All posts by Edward Haletky

Edward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization.[All Papers/Publications...]

Technical Arc of Virtualization

agilecloudWhile at EMC World and RSA Conference this last month, I realized something very interesting. The same people I normally see at these shows have moved on to something new and shiny, and as such they were not at the shows. However, what was at the shows was really interesting. There was much more talk about DevOps, scripting, and things code related. This is all for the good and gets more peopled involved in the technology at a deeper level. But how did this happen? Continue reading Technical Arc of Virtualization

Virtual Thoughts with Intigua

CloudComputingTim MacDonald of Intigua joins us on the third episode of Virtual Thoughts, where we discuss anything and everything related to virtualization and cloud technologies, communities, and organizations. Intigua has a unique product for managing virtual machines at scale. Its product concentrates on the virtual machine substrate most often ignored by applications, developers, and end users until a problem crops up: the substrate comprising agents and IT applications that make our systems run as they should. Intigua encapsulates, optimizes, and controls this substrate. Take a listen to the video podcast and let us know your thoughts.

Continue reading Virtual Thoughts with Intigua

Virtual Thoughts Ep 2: Veeam Endpoint

veeam_logo_100x30In Virtual Thoughts episode 2, Rick Vanover (@rickvanover) and I sit down to talk about Veeam Endpoint, the latest free product from Veeam. Endpoint provides a method for backing up your Windows endpoints to and from a backup store. That store can be managed by Veeam Backup & Replication v8 as well. This implies that Endpoint can also run on any modern Windows Server (though that is not the initial intent) or desktop running within the cloud without having a direct Veeam presence within the cloud. Veeam Endpoint runs as an application (read this as agent) within the Windows Server or desktop. Continue reading Virtual Thoughts Ep 2: Veeam Endpoint

Virtualization & Cloud Security Ep 1

VirtualizationSecurityWe are trying out a new format for the Virtualization & Cloud Security Podcast: video. We’ll post it up on YouTube as well as posting it via Talkshoe and iTunes. In this episode, Mike Foley (@mikefoley) of VMware Technical Marketing joins me to discuss IoT security, the RSA Conference, and hardening guides. We have spoken about the last item quite a few times and featured the RSA Conference on a previous podcast as well. IoT security is now something very interesting.

Continue reading Virtualization & Cloud Security Ep 1

Virtual Thoughts with John Troyer

CloudComputingThe Virtualization Practice has revitalized, recreated, redone our early Virtual Thoughts podcast as a video podcast (videocast?). Our first guest is John Mark Troyer (@jtroyer) of TechReckoning, and we discuss containers. Somewhere in the videocast is a full list of container technologies, but we concentrate primarily on Docker and its impact. Continue reading Virtual Thoughts with John Troyer

How Do You Data Protect?

VirtualizationBackupIn our ongoing quest to determine how our readers use cloud technologies, our second poll is now available: Which Type of Data Protection Service(s) Do You Use? This poll’s goal is to determine how data protection fits into your organization’s use of the cloud, if it does at all. There are many cloud-based tools for data protection, as well as many integrations between data protection vendors and cloud service providers. We’d like to know if these tools are being used, and if they are, which ones. Continue reading How Do You Data Protect?

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio