Citrix and Microsoft have each been gritting their teeth at VMware for years. Despite that, VMware has experienced longstanding success in the virtualization space. Clearly, neither Citrix nor Microsoft expected VMware to develop into such a powerhouse.
Articles Tagged with VMware
You may or may not be aware that I have just moved house, and, me being me, I have not done it by halves. My family and I up’d sticks to the other side of the world, and we landed in Perth—not Scotland, but Australia. Call it a cross-cloud migration; this obviously was fraught with difficulties and did not go as smoothly as planned. This has got me thinking about moving home in a cloud environment, whether from site to site, region to region, or cloud provider to cloud provider. In a perfect world, this should be as simple as live migration is today between like-minded virtualization hosts: VMware to VMware, Hyper-V to Hyper-V. The unfortunate truth is that this is not the case.
In February, several of the top virtualization vendor companies released their fourth quarter results and guidance. From these releases, we should be able to get an understanding of how the companies are performing. VMware, Citrix, and Red Hat are the companies for which I have some data to share. The source of the revenue reports is Cleveland Research Company, and the sources of the individual company reports are CRC and FactSet Estimates.
There is a growing movement to encrypt everything. I prefer encrypting specific data, not everything. However, modern CPU chipset features have sped up encryption so much that encrypting everything is a valid option. Encryption requires one to have access to the keys or the related encryption secrets. Those secrets need to be at the fingertips of your applications or management tools. Encryption secrets should be readily available to an application. How do we achieve this? The February 9, 2017 Virtualization and Cloud Security Podcast addresses this issue. In this podcast, Virtuozzo’s Chief Software Architect, Pavel Emelyanov, joins us to discuss container encryption.
The popularity of Desktop as a Service (DaaS) and Workspace as a Service (WaaS) has continued to increase, as has the number of providers offering such services. DaaS/WaaS is split between two types of customers: the do-it-yourself (DIY) types and those who enlist the assistance of a service provider to implement and maintain these services.
Is 2017 the year when cloud migrations will really take off? By “cloud migration,” I mean the migration of applications or workloads to an Infrastructure as a Service (IaaS) or Platform as a Service (PaaS) platform. Corporations have been laying the groundwork by training, hiring, and building cloud services teams that encompass a cloud migration group, commonly referred to as a “migration factory.” All the pieces have been put into place, and what is left is the execution of the migration. Some companies’ overall cloud strategy is a strategy not just to get to the cloud, but also to get control of workloads deployed to the public cloud along the way.