It is time to expand the virtual playing field. Since the release of both Hyper-V 2012 and vSphere 5.1, there have been an abundant amount of posts comparing the two hypervisors in a head to head fashion. All the different charts, graphs, and tables point to the fact that when comparing maximum values head to head. This has been the way the two different hypervisors have been compared against each other all along and Microsoft and VMware have gotten to the point where things are pretty much even across the board. It was just a matter of time until we got to this point where Hyper-V catches up with vSphere and now that we have, I believe we need to change the scope of the comparisons beyond the maximum values. After all, how many people actually get anywhere close to those maximums deployed in your production environments? “Just because you can do something, does not mean you should.” Continue reading It Is Time To Expand The Virtual Playing Field
There have been quite a few new products announced in the last few months. Some I have received as briefings, others I have researched. These security and data protection products show the changing face of virtualization and cloud. Continue reading Technology Roundup: Security and Data Protection
Two things have popped up recently. One is VMware’s full page ad campaign in the Wall Street Journal. The ad states that VMware has saved companies billions of dollars, and promises to save them billions more – through the Software Defined Data Center. The second that has has popped is rumors that Cisco is going to acquire Citrix. Which brings up an interesting question. Is buying Citrix part of Cisco’s reaction to VMware’s Software Defined Data Center (SDDC) strategy? Continue reading Will Cisco Buy Citrix in Reaction to VMware’s SDDC Strategy?
On the 11/29 Virtualization Security Podcast Omar Khawaja the global managing principle at Verizon Terremark Security Solutions joined us to discuss Verizon’s 12 step program for entering the cloud (found on slideshare). This 12 step program concentrates on the IT and Security admins working together with the business to identify all types of data that could be placed into the cloud, and to classify that data. Once this is complete, the next steps are to understand the compliance and security required to protect the data and to access the data. It is a Data Centric approach to moving to the cloud. Continue reading 12 Step Program to Enter the Cloud
VMware’s Cloud Foundry has been festering for the best part of a year now. It smells a little bit of lack of courage, and a lot of lack of focus. The body is still warm, but I fear EMC/VMware may have already snatched defeat from the jaws of victory.