Microsoft has thrown down the gauntlet right at the feet of Amazon and VMware. With this release Microsoft is bringing to the table its historical strengths in Windows, its on premise position with Windows systems and Windows applications, its ability to operate scale out data centers on a global basis, with a huge commitment to openness and heterogeneity.
The 5/3 Virtualization Security Podcast had a very special guest, a teenager. This surprise guest told us about how she and her friends use their smartphones and cloud services such as FaceBook, Twitter, SMS, etc. For the panelist, it gave us a new look at our existing problems; expanding our viewpoint for end-user computing security, cloud security, and expectations of privacy.
If Dell in fact buys Quest then Dell will Transform Virtualization Management. Dell’s presence in the market, customer base, and market reach combined with its product set will put Dell in a strong position to compete not only with VMware, but also to create serious pain for IBM, HP, CA, and BMC. Furthermore, the opportunities to integrate the various Dell solutions look to be able accelerate private and public cloud adoption which will in turn benefit Dell’s core server and storage businesses.
Some of us have multiple cloud endpoints in the form of mobile devices all trying to access our personal and corporate data to do our daily jobs. These incredibly useful devices (smartphones, tablets, etc.) are now a part of our organizations life. So how do we protect our data from them. IBM recently took a draconian measure of banning Siri from their employees iPhones. Yet, how can they enforce such a measure?
The cost of a VDI desktop dropped again last week with the release of a new low-cost thin clients that increasingly blur the boundaries between the cost of physical and virtual desktops, creating new opportunities for growth in a market segment that is struggling to reach more than 5% of enterprise desktops.
How do we measure success? This seems like it should be an easy question to answer but is it? Success itself is a dynamic variable that can be defined in several different ways from a promotion or even recognition from your peers. Now what about a successful cloud implementation or implementation in general? How would you define success? The true definition of implementing is to fulfill; perform; carry out: or to put into effect according to or by means of a definite plan or procedure. For the design and implementation team, success could be defined by the completed installation design, deployment and verification testing of all functionality as defined in the statement of work.
The IaaS Cloud Performance Management Problem will continue to be one of two major factors impeding the adoption of public cloud services (multi-tenant security being the other one). Inferring performance from resource utilization metrics does not work in a simple single tenant virtualized environment (vSphere in your data center). It is worse than useless in muti-tenant public cloud environments that are build up upon a virtualization platform. The only known fix for this issue is for the cloud vendors to embrace end-to-end infrastructure latency as the quality of service metric and to surface this metric on a per tenant and per image basis to their customers.
There is a class of applications that is extremely difficult to virtualize. This group consists of graphics intensive applications such as ProEngineer, Photoshop, and pretty much anything that requires a GPU to perform well. Graphics intensive applications make up a list of applications that are usually too big or expensive to virtualize. The last mile so to speak. This is NO longer the case. With NVIDIA’s announcement of the NVIDIA VGX Cloud Platform. This and other classes of applications can now be virtualized.
There seems to be a myriad of definitions of who is a tenant when it comes to secure multi-tenancy. This debate has occurred not only within The Virtualization Practice as well as at recent Interop and Symantec Vision conferences I attended. So who really is the tenant within a multi-tenant environment? It appears multiple definitions exist and if we cannot define Tenant, then how do you build secure applications that claim to be multi-tenant?