Microsoft Windows 2012 RDSH vs Citrix XenApp – PV to get its own Murderball?

PresentationVirtualizationThere is a pervasive question for Presentation Virtualisation using Remote Desktop Session Host services (RDSH) and that is  :-

if I’m already paying for RDS CALs and running the base OS, why do I need other stuff?

Where stuff is, typically, Citrix XenApp. With the release of Windows 2012 and the updates to RDSH do you still need Citrix XenApp?

I was introduced to many new sports over the summer and one sport that stuck in the mind, not only for it sheer fury and skill, was wheelchair rugby (or Quad rugby). Or as the Canadian inventors, named it – Murderball.

A key elements of the sport – it is a fast and very competitive exchange.

Your ball you say? I think not.
Picture from independent.co.uk

Sneaking into August, like an American multi-gold medallist back from a celebratory night out on the champagne, Microsoft’s Windows 2012 boasts a wide array of new features. Hyper-V’s improvement are worthy of a post in themselves: live migration, teaming of 32 NICs, thin provisioning, dynamic memory. For now, we’ll focus on the updates to Remote Desktop Service’s Session Host updates.

With new and improved functions in Remote Desktop Services in Windows 2012, how competitive is the exchange? Is it worth murdering a ball for?

Continue reading Microsoft Windows 2012 RDSH vs Citrix XenApp – PV to get its own Murderball?

Defense in Depth: Authentication and Authorization

VirtualizationSecurityOn the 7/29 Virtualization Security podcast we continued our discussions on defense in depth. We discussed authentication and authorization with IdentityLogix. IdentityLogix provides a unique solution that correlates users and groups against VMware vSphere’s own role based access control stores. In other words, IdentityLogix can identify if a user or group within active directory has more access to VMware vSphere’s management tools than they were intended to be allowed based not only on the user’s username but on the groups in which the user belongs. Why is this important to know? Continue reading Defense in Depth: Authentication and Authorization

Return on Agility and the Cloud

Stopwatch Image of AgilityAmazon’s CTO Werner Vogel recently posted about the challenge of choosing the right metrics for cloud computing. He begins with the following observation where he introduces the idea of Return on Agility:Stopwatch Image

“In the many meetings with customers in which I have done a deep dive on their architecture and applications to help them create an accurate cost picture, I have observed two common patterns: 1) It is hard for customers to come to an accurate Total Cost of Ownership (TCO) calculation of an on-premise installation and 2) they struggle with how to account for the “Return on Agility”; the fact that they are now able to pursue business opportunities much faster at much lower costs points than before.” Continue reading Return on Agility and the Cloud

News: ExtraHop Networks and Splunk Partner and Integrate their Solutions

VirtualizationManagementIconAt VMworld 2012, VMware announced the vCloud Suite, two editions of which (Advanced and Enterprise) include vCenter Operations. VMware has therefore now signaled that monitoring at the operations level is just a feature of a larger suite. Prior to VMworld, VMware also announced that it had acquired the Log Insight technology and team from Pattern Insight.  While nothing was said at VMworld about the future integration of Log Insight into vCenter Operations, one has to make the reasonable assumption that this will occur. VMware also said nothing about integrating its APM solution (vFabric APM) into the suites, but we have to also make reasonable assumptions that this is a matter of when and not if. Now ExtraHop Networks and Splunk have partnered to create an entirely different kind of suite.

Continue reading News: ExtraHop Networks and Splunk Partner and Integrate their Solutions