Browsium released Catalyst a browser management utility designed to make deploying multiple browsers in the enterprise a manageable reality. We see what substance there is in Catalyst’s ability to increase the rate of support and change in your browser deployment and how it could impact user experience and environment security .
Unless you are one of the few who have gone all solid-state devices (SSDs) for your virtual environment, hard disk drives (HHDs) still have a role. That role might be for primary storage of your VMs and/or their data, or as a destination target for backups, snapshots, archiving or as a work and scratch area. Or perhaps you have some HDDs as part of a virtual storage appliance (VSA), storage virtualization, virtual storage or storage hypervisor configuration. Even if you have gone all SSD for your primary storage, you might be using disk as a target for backups complimenting or replacing tape and clouds. On the other hand, maybe you have a mix of HDD and SSD for production, what are you doing with your test, development or lab systems, both at work and at home.
We at The Virtualization Practice, LLC have migratedg our business critical applications to the cloud. How simple was that task? It was not as easy as we have heard from others, and not as difficult as some have had, but it was not as simple as move my VM and run. Why is this? What are the methods available to move to the cloud? How do they stack up to what actually happens. Theory is all well and good, and I have read plenty of those architectures, but when the shoe leather hits the cloud where are we? Here is a short history, a comparison of methods, and some conclusions that can be drawn from our migration to the cloud.
A major aspect of virtualizing any business critical application is data protection which encompasses not only backup, but disaster recovery, and business continuity. It is imperative that our data be protected. While this is true of all workloads, it becomes a bigger concern when virtualizing business critical applications. Not only do we need backups, but we need to protect the business, which is where business continuity comes into play.
As I shoveled even more snow, I was starting to think about automation, as in how could I get something to shovel the snow for me, which lead to thinking about automation within the cloud. I see lots of discussion about automation in the cloud. Many of my friends and colleagues are developing code using Puppet, Chef, vCenter Orchestrator, etc. This development is about producing the software defined datacenter (SDDC). However, I see very little in the way of security automation associated with SDDC.
We’ve discussed the fact that VDI appliance makers were making good progress simplifying adoption of a virtual desktop infrastructure. An appliance-based route to market can be seen as win-win: being designed both to reduce cost and complexity of implementation (for the customer) and shorten sales cycles (for the vendor). So goes the theory. To understand this theory further one VDI appliance vendor, Pivot3, commissioned Dimensional Research to survey global IT in order to get real-world insight into the state of VDI.