The Virtualization Practice

Tag Archive for Virtualizing Business Critical Applications

CloudComputing

At the recent Misti Big Data Security conference many forms of securing big data were discussed from encrypting the entire big data pool to just encrypting the critical bits of data within the pool. On several of the talks there was general discussion on securing Hadoop as well as access to the pool of data. These security measures include RBAC, encryption of data in motion between hadoop nodes as well as tokenization or encryption on ingest of data. What was missing was greater control of who can access specific data once that data was in the pool. How could role based access controls by datum be put into effect? Why would such advanced security be necessary?

CloudComputing

Taking your cloud from a dev/test/pilot/training use case to a platform for business critical enterprise applications introduces significant new requirements that first generation cloud management platforms were not designed to meet. Elasticity and self-service are nice features, but these features alone fall far short of what is needed to provision and run enterprise applications in clouds.

PerformanceManagement

Having successfully virtualized all of the low hanging fruit in its customer base, VMware has now put a serious focus upon virtualizing business critical applications and performance critical applications. That focus includes not just highlighting progress to date, but also working with partners who have specific domain expertise is specific applications.

CloudComputing

We at The Virtualization Practice, LLC have migratedg our business critical applications to the cloud. How simple was that task? It was not as easy as we have heard from others, and not as difficult as some have had, but it was not as simple as move my VM and run. Why is this? What are the methods available to move to the cloud? How do they stack up to what actually happens. Theory is all well and good, and I have read plenty of those architectures, but when the shoe leather hits the cloud where are we? Here is a short history, a comparison of methods, and some conclusions that can be drawn from our migration to the cloud.

VirtualizationSecurity

Recently I discussed Virtualizing Business Critical Applications and security, which includes availability, confidentiality, and integrity. However, that discussion was more about visibility into the environment for security operations. I purposely left off the discussion of gaining integrity and confidentiality of the data housed within those business critical applications.

PerformanceManagement

Virtualizing business critical applications requires an operations management solution that is designed from the group up for a dynamic and shared data center. Virtualizing performance critical applications requires an infrastructure performance management solution that can monitor the end-to-end latency of the infrastructure in real time or near real time. As enterprises virtualize more than low hanging fruit, these solutions will become essential elements of the virtualization process.

PerformanceManagement

The process of virtualizing business critical applications should start with using a modern APM tool to establish a response time and throughput baseline for the application while it is still on physical hardware. That baseline should then serve as the reference SLA once the application is virtualized. Performance needs to be defined as response time and throughput, not resource utilization.

Top