Project Virtual Reality Check (ProjectVRC) have finally released their ‘Phase V’ white paper which provides an independent insight into the impact and best practices of various antivirus (AV) solutions on VDI performance. Continue reading News: ProjectVRC Releases New White Paper about Impact of Antivirus on VDI
How good an idea is it to virtualize XenApp? Way back in 2010, when more of the poles were ice, we asked is virtualizing Citrix XenApp a waste of time and effort? There were a number of benefits identified: hardware abstraction allowing easier image management and OS upgrades; options for higher availability and faster recovery, even failover; virtualization-enabled silo consolidation; and importantly, better management of user capacity on servers.
Yet, with XenApp running on Windows 2008 R2 memory limitations are of far less issue. Introducing a hypervisor has an overhead which can impact user density and can change Microsoft server license costs per physical server. Do these considerations outweigh other benefits? Hypervisor technology and performance has moved on considerably – what is the impact of that? What other services can virtualized XenApp drive?
As computing, storage and networking continues migrating from physical equipment to virtual environments, provisioning and managing them increasingly relies on software. One of the most important benefits of virtualization and cloud computing is the idea infrastructure as code, using code, automate the provisioning and managing of entire application environments and ecosystems (infrastructure) reliably on demand. This idea, in conjunction with the agile development practices, is what makes continuous delivery possible for leading companies like Facebook, Flickr, Etsy and others.
In agile teams today, developers writing applications partner with DevOps team members writing, testing, building and packaging infrastructure as code with tools including Puppet Labs, Chef and Cucumber. This is helping traditionally bottlenecked and silo-od infrastructure teams begin working more closely with the application teams and improve overall business agility. DevOps team members write infrastructure code alongside the application under development – all leveraging popular development practices including code management, continuous integration, release automation and test-driven development. Continue reading Infrastructure as Code: From Bottleneck to Test-Driven
The most frequently encountered barrier to virtualizing business critical applications is a “concern” on the part of the application owners that the applications will “not run as well”, or “not perform as well” in a shared and dynamic virtual environment as it does in a dedicated physical environment. Depending upon who has what political power, these concerns can stop the project to virtualize these applications dead in its tracks. Continue reading Virtualizing Business Critical Applications – Managing Applications Performance
Recently I discussed Virtualizing Business Critical Applications and security, which includes availability, confidentiality, and integrity. However, that discussion was more about visibility into the environment for security operations. I purposely left off the discussion of gaining integrity and confidentiality of the data housed within those business critical applications. Security encompasses a great number of technologies, and those that provide integrity and confidentiality often differ from those that provide visibility into an environment which differ from those that provide availability. Continue reading Virtualizing Business Critical Applications – Integrity & Confidentiality
We opened this years virtualization security podcast with Phil Cox, the “Security Guy” at Rightscale, who is working through a tangled problem to meet compliance and auditing goals within the cloud. Rightscale is a 100% cloud based company delivering a solution that is also SaaS based. As such they often run directly into SaaS related issues. Rightscale has been running into a problem with the simplest of auditing requirements: how to know when someone has logged in. This problem spans nearly all their 100s of SaaS providers used to run their business. Continue reading SaaS Auditing: Knowing who did what