It is the last few days of the year and time for a review of virtualization 2010. Although VMware was founded in 1998 it was not until 2001 that I first heard of VMware and played with the workstation product to be able to run different flavors of Linux. So for me, 2010 closes out a great year in virtualization as a whole as well as a decade of virtualization and what a ride it has been.
My conference schedule kept pace with the changes in the virtualization security ecosystem through out the year. What are those changes? This is the end of year review of the virtualization security ecosystem.
Implementing IT as a Service requires a virtualization platform, and virtualization aware configuration and change management, secure multi-tenancy, provisioning and lifecycle management, orchestration and automation, and service catalog. These capabilities are available from VMware, DynamicOps, Embotics, Eucaplyptus, ManageIQ, newScale, Quest, rPath and Reflex Systems.
Open Source continues to be an important part of the mix in Virtualization and Cloud. Indeed, this year has seen major developments in established players at the Operating System and Hypervisor level, as well as a major new cloud entry at the IaaS cloud layer.
Cloud Computing ...
• • 1 Comment
The acquisition of Cloudlick by Rackspace points out the need for IaaS cloud vendors to get serious about offering an Infrastructure Performance Management solution to their customers – but fails to deliver such a solution to the customers of Rackspace. Cloud customers should focus upon finding true cloud ready Infrastructure Performance Management and Applications Performance Management solutions as a part of putting performance critical applications in public clouds.
• • 0 Comments
Taking a look at solutions from Citrix, Endeavours Technologies, InstallFree, Microsoft, Spoon, Symantec, UniDesk and VMWare. “Is it a choice between Application Delivery vs Application Virtualization?”
• • 3 Comments
I have been thinking about blades and virtualization security for some time spurred on by a conversation with Brad Hedlund six months ago. Nearly all my customers use Blades and virtualization security is a big concern to them. In my Rethinking vNetwork Security article, I touched on some of the issues in response to Brad’s comments a while back. I would like to now expand that discussion to blades.
There are three sets of blade enclosures I would like to discuss, those that use pass thru networking, those that use standard switching fabric within the enclosures, and those that use flexible interconnects such as HP Flex-10 and Cisco Palo adapters. The last is the so called physical-virtual network device.
MokeFive Suite is an enterprise desktop management platform that is used to create and administer layered virtual desktop images called ‘LivePCs’ which execute as guests on a type II hypervisor. LivePC images are authored using the MokaFive Creator which also serves as a test platform to simulate and end-users experience. LivePC images can be stored on centralized or distributed file stores. MokaFive also provides support for Amazon S3 storage, which can be of significant value in managing highly distributed environments, or run directly off USB flash drives. MokaFive LivePCs are effectively hypervisor agnostic; support is currently available for VMware’s free Player and the open source Virtual Box. Beta support for Parallels Workstation is new in MokaFive Suite 3.0, and MokaFive’s own bare metal platform will be shipping in Q1 2011.