All posts by Edward Haletky

Edward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

IT Transformation: Migration

CloudComputingIn previous articles, we discussed IT transformation in general, IT transformation and security, and the top-down approach to IT transformation. In this article, we discuss migration as a means to IT transformation. Migration as a means to IT transformation hooks into an organization’s disaster recovery procedures, using these existing mechanisms to migrate workloads from on-premises to in-cloud. At that point, the migration can continue to power on workloads to take over for those on-premises, to run side-by-side with what is on-premises, to run cooperatively with those on-premises, or to just be ready in case a disaster requires their use. The fact is that cloud can be a fairly large cost saver over maintaining a hot site within another data center. Instead, you maintain one in the cloud. Continue reading IT Transformation: Migration

IT Transformation: Top-Down Approach

BusinessAgilityWe recently discussed the need for a plan when performing IT transformation. There are three approaches to choose from when planning. The first approach is a top-down approach. This approach educates C-level and upper management about IT transformation so that they can begin to plan and can understand the costs and benefits. In general, this approach is usually taken when the change is massive and there is a significant cost associated with such a transformation. Continue reading IT Transformation: Top-Down Approach

IT Transformation: Architecture Includes Security

CloudComputingI recently had a number of consulting conversations about IT transformation and adding new Security as a Service products to companies’ existing clouds and tenancies. This is the beginning of IT transformation in many cases. A company has realized it needs to provide security to its tenants while using clouds more securely at the same time. This is a hybrid cloud. The company provides a cloud, yet uses tools from Box, Salesforce, Google, Microsoft, and the like. So, where do we start with IT transformation? With architecture that includes security. Continue reading IT Transformation: Architecture Includes Security

RedHat Summit: All about Containers

agilecloudI had the opportunity to attend Red Hat Summit and DevNation. Nearly every answer to any question at both these events was to “use containers” to solve that problem. While some responses were undoubtedly true, others were not quite as completely true. Yes, you can use containers to solve many problems, but what was often overlooked were the underlying bits of infrastructure necessary to provide the base for the containers. Overall, Red Hat Summit delivered on its promise; I will follow up about DevNation at a later time. Continue reading RedHat Summit: All about Containers

IT Transformation: Starts with a Plan

CloudComputingIT transformation is the discussion of the year. The question is how to transform IT into a hybrid cloud environment, or even into a fully cloud environment. This implies often subtle as well as pretty major changes to traditional IT environments. People change and processes change, just as tools change. Virtual Thoughts, our weekly video podcast, discusses these issues with Greg Ness of CloudVelox. Continue reading IT Transformation: Starts with a Plan

Who Will Debug?

DataCenterVirtualizationThere is a growing push for people to learn less about the systems in which they run their applications. It started with converged infrastructures and moved into hyperconverged, and now I see it continue to grow with Docker and other container technologies. This puzzles me. While it makes the developer’s life easier, does it really make anyone else’s life easier? Do we really need to consider the stack anymore? Continue reading Who Will Debug?

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio