Application Virtualization allows users to use potentially conflicting software in the same workspace. Towards the end of 2010 there was a great deal of discussion about the complexity of using application virtualization to finally let corporations end their dealings with the recalcitrant Internet Explorer 6. Continue reading Browsium Release Candidate available: time to put Internet Explorer Virtualization issues to bed?
Everyone living in the Northeastern United States has been victim of some of the most significant snowfall in recent history. There is more snow, icy rain and sleet than we know what to do with. Every day my neighbors and I are out clearing off driveways and walkways so we can get to our cars and head out to work, only to be met with slick on and off-ramps, narrowed streets and a continuous bombardment of slush from the vehicles in front of us. What is most frightening to me is the increase in heart attack deaths that are reported from people after they have shoveled large amounts of snow.
The American Heart Association warns that people should take extreme precautions when shoveling snow. See this article on Winter Weather Tips published by the AHA. Basically what happens is the heart rate and blood pressure increase while shoveling snow. That, coupled with the body’s natural reflex to constrict arteries and blood vessels when exposed to the cold and a buildup of lactic acid, can lead to a heart attack in those who are at risk.
Business owners, you and your company can help reduce these events from occurring by implementing policies, processes, and tools for your employees to stay at home and still work effectively. Continue reading Save lives, implement VDI
At last year’s VMworld in San Francisco Stephen Deasy (Director, R&D, VMware) and Srinivas Krishnamurti (Senior Director, Mobile Solutions, VMware) announced VMware’s plans for a type II mobile hypervisor platform. Three months later VMware and LG have announced a partnership to install VMware Mobile Virtualization Platform (MVP) on LG smart phones starting in 2011. While significant questions remain about the viability of this partnership, the need for a mobile virtualization solution cannot be stressed enough. Continue reading Mobile malware reinforces need for mobile hypervisors
On the second Virtualization Security Podcast of 2011, we had Doug Hazelman of Veeam as our guest panelist to discuss backup security. Since most of backup security relies on the underlying storage security, we did not discuss this aspect very much other than to state that the state of the art is still to encrypt data at rest and in motion. What we did discuss is how to determine where your data has been within the virtual or cloud environment. This all important fact is important if you need to know what disks or devices touched your data which is an auditing requirement for high security locations. So we can take from this podcast several GRC and Confidentiality, Integrity, and Availability elements:
- Backup Integrity and Confidentiality State of the Art is Encryption of Data at Rest which is in many cases handled by the underlying storage security.
- Virtualization Backup tools can only track where data has been based on what it sees. Since data is contained within virtual disks generally, the Hypervisor is responsible for tracking a virtual disk’s location. Continue reading Knowing where your Data is: Backup Security
The question of how to manage virtualized environments as they scale up in size and complexity, and grow to host business critical applications (instead of just low hanging fruit tactical applications owned by IT) is clearly starting to get attention by larger vendors with serious ambitions in the virtualization performance management market. NetApp is acquiring Akorri, putting NetApp into a leadership position in Infrastructure Performance Management. Now SolarWinds acquires Hyper9. Continue reading SolarWinds Acquires Hyper9 – The Implications
I have started the year 2011 out by looking at some of the different monitoring solutions available for us to have an insight into the health and welfare of the systems that we support. In your typical monitoring solution you would install the monitoring server in your environment and let the system discover all the devices in your infrastructure and/or to control the licenses we would manually enter the devices that we want to monitor. Some of these monitoring servers solutions have to have a beefy box to begin with and all solutions will need a great deal of “tweaking” to control the number of false positives as well as time put in to be able to report on what exactly we care to be alerted about. Continue reading Monitoring from the Cloud