HotLink® Corporation, the market leader in transformation solutions for heterogeneous virtualization management, today announced the latest release of its flagship product, HotLink SuperVISOR™ for VMware vCenter – the only technology to extend VMware vCenter management capabilities to Microsoft Hyper-V, Citrix XenServer and Red Hat Enterprise Linux (KVM). Continue reading News: Hotlink Enables Cross-Platform Cloud Management
When evaluating clouds there are three major criteria that are used first before we get into the nitty gritty of how the system works. The criteria is not always in writing but it is in the back of everyone’s mind and in many cases are nebulous to define. Herein, I will try to look at those criteria in order to aid others in making the same decisions I have had to make lately while evaluating clouds. Continue reading Evaluating Clouds
How good an idea is it to virtualize XenApp? Way back in 2010, when more of the poles were ice, we asked is virtualizing Citrix XenApp a waste of time and effort? There were a number of benefits identified: hardware abstraction allowing easier image management and OS upgrades; options for higher availability and faster recovery, even failover; virtualization-enabled silo consolidation; and importantly, better management of user capacity on servers.
Yet, with XenApp running on Windows 2008 R2 memory limitations are of far less issue. Introducing a hypervisor has an overhead which can impact user density and can change Microsoft server license costs per physical server. Do these considerations outweigh other benefits? Hypervisor technology and performance has moved on considerably – what is the impact of that? What other services can virtualized XenApp drive?
As computing, storage and networking continues migrating from physical equipment to virtual environments, provisioning and managing them increasingly relies on software. One of the most important benefits of virtualization and cloud computing is the idea infrastructure as code, using code, automate the provisioning and managing of entire application environments and ecosystems (infrastructure) reliably on demand. This idea, in conjunction with the agile development practices, is what makes continuous delivery possible for leading companies like Facebook, Flickr, Etsy and others.
In agile teams today, developers writing applications partner with DevOps team members writing, testing, building and packaging infrastructure as code with tools including Puppet Labs, Chef and Cucumber. This is helping traditionally bottlenecked and silo-od infrastructure teams begin working more closely with the application teams and improve overall business agility. DevOps team members write infrastructure code alongside the application under development – all leveraging popular development practices including code management, continuous integration, release automation and test-driven development. Continue reading Infrastructure as Code: From Bottleneck to Test-Driven
Recently I discussed Virtualizing Business Critical Applications and security, which includes availability, confidentiality, and integrity. However, that discussion was more about visibility into the environment for security operations. I purposely left off the discussion of gaining integrity and confidentiality of the data housed within those business critical applications. Security encompasses a great number of technologies, and those that provide integrity and confidentiality often differ from those that provide visibility into an environment which differ from those that provide availability. Continue reading Virtualizing Business Critical Applications – Integrity & Confidentiality
We opened this years virtualization security podcast with Phil Cox, the “Security Guy” at Rightscale, who is working through a tangled problem to meet compliance and auditing goals within the cloud. Rightscale is a 100% cloud based company delivering a solution that is also SaaS based. As such they often run directly into SaaS related issues. Rightscale has been running into a problem with the simplest of auditing requirements: how to know when someone has logged in. This problem spans nearly all their 100s of SaaS providers used to run their business. Continue reading SaaS Auditing: Knowing who did what