Another Missile Fired in the Cisco vs. VMware SDN War

Network VirtualizationYesterday I was reading about Cisco’s fourth quarter earnings results, as you do when you are bored and waiting for the next episode of EastEnders to start—well, we all have to take a rest from SDN goodness every now and then. Now, this was interesting for two reasons. It was the last quarter under the leadership of big bad John Chambers and the first announced by new head honcho Chuck Robbins (sounds like a cross between a cage fighter and a liberal comedian). Firstly, congratulations are in order on the results—Cisco exceeded analysts’ predictions of $12.6 billion in revenue, with $12.8 billion and a per-share profit of 59 cents, up almost 4% over the previous year, and an overall year-over-year increase of 4%. Continue reading Another Missile Fired in the Cisco vs. VMware SDN War

Tracking the Hot Container Market

agilecloudThe container market is moving at the speed of light. Each vendor in this space is delivering features at an amazing pace. In fact, things are moving so fast that this article will likely be way outdated in about 2 months. It was just under two months ago when I reported on the many announcements made at DockerCon 2015 in San Francisco. Since then, each vendor has made a number of significant announcements about new features or partnerships. Here is a rundown of what has been announced by the major players in the hot container space. Continue reading Tracking the Hot Container Market

It Is That Time of Year Again

CloudComputingIt is that time of year again. Wow, another year has gone by so quickly. If you are reading this post, then most likely you have heard about VMworld 2015, which is happening at the end of this month in San Francisco. I am happy to say that I have the privilege of attending the conference again this year. This annual virtualization reunion is a chance to see people you only get to see once a year, though you probably have been communicating with each other in the meantime. If you are attending this year, I hope our paths can cross sometime during the week.

Continue reading It Is That Time of Year Again

Should We Care If the Handheld Is Secure?

VirtualizationSecurityAndroid devices recently suffered a spate of attacks. Similar attacks have been made against Apple devices and nearly every other brand of smart device. Does this mean that this is the end of Android or of mobile devices? Or does this mark the rise of mobile device management (MDM) and other software specifically designed to secure end user computing (EUC) devices? EUC security has two failure points: the handheld device and further in the network. But does an insecure device imply loss of data? Perhaps. Loss of credentials? Once more, perhaps. But do we really care? That is not known. So, let us look at a typical use case. Continue reading Should We Care If the Handheld Is Secure?

Hyperwashing: What Makes a Solution Hyperconverged?

DataCenterVirtualizationWhenever an innovation or buzzword gets popular, it is natural for marketing to pile on and apply the word to products. We are starting to see “hyperconverged” achieve this sort of recognition. Early hyperconverged vendors built their solutions from the beginning to be hyperconverged and deliver a set of values. These vendors continue to work at educating the market on the nature and value of hyperconvergence. Now, the customer appetite for hyperconverged solutions is proven and lucrative. Other vendors are calling their products “hyperconverged” because they have some of the characteristics, but giving something a name doesn’t change its nature. At the same time, giving something the wrong name doesn’t mean that thing isn’t valuable. So, what does make a solution hyperconverged? What is it about these solutions that makes them deserve a different name?

Continue reading Hyperwashing: What Makes a Solution Hyperconverged?

IT Transformation: SME

BusinessAgilityThere are many reasons to use cloud resources, and there are many reasons to enter the cloud, of which we have spoken about fairly regularly as part of our IT Transformation series. The real question is: “When should you use cloud services?” Or, more to the point, “When should you use new cloud services in control of IT and not the business?” That is really the crux of the discussion; business users use cloud resources all the time. The choice to use them is based on getting your job done and not IT’s decisions. We often call this “shadow IT,” but is it? Let us look at a few examples and decide—is it shadow IT (as in, should be in IT’s hands to control?), or  is it part of doing business and therefore a business decision? Does the definition change as we grow a business or change the scale of the business? Continue reading IT Transformation: SME