The Virtualization Practice

There has been quite a bit of hype on whether virtual desktops provide more security than traditional desktops. All the marketing literature I have read says that it does improve overall security, but I believe this marketing literature makes several assumptions that are just not true in most organizations, and really do not account for the myriad ways data can be accessed, by limiting our scope to just virtual desktops instead of the full desktop experience we are thereby limiting our thoughts on security. Are virtual desktops more secure?

Virtualization and cloud computing have changed the requirements for management solutions in a way that no innovation in the history of our industry ever have. Previous innovations created new requirements, but did not break existing management approaches or business models. Virtualization breaks both the existing legacy approaches to managing applications and systems, and breaks how one must manage applications in this new environment. The revolution has only just started.

With a little over 28 months left until Microsoft ends all support for Windows XP and with Internet Explorer 6, the time to consider their replacements is long overdue. While Microsoft and others have acted to deliver tools to assist with Windows 7 migration activities little effort has been made to address the challenge of IE 6. One of the others Quest has released an IE 6 rescue package. However, if anything, Microsoft’s only visible response has been to act stymie the actions of those withing to offer a solution.

I am not sure how other people have learned their craft and mastered the technology they support, but for me, the learning started after the books ended. I have learned so much more from breaking something and having to find the fix than I ever did from reading a book. Back in the day around 2005, VMware released The VMTN Subscription. This was an amazing program that was something like the Microsoft MSDN subscription. These programs gave you the ability to run any of the core software packages for a year at a time for a subscription fee.

The need to virtualize every application, along with the need to support constantly arriving new and newly changed applications will drive the creation of an Application Operations function in the enterprise. This function will need to be supported and enabled by a new generation of APM tools that meet the new requirements of the Application Operations team.

The October conference schedule is now complete and it was a tough one but very rewarding. The events that happened in October were numerous and overlapping in some cases. Travel was one week here and the next week there, yet we managed to get through it. Of the mass of conferences, I attended two, IPexpo as a guest and The ExecEvent and Hacker Halted as a speaker. I discovered something very strange, virtualization and cloud security are merely after thoughts. I felt this should have changed by now, but alas this is not the case. Is it that our scope is incorrect, or is it that there is no Return on Investment on security tools, procedures, etc?

The Virtualization Practice was recently offline for two days, we thank you for coming back to us after this failure. The reason, a simple fibre cut that would have taken the proper people no more than 15 minutes to fix, but we were way down on the list due to the nature of the storm that hit New England and took 3M people off the grid. Even our backup mechanisms were out of power. While our datacenter had power, the rest of the area in our immediate vicinity did not. So not only were we isolated from reaching any clouds, but we were isolated from being reached from outside our own datacenter. The solution to such isolation is usually remote sites and location of services in other regions of a county, this gets relatively expensive for small and medium business, can the Hybrid Cloud help here?