Managing a user’s desktop persona and making it extend across multiple desktop delivery platforms is a key component in any company’s desktop strategy. User Virtualization describes a category of solutions that capture and manage the end user experience that allows a “follow me” feature of the desktop persona.
In a press release on June 29, 2011 AppSense announced that its User Virtualization Platform is now a core building block of HP’s new Client Virtualization Reference Architecture. Along with Microsoft, VMware and Citrix, AppSense User Virtualization has been recognized by HP as a crucial technology for a successful architecture that meets the goals for client virtualization. Continue reading HP embraces AppSense for Reference Architecture
There are many lines and silos in an IT organization. In many IT organizations, the people who care about servers, networks, and storage are in fact three different teams that try hard not to talk to each other. There is often an OS team (for each major OS), which has to talk to the teams that provide the hardware that supports their OS. Virtualization has served as a forcing function to get many of these teams to talk to each other. But what about those applications teams? Continue reading Should VMware Administrators Care About Applications Performance
Security in the cloud and the virtual environment is ‘all about the data’ and not specifically about any other subsystem. It is about the data. As such the data has something it knows (the contents of the data), something it is (its signature), and something it has (its digital rights) and since it has these three elements, the data has all it has identity. However, protecting the data requires us to put things between the data and the real world such as firewalls, and complex role based access controls, as well as methods to replicate the data to other locations in a non-intrusive mechanism. The goal to such replication could be to ensure multiple sites have the same data (such as a hot-site) or to have the data available in another locations in case of disaster. In addition, such data must maintain its identity. Continue reading Replication Receiver Clouds: Protecting your Data
As a delegate for Tech Field Day 6 in Boston, I was introduced to SRM Replication as well as ZeRTO a third party replication tool. They seem to be as different as night and day but are they? Both work within the vSphere environment to replicate virtual disks regardless of storage type, and apparently hook into the same location within VMware’s API stack. This shows a maturity of VMware’s API stack that until now has been unknown and secret. In this one area, Microsoft Hyper-V is beating VMware vSphere: The availability of well known APIs that are easy for Third Parties to use. I now see a change in VMware’s behavior, can they continue this growth? Continue reading Virtualized Replication: vSphere APIs Expand
We’ve touched on Red Hat’s Cloud strategy in a number of posts. To summarize they’re trying to play at all levels in the stack, from IAAS and PaaS through to hypervisor and of course operating system. All layers are open, and as you get further down the stack towards virtualization they are pushing KVM but they are clear that they have to co-exist with Microsoft and VMware. In the IaaS layer they have DeltaCloud, which is nominally open but is really a Red Hat product with an open veneer. In the PaaS layer they have a stack of really good middleware from JBoss, and an openness to a whole bunch of Java/JVM and non-JVM languages. They’re punting this out to the world as OpenShift.
So far, although there are nuances that differ from other vendors, the main conclusion is that each individual layer is comparable to offerings from competitors. However, there is one layer that sets Red Hat apart from competitive offerings, known as MRG – Messaging Realtime and Grid, pronounced “Merge”. If you’re wondering what this is, it seems also that some of are bits of Red Hat’s marketing department that haven’t got a clue either because the market positioning is a bit vague. Continue reading Red Hat releases MRG 2.0 – messaging for the cloud.
As a delegate for Tech Field Day 6 in Boston, I was introduced to many third party management tools. In the past I have been given briefings as well on various VMware, Hyper-V, and Citrix Xen Management Tools as well. Many of these tools are marketed directly for use by the administrator, but they have the tools can be used by more than the administrator. These tools should be marketed to management, administrators, as well as the network operations center (NOC). The NOC you say, why should they see the details of my environment? The NOC should not, but they should be able to tell when systems are in failure states outside of the hardware. Only a few tools can be used this way today. The sooner administrators get the word of a problem the sooner it can be fixed. The NOC is the one place that centralizes all monitoring whether it is for security or health of your virtual and cloud environments. Continue reading Where are my NOC Views: Virtualization Management Vendors