All posts by Edward Haletky

Edward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

Data in the Cloud: Does Information want to be Free?

CloudComputingAt a dinner party recently, I was asked “does information want to be free?” This question is based on information that exists within the cloud today or tomorrow: Data in the Cloud. It is an interesting question with a fairly ready answer. Information is Power, it is people not information that controls information. Granted we have a massive abundance of information within the cloud today, is it trying to be free, or are people trying to make it free to everyone? In addition, is all this information even true or accurate? Continue reading Data in the Cloud: Does Information want to be Free?

Data Protection for Free: What are the Limits

VirtualizationBackupIt is possible to get data protection for your virtual and cloud environments for free today, but there are are often limits. Trialware as it is called provides just enough of a taste for the data protection tool to convince you to buy the versions with more capabilities. However, for the SMB, the free versions may be good enough. The concept of ‘good enough’ is one that travels through the virtualization and cloud environment architectures with respect to security, data protection, and hypervisor feature sets as often as higher licensing levels are mentioned, why, because cost matters. But from a data protection perspective what do you get for free? Here is a short comparison of the free products and features. Continue reading Data Protection for Free: What are the Limits

Vyatta: Building Block for Brocade SDN Plans

Vyatta100x30Brocade has stated they will buy Vyatta for an all-cash deal. This is good news for Vyatta and perhaps a way for Brocade to partake of software that could rival VMware’s purchase of Nicira when Vyatta’s own SDN features are married with Brocade Ether Fabric technology. Brocade has been in the software business for a while now, but only with respect to their own hardware. With the acquisition of Vyatta, they will shortly own a building block that can extend Ether Fabric into the virtual and cloud environments. It would be shortsighted to say this is just an SDN play—this purchase shows there is quite a bit of benefit to Brocade. Continue reading Vyatta: Building Block for Brocade SDN Plans

Going to the Cloud: CAPEX, OPEX, Facilities, or People

CloudComputingOn the 11/1  Virtualization Security podcast we had no special guest but continued a conversation started at Hacker Halted this year. It is the ongoing question of whether or not Going to the cloud will cause jobs to be lost. The typical answer was stated at Hacker Halted, that people will need to cross-train with new products, etc. and then they would keep their jobs, but someone stood up and shouted out that this was hogwash. It made a lively discussion from there. So we tackled it on the podcast as well. Will people loose jobs Going to the Cloud? If so how can this be prevented? What do you as IT professionals need to do, to plan your careers while going to the cloud? Continue reading Going to the Cloud: CAPEX, OPEX, Facilities, or People

Move to the Cloud: Wait Out the Storm

VirtualizationBackupThe east coast is experiencing the tail end of a very large storm named ‘Sandy’. We all had plenty of time to prepare for the storm, but did we? Individually, we probably did, but what about our data? Those 24/7 critical processes to allow our customers to view and respond to the data our organizations provide? We were lucky—we had no issues during the storm, but now we await issues during storm clean up. So how do you prepare for such disasters? Do you move to the cloud? Continue reading Move to the Cloud: Wait Out the Storm

Defense in Depth: Hardware Security

VirtualizationSecurityOn the last Virtualization Security podcast, our guest was Robert Rounsavall, CEO of Trapezoid. Trapezoid is looking into how to alleviate supply chain security issues; in essence, the security of the hardware. At many a presentation, I have asked attendees, “Do you trust the hardware?” Many times the answer is that they do; at other times, it is that they do not. Whether you trust the hardware depends entirely on your thoughts with respect to hardware security. But what can you do about hardware security? What is the worst that can happen if the hardware is infiltrated? Continue reading Defense in Depth: Hardware Security

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio