Windows 2012 Hyper-V is the hypervisor for the cloud. VMware’s vSphere is a dead man walking?
In parts One and Two I shared a chunk of what I learned from Aidan Finn‘s enlightening and entertaining session “Windows Server 2012 Hyper-V & VSphere 5.1 – Death Match” delivered at the E2E Virtulisation Conference in Hamburg. We’ve considered pricing, scalability and performance, as well as storage then gone on to consider resource management, security and multi-tenancy and what a flexible infrastructure can give.
Some have found this a useful comparison. Others have highlighted that this isn’t a feature-by-feature comparison and that if it was, the tables would be very different: they would, they’d be longer for a start. But more importantly, would they give the high view that many are focused on? Is the goal a technical Top Trump victory, or alignment to business goals? If aligned, how aligned? A friend used to often quote the difference between cabinet making, carpentry and joinery is effort and measurement: they each had their place, the trick was knowing what level to apply.
In Part III, lets question further Aidan’s premise that Hyper-V kills vSphere. Here we’ll consider High Availability and Resiliency.
Continue reading Windows 2012 Hyper-V – the hypervisor for your Cloud? Part III
Recently it has become abundantly clear that there is great turmoil in the business of Application Performance Management (APM). CA has sponsored a study by IDG research services that concluded that “Most Enterprises are Approaching APM SaaS Cautiously“. Separately, Information Week asked “What’s Killing APM”, and concluded that “App performance management is seen as less important than it was two years ago, partly because vendors haven’t kept up”. These problems are being caused by first and second generation APM solutions and are driving the market for third generation APM solutions. Continue reading The Third Generation of APM
I can remember back in the day when we connected to the Internet via a modem and were charged by the minute while accessing the Information Superhighway. Now, the Internet and really, the network it runs on, has pretty much become invisible to the naked eye. Just as we expect the lights to turn on when we flick a switch, we also pretty much expect the Internet to always be on and available without thinking twice about it. Internet service providers have gone from wanting Wi-Fi only in your house to working on providing connectivity to the entire city, giving the metro user Internet access from inside and outside of your home or office. Continue reading Information Superhighway
There are threats to the cloud and there are risks within the cloud. A recent article from Tech Target Search Security blog spurred several thoughts. The main claim here is that there are not enough people who can differentiate threats and risks enough to talk to business leaders who may know very little about security, but do know the business. I have been known to state that there are prominent threats to my data once stored in the cloud and that we should plan to alleviate those threats to reduce our overall risk. But what is the risk?
An analogy comes to mind. Many years ago I ripped my Achilles tendon, and while talking with the doctors they all said that without surgery there was a 50% more likely chance that the Achilles tendon would rip again. So this got me thinking about what they really meant, 50% of what? My next question to the doctors was “how likely is it to fail if I do not have surgery?” Their response was enlightening, there is a 2% failure rate for naturally healed Achilles tendons. Because of that number, I realized that the failure rate for those tendons that undergo surgery is really only 1% vs 2% without. Well that put a different picture on everything. I went without surgery as that particular area of the body has very thin skin, not as much blood flow, and would take a long time to heal from surgery and there was always the risk of picking up something in the hospital, however remote at the time.
So the real question is what is the true risk to an environment if the threat becomes a reality? Continue reading Threats and Risks in the Cloud
VMware vCenter 5.1 implemented a new security feature, Single Sign-On (SSO), that uses the Security Assertion Markup Language (SAML) to exchange security tokens. This combats an extremely well-known and prevalent attack within the virtualization management trust zones: SSL Man-in-the-Middle (MiTM) attacks. However, vCenter still supports the old SSL methods as well to maintain backwards compatibility and to allow management when SSO is not in use. Does this new feature change how we look at virtualization and cloud management security best practices? Is it a launch point for implementing other authentication techniques? Continue reading SAML to the Rescue: vCenter Single Sign On
Legacy management software vendors like IBM, HP, BMC and CA are in deep trouble. They are in trouble across their entire portfolio of management solutions due to two simple facts. Their products are not suited for the new dynamic and distributed IT environment, and the way in which they sell and market those products is inconsistent with how the new buyers of management software want to buy those products. A great example of the trouble that legacy vendors are in is how CA and its APM solutions (Introscope) stack up against modern solutions like those from New Relic, AppDynamics, and Compuware/dynatrace. Continue reading APM as a Service and CA’s Reaction