Is the cloud too much of a good thing? Virtualization and cloud computing have been one of the biggest technological advancements of the twenty-first century and they continue to grow at an amazing pace. Cloud computing has started to obtain mass appeal in corporate data centers as it enables the data center to operate like the Internet through the process of enabling computing resources to be accessed and shared as virtual resources in a scalable manner. Each day there seems to be a new announcement or press release about a new product or service that has been released utilizing some form of cloud computing, and I do not see this trend changing anytime soon. Continue reading Is the Cloud Too Much of a Good Thing?
When we look at the secure hybrid cloud, the entry point to the hybrid cloud is the end user computing device, whether that device is a tablet, smart phone, desktop, laptop, google glass, watch, etc. We enter our hybrid cloud from this device. From there we spread out to other clouds within our control, clouds outside our control, or to data centers. How these devices authenticate and access the data within these various places within the hybrid cloud becomes a matter of great importance and has been a concentration for many companies. How we protect the data that ends up on the end user computing device is also of great importance. Continue reading End User Computing within the Secure Hybrid Cloud
In many cases, when we mention Data Protection for the Hybrid Cloud, we are usually talking about backing up to the cloud. The cloud becomes a repository of our backup images and in some cases those backup images can be launched within clouds that use the same technology. Being able to send data to the cloud is becoming table stakes for infrastructure as a service (IaaS) data protection. However, once we move outside the realm of IaaS to Platform or Software as a Service (PaaS or SaaS), data protection is hit or miss. Continue reading Data Protection for the Hybrid Cloud
The secure hybrid cloud encompasses a complex environment with a complex set of security requirements spanning the data center (or data closet), end user computing devices, and various cloud services. The entry point to the entire hybrid cloud is some form of End User Computing device whether that is a smart phone, tablet, laptop, or even a desktop computer. Once you enter the hybrid cloud, you may be taken to a cloud service or to your data center. The goal is to understand how the data flows through out this environment in order to properly secure it and therefore secure the hybrid cloud, but since it is a complex environment, we need a simpler way to view this environment. Continue reading Securing the Hybrid Cloud
VMware will be the first vendor to deliver a Software Defined Data Center and a management stack for that data center. But if you want to, you can choose to build your own management stack for your SDDC out of products from vendors that specialize in one of the areas in our reference architecture. This would result in a Best of Breed SDDC Management Stack. Continue reading Best of Breed SDDC Management Stack
A couple of years ago we did two “secret shopper” posts about our fairly good experience using Red Hat OpenShift and our fairly dismal experience using CloudFoundry – then a VMware technology. CloudFoundry is now in the portfolio of a new company known as Pivotal, which has just launched a Version 2 of CloudFoundry.com. Red Hat has just launched a new version of OpenShift with private PaaS support, and we are re-visiting both offerings with a view to understanding how to adopt them, using an application we are developing for various other purposes. Continue reading PaaS Secret Shopper 2 – The Application Lifecycle