Articles Tagged with vCloud Director

CloudComputing

How Much Private Cloud Do You Need?

CloudComputingHow much private cloud do you really need? A private cloud is all about the IT department getting out of the way of its internal customers, enabling business units and individual developers to provision their own VMs and get on with doing their jobs. But building and operating a private cloud is a complex, and therefore expensive, task. There needs to be a large payoff before there is a real business benefit. Some businesses don’t really need a private cloud platform. Often, their business processes will prevent real self-service on their private cloud. For these organizations, there may be simpler ways to achieve their desired business outcomes.

Read More

DataCenterVirtualization

A Secure Cloud Framework for Non-Clouds

DataCenterVirtualizationIs it possible to use a cloud framework to better secure your datacenter? Do cloud technologies provide a secure framework for building more than just clouds? We all know that virtualization is a building block to the cloud, but there may be a way to use cloud frameworks to first secure your datacenter before you launch a private, public, or hybrid cloud. In essence, we can use tools like vCloud Director to provide a more secure environment that properly segregates trust zones from one another while allowing specific accesses.

Read More

CloudComputing

vCloud Suite: Why is VMware Turning its Back on VM-based Licensing?

CloudComputingAt VMworld VMware announced the release of the vCloud Suite of products. This new suite of packages, depending on the level purchased, bundles together several individual products into a single purchase point. See the table later for details of which package includes which product.

However, to me the most interesting point was the fact that this suite is purchased per processor, not per VM. This, coupled with VMware’s announcement of the death of vRAM, means that you can in theory now get a lot more bang per buck spent with no artificial limits set on usage.

Read More

VirtualizationBackup

New Breed of Replication Receiver Clouds

VirtualizationBackupThere is an ever-increasing number of data protection providers creating replication receiver clouds as they team up with cloud service providers. This could herald the end of on-premise tape use for some enterprises, leaving tape to be used primarily by cloud providers. There are major benefits for Quantum, Zerto, Veeam, and others to form replication receiver clouds, but these clouds are not just for storage anymore. They could be purely for storage, but this is not a big win for the cloud service providers. So why would cloud service providers be interested in being a storage endpoint for data protection? Why are they concerned with backup and offering it as a service?

Read More

The 2012 Cloud Management Challenge

So what is the difference between virtualization and cloud computing, and why should you care. If you have virtualization, do you have cloud computing? If you have virtualization do you need cloud computing? How is the ROI for cloud computing different or better than the ROI for cloud computing? Does cloud computing help me compete with Amazon EC2? Does Cloud Computing help me virtualization business critical applications? How does cloud computing fit into VMware’s automated IT Operations vision? These important questions, and the answers to them will determine how Cloud Management does as a category in 2012 and beyond.

Read More

Link your Clouds using AFORE Cloudlink

AFORE Solutions has created AFORE Cloudlink, which won the Best of VMworld for Security at VMworld 2011 in the United States. Yet, many people were scratching their head saying, who are AFORE and why did they win. AFORE moved from a physical appliance to a virtual appliance about 3 years ago providing a way to move data between data centers in an encrypted fashion, which at the time was desperately needed. After three years they have made quite a few changes, but still have their core functionality, but now included data at rest encryption and the ability to stretch layer-2 and layer-3 networks between locations amongst others.

Read More