IT Transformation: Top-Down Approach

BusinessAgilityWe recently discussed the need for a plan when performing IT transformation. There are three approaches to choose from when planning. The first approach is a top-down approach. This approach educates C-level and upper management about IT transformation so that they can begin to plan and can understand the costs and benefits. In general, this approach is usually taken when the change is massive and there is a significant cost associated with such a transformation. Continue reading IT Transformation: Top-Down Approach

Anatomy of a Desktop Virtualization Project #3: PoCs and Pilots

DesktopVirtualizationSo, you’ve run through the application analysis and vendor engagement phases. Ideally, these two phases will have provided you with (a) pertinent information about your environment, and (b) the solution or solutions that may work best to deliver the applications in your environment. The next logical stage of the project is to move toward a PoC (proof of concept) and pilot phase.

Continue reading Anatomy of a Desktop Virtualization Project #3: PoCs and Pilots

Citrix Shops: You’d Better Upgrade to StoreFront 3.0 … Or Else!

ApplicationVirtualizationWhile you might think that you must upgrade to StoreFront 3.0 because of something Citrix-related, that’s probably not the case. Only if your users prefer Chrome as the local web browser for accessing Citrix resources and don’t wish to experience issues must you upgrade to StoreFront 3.0. We can blame it on Netscape and Google.

Continue reading Citrix Shops: You’d Better Upgrade to StoreFront 3.0 … Or Else!

IT Transformation: Architecture Includes Security

CloudComputingI recently had a number of consulting conversations about IT transformation and adding new Security as a Service products to companies’ existing clouds and tenancies. This is the beginning of IT transformation in many cases. A company has realized it needs to provide security to its tenants while using clouds more securely at the same time. This is a hybrid cloud. The company provides a cloud, yet uses tools from Box, Salesforce, Google, Microsoft, and the like. So, where do we start with IT transformation? With architecture that includes security. Continue reading IT Transformation: Architecture Includes Security

Choices We Have Plenty: Your Guide to Virtual Switches

DataCenterVirtualizationI was tinkering around with XenServer the other day. I know I can hear you saying “is that a thing?” Well, it is, but this is not what I am going to talk about today. Time for a tangent shift. I thought I would have a look for a third-party switch for XenServer, but it seems that XenServer is a third-rate citizen in this space, as there is no Cisco Nexus 1kV available for XenServer, even though Cisco previewed it at Citrix Synergy Barcelona in 2012.

Continue reading Choices We Have Plenty: Your Guide to Virtual Switches

RedHat Summit: All about Containers

agilecloudI had the opportunity to attend Red Hat Summit and DevNation. Nearly every answer to any question at both these events was to “use containers” to solve that problem. While some responses were undoubtedly true, others were not quite as completely true. Yes, you can use containers to solve many problems, but what was often overlooked were the underlying bits of infrastructure necessary to provide the base for the containers. Overall, Red Hat Summit delivered on its promise; I will follow up about DevNation at a later time. Continue reading RedHat Summit: All about Containers