads is increasingly seen as beneficial and more acceptable. As Citrix XenApp customers move into 2013 it is likely they’ll move more physical instances to virtual. To enhance RDS VM workloads with shared storage – Atlantis release ILIO for XenApp, the first solution designed specifically to accelerate provisioning, boot time and application response time