All posts by Edward Haletky

Edward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

Change: Moving to the Cloud

CloudComputingThe Virtualization Practice will be moving from our internal virtual environment and cloud configuration to an external hosted cloud configuration, at least temporarily. However, what we have found is that not all clouds are alike (we all knew that), and that some of our processes were not cloud friendly but what does it mean for moving to the cloud? How do we manage our change to these processes as we move to the cloud? Continue reading Change: Moving to the Cloud

Moving to the Cloud: When Does It Make Sense?

CloudComputingOn December 18, I had an interesting Twitter conversation with Mark Thiele (@mthiele10) about moving to the cloud based on cost. There is a cost perspective to consider as cloud services can be very expensive. When does it make sense to go to the cloud? There are two scenarios to consider when talking about going to the cloud. While we were hampered by the 140-character limit, I think the message is clear. Continue reading Moving to the Cloud: When Does It Make Sense?

End User Computing: Using just a Tablet

DesktopVirtualizationRecently I have been trying to lighten my conference going load. To do that, I have been thinking about ways to do without my laptop and all the accessories for it, which got me thinking about what it takes to completely use such a device; to fully embrace the next generation of end-user computing using gesture computing and smaller devices. Other than the technical hurdles, there are also training hurdles as full tablet computing, today, has some serious limitations with respect to security, functionality, and in some ways capability.  So how does one embrace tablet computing as their next-gen end user computing?

Continue reading End User Computing: Using just a Tablet

Cloud API: In-Security?

VirtualizationSecurityThe 12/13 Virtualization Security Podcast featured George Reese, CTO on enStratus, as our guest panelist. We discussed Cloud API security or more to the point the lack of real cloud API security. To paraphrase George: Some got it, others do not. So what makes up a good cloud API? how can we fix broken cloud APIs? Continue reading Cloud API: In-Security?

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio