Welcome to The Virtualization Practice’s week-long coverage of VMworld US 2015. Tune in all week for our daily recap of the major announcements and highlights from the world’s premier virtualization and cloud conference.
VMworld US 2015 continued yesterday, kicked off by the general session. End-User Computing’s Sanjay Poonen led the keynote, in which VMware fleshed out what it means by “any application and any device” within the “Ready for Any” theme of the conference. Beginning with the VMware Workspace Suite, VMware talked at length about the growth of mobile computing and how AirWatch, together with VMware App Volumes, enables IT to manage all Windows 10 devices (physical and virtual, mobile or not), as well as iOS and Android devices, from a single pane of glass. Foreshadowing the next speaker, Poonen wrapped up his portion by talking about the synergies between AirWatch, Horizon, and NSX, with policy settings in NSX affecting and being affected by AirWatch connectivity and data access.
Continue reading VMworld US 2015: Day 3 Recap
In previous articles, we discussed IT transformation in general, IT transformation and security, and the top-down and migration approaches to IT transformation. Now, it is time to discuss a method of IT transformation I call “no changes to management.” With this method, IT transformation happens by natural, existing means within the data center, by adding software to aid and augment existing management software. That software forms the core of a transformation engine that, in effect, migrates and manages your cloud presence from your on-premises existing management suite. Continue reading IT Transformation: No Changes to Management
Transforming IT, a subject of many discussions within organizations today, was a major topic at EMC World 2015. Lynn LeBlanc of HotLink and Edward Haletky spend some time discussing transforming IT into a hybrid cloud landscape on this Virtual Thoughts video podcast. We look not only at HotLink technology, but also at what it really takes to transform your existing environment into a hybrid cloud environment.
Continue reading Virtual Thoughts with HotLink
At The Virtualization Practice, we have systems running in the cloud as well as on-premises. We run a 100% virtualized environment, with plenty of data protection, backup, and recovery options. These are all stitched together using one architecture: an architecture developed through painful personal experiences. We just had an interesting failure—nothing catastrophic, but it could have been, without the proper mindset and architecture around data protection. Data protection these days does not just mean backup and recovery, but also prevention and redundancy. Continue reading Data Protection: All Starts with an Architecture
We are still coming to grips with the impact of the Xen and Bash shell issues that have sprung up lately. The issues are enough to make us realize that there are some serious pitfalls to cloud computing—or more to the point, pitfalls to using only one cloud service provider. We talk about using live migration and other tools to alleviate downtime, but have we really thought through the use of these tools at cloud scale? What was the impact on your environment, and how have you decided to alleviate that impact? Those are the questions that come out of the latest set of issues with cloud computing. Continue reading Cloud Computing Pitfalls
In the past, I have written about the next generation of data protection, which combines analytics with broader data and holistic system protection into one easy-to-use product (or set of products). The goal is to take disaster recovery to the future, when we will be able to restore and test our restores of not just our data, but also the systems required to make that data accessible, including all networking and security constructs. If you were to have a massive disaster, could your disaster recovery techniques restore your entire environment at just a push of a button? Does your disaster recovery testing feed back into analytics to determine what needs to change to make this a reality? Continue reading Next-Generation Data Protection: Realities