Understanding whether a virtualized or cloud based system or application is available and delivering acceptable response times to its end users is one of the most important tasks that must be addressed by any strategy for monitoring the performance of business critical applications. Continue reading Monitoring Virtualized Application Performance – Looking Outside In
Chad Sakac mentions on his blog that VNXe “uses a completely homegrown EMC innovation (C4LX and CSX) to virtualize, encapsulate whole kernels and other multiple high performance storage services into a tight, integrated package.” Well this has gotten me to thinking about other uses of VNXe. If EMC could manage to “refactor” or encapsulate a few more technologies, I think we have the makings of a killer virtualization security appliance. Why would a storage appliance spur on thinking about virtualization security? Continue reading EMC VNXe Spurs Thinking Outside the Box
A good Virtual Desktop Design architect needs to ask, “what is the best solution for this environment?” To answer that question, an effective design considers – “does the solution meet the users’ needs?
If your virtual desktop design starts with sizing hardware to support the amount of current physical desktops, starts with considering what applications can be virtualised, it has likely started in the wrong place. Continue reading The Virtual Desktop Design Maxim: Start With User Requirements
It is the start of a new year and the time to start taking a look at some of the 3rd party products that are available to help us manage our virtual infrastructures. To start the New Year off I am going to be looking at what VMTurbo has to offer. Continue reading A Look at VMTurbo Monitoring
In “IT as a Service Reference Architecture“, we presented a a categorization of the the functionality and the products that are needed in order to construct an IT as a Service system. Purposely missing from this architecture was the question of how to monitor the performance of the services delivered from the service catalog via the underlying policies and automation in the IT as a Service stack. Continue reading Performance Monitoring for IT as a Service
In the first Virtualization Security Podcast of 2011, we had Brad Hedlund with us once again. Not to talk about the Cisco Virtualization Security Gateway (VSG), but about the security of what I call physical-virtual devices that provide network virtualization within the hardware. Or what Brad Called Network Interface Virtualization (NIV). Cisco has taken its VN-Link technology to extend the networking of a VM directly into the core switch when using vSphere. Continue reading Cisco Pushing More vNetwork into Hardware