With the myriad cases of cyber-theft and security breaches that headline the news every day, it’s no wonder that system improvements are taking a back seat to security items within most IT organizations. While many vendors highlight new products or features as being better, cheaper, and/or faster, those items are having limited success compared to those that address being secure.
Articles Tagged with virtualization
Mobile World Congress is in full swing in Barcelona, Spain, this week. This year, the Samsung Galaxy S7 and numerous other devices were added to the myriad options that users can purchase. While there have been many announcements about new mobile devices, manufacturers are making it clear that this year won’t be as robust as last in terms of sales of new smartphone and tablet devices. Nevertheless, last year was the turning point when the number of mobile devices worldwide exceeded desktop devices, so as expected, mobility continues to reign as monarch.
I have been following containers for quite some time now. A year ago it was safe to say that container technologies like Docker were far from production ready when it came to security. What I have seen over the past year is a ton of development towards closing that gap. For this post, I’ll focus on Docker.
With the proliferation of virtualized applications and desktops, the concept of any user accessing any application or desktop from any device has become reality. Whether accessed from a smartphone, tablet, or desktop, whether tethered or untethered, all the resources that users require must be accessible.
Whatever happened to mobile virtualization? Just a couple years ago, there seemed to be a ton of hype about mobile virtualization. The goal was to be able to run multiple isolated virtual instances on a single physical device. I remember walking the expo floor during the VMworld conference that year and seeing all the demo phones on display; I also saw a demo of the technology during one of the keynote presentations. Then, focus seemed to move over to network virtualization.
With half of the first quarter of 2015 already behind us, many IT organizations are in fast-forward mode, making progress on addressing annual projects and goals, including many that involve virtualization. With the plethora of new products and services available, how many of those virtualization projects are based on shifting gears to new vendors or technologies in order to address business and technical requirements?