In the last Virtualization Security Podcast on 12/16 we had with us James Urquhart who manages cloud computing infrastructure strategy for the Server Provider Systems Unit of Cisco Systems. Author of the popular C|NET Network blog, The Wisdom of Clouds. James shared with us some of his Wisdom over the hour. The discussion covered what is preventing people from Entry into the Cloud and why private and hybrid clouds are going to stick around for quite a while and are not a passing fad. We answered the question of why people are reluctant to enter the cloud. Continue reading Entry into the Cloud…
Rackspace a leading hosting and public cloud vendor has acquired Cloudkick, a Monitoring as a Service vendor focused upon monitoring the software infrastructure layer in Infrastructure as a Service (IaaS) clouds. Rackspace will now be able to offer basic monitoring of the operating system layer of the IaaS stack as a service to its customers, and also use the very same dashboards that the customers use for their own support staff to assist in troubleshooting. Continue reading Rackspace buys Cloudkick – Implications for IaaS Performance Management
We don’t do Politics here at the Virtualization Practice, but we do need to look at the biggest Cloud Computing story of the year – WikiLeaks. For those who haven’t been following it the relevant points are
- Wikileaks has posted some confidential data on the internet
- Various attempts have been made to shut it down
- Various countermeasures have been taken by Wikileaks and its supporters.
We are covering this story because we believe that the enormous coverage of this particular sequence of events is much more likely to shape the future of cloud computing through its impact at the “C” Executive level (i.e. CEO, CIO and CFO) than any vendor announcement or technology trend that impacts IT. Continue reading WikiLeaks – War in the Clouds
Reviewing this year’s activity in the virtual desktop space has been very exciting. We have seen releases from almost all of the major vendors, and companies are beginning to truly adopt virtual desktops as a part of their overall desktop initiatives. I had the opportunity to speak with Aaron Cockerill, Senior Director of Product Management for XenDesktop at Citrix, recapping 2010, and more interestingly, looking at what’s in store for virtual desktops in the future. Continue reading The Year Virtual Desktops became “Real”
In Part IV we discussed the challenges of Application Delivery, and how Application Virtualization could offer alternatives.
Application Delivery can present difficulties in ensuring applications are installed in different environments, can be complex to manage and introduce compatibility issues that delay deployment and increase costs. Application Virtualization offers a number of advantages for providing access to applications over traditional Application Deployment; but it is not without caveats. Application Virtualization process of creating a virtualized application can be complex; it can require an infrastructure to be in place and there is also an interesting consideration as to whether application can adversely impact a hosted virtual desktop implementation.
Perhaps, those weren’t the answers you were looking for. Perhaps, you considered it a boring conversation anyway.
In this conclusion of the two-part trilogy, we’ll discuss Application Virtualization solutions, and what they can offer you. We look at solutions from Citrix, Endeavours Technologies, InstallFree, Microsoft, Spoon, Symantec, UniDesk and VMWare. We’ll also consider the question “is it a choice between Application Delivery vs Application Virtualization?” to reduce the cost to your business of application deployment.
I have been thinking about blades and virtualization security for some time spurred on by a conversation with Brad Hedlund six months ago. Nearly all my customers use Blades and virtualization security is a big concern to them. In my Rethinking vNetwork Security article, I touched on some of the issues in response to Brad’s comments a while back. I would like to now expand that discussion to blades.
There are three sets of blade enclosures I would like to discuss, those that use pass thru networking, those that use standard switching fabric within the enclosures, and those that use flexible interconnects such as HP Flex-10 and Cisco Palo adapters. The last is the so called physical-virtual network device. Continue reading Blade Physical-Virtual Networking and Virtualization Security