The Virtualization Practice
CloudComputing

There is a difference between outsourcing layers of your infrastructure and making the organization to whom you have outsourced those layers responsible for them, and losing all rights to change those layers in support of your business and application needs. Careful contract and product decisions need to be made in order to ensure that when you used a managed cloud service, you are not giving up the control you need to be agile and responsive to you business constituents.

DesktopVirtualization

Dell continues its expansion into the cloud and virtual desktop market with the announcement on Monday that it has reached agreement with Wyse Technologies to acquire the company.

Dell has had a long partnership with Devon IT,the Dell OptiPlex FX 130 and FX 170 thin clients and the Dell FX100 Zero Client are OEM editions of the Devon IT TC2, TC5, and TC10. Dell also OEMs Devon IT’s VDI Blaster software thin-client and its Echo Management Console software. All of which are considered to be high quality products. So if Dell already has access to its own thin client products and management software why did it need a thin client vendor of its own, and why didn’t it pick Devon IT instead of Wyse.

CloudComputing

VMware’s Project Octopus and others like ownCloud and Oxygen Cloud have stirred some interesting ideas about Application Security. Those applications that make use of SSL, nearly every web application, can make use of secure data storage for certificate verification means. What makes SSL MiTM attacks possible, is mostly related to poor certificate management. If there was a way to alleviate the need for the user to be involved in this security decision, then SSL MiTM attacks would be significantly reduced.

DesktopVirtualization

In supporting increasing needs for agility in a world driven by the increasing consumerization of IT (CoIT), desktop transformation can no longer be seen as an infrequent process. To quickly deliver change, you need to best understand what the impact of that change is. Auditing should be continuous as seasonal or limited use applications that may be missed through manual processes will be identified and flagged as they occur. Centrix look to assist with the latest release of Workspace IQ which includes Management Reporting, Business Group Reporting, Integration with License Dashboard and Windows 7 hardware compatibility assessment.

VirtualizationSecurity

The 3/22 Virtualization Security Podcast brought to light the capabilities of Symantec Critical System Protection (CSP) software. This software successfully implements a manageable version of mandatory access control policies based on role-based and multi-level security functionality within the virtual environment. More specifically on those systems that are critical to the well being and health of your virtual and cloud environments such as all your management and control-plane tools (VMware vCenter, Microsoft SCVVM, XenConsole, etc.). In addition, Symantec CSP will monitor your virtualization hosts for common security issues. This in itself is great news but why are we just hearing about this now? Is this a replacement for other security tools?

StorageNetworking

There are many different types of metrics pertaining to storage and IO that can be grouped into Performance, Availability, Capacity, Economics and Energy (PACE). Every application or workload has some characteristics attribute of Performance, Availability, Capacity, Economics and Energy that can be further broken down into metrics that are more detailed.

DesktopVirtualization

There has been a lot of buzz and coverage about Windows 8 since its consumer preview. There will be some very cool features with this release and one feature that really stands out with me is that Microsoft added an additional supported processor type in that Windows 8 will run on Intel, AMD and now ARM based processors. That gives Windows 8 the ability to run on desktops as well as mobile phones and tablets.