VMware continues to make astounding progress virtualizing business critical applications – as evidenced by its increasing rate of progress virtualizing SAP, Oracle databases, and application systems supported by Oracle databases. The goal of 100% x86 virtualization appears to attainable for most enterprises.
At the recent Misti Big Data Security conference many forms of securing big data were discussed from encrypting the entire big data pool to just encrypting the critical bits of data within the pool. On several of the talks there was general discussion on securing Hadoop as well as access to the pool of data. These security measures include RBAC, encryption of data in motion between hadoop nodes as well as tokenization or encryption on ingest of data. What was missing was greater control of who can access specific data once that data was in the pool. How could role based access controls by datum be put into effect? Why would such advanced security be necessary?
Taking your cloud from a dev/test/pilot/training use case to a platform for business critical enterprise applications introduces significant new requirements that first generation cloud management platforms were not designed to meet. Elasticity and self-service are nice features, but these features alone fall far short of what is needed to provision and run enterprise applications in clouds.
Having successfully virtualized all of the low hanging fruit in its customer base, VMware has now put a serious focus upon virtualizing business critical applications and performance critical applications. That focus includes not just highlighting progress to date, but also working with partners who have specific domain expertise is specific applications.
We at The Virtualization Practice, LLC have migratedg our business critical applications to the cloud. How simple was that task? It was not as easy as we have heard from others, and not as difficult as some have had, but it was not as simple as move my VM and run. Why is this? What are the methods available to move to the cloud? How do they stack up to what actually happens. Theory is all well and good, and I have read plenty of those architectures, but when the shoe leather hits the cloud where are we? Here is a short history, a comparison of methods, and some conclusions that can be drawn from our migration to the cloud.
Virtualizing business critical applications and performance critical applications requires the use of modern virtualization aware and cloud aware APM tools that can easily adapt to large number of diverse and rapidly changing applications.