In our ongoing quest to determine how our readers use cloud technologies, our second poll is now available: Which Type of Data Protection Service(s) Do You Use? This poll’s goal is to determine how data protection fits into your organization’s use of the cloud, if it does at all. There are many cloud-based tools for data protection, as well as many integrations between data protection vendors and cloud service providers. We’d like to know if these tools are being used, and if they are, which ones. Continue reading How Do You Data Protect?
Microsoft and VMware have been, in my opinion, two companies in direct competition with each other during their respective journeys to the cloud. VMware started first, paving the way for virtualization in corporate data centers. One could argue that once VMware demonstrated success with virtualization running corporate critical systems, Microsoft decided to go all in developing its virtualization strategy. Once the Microsoft juggernaut gets released, it seems there is no way to stop or even slow down the Microsoft machine.
Distributed cloud service is a growing phenomenon. It fills several roles, distributing data for use by distributed applications, for data protection, and for other reasons. We have been seeing an increase in the number of distributed applications. Non-distributed applications lack the resiliency that is required to work within a cloud, whereas distributed workloads add a certain amount of resiliency to an application. Depending on how they are architected, the lack or failure of one part of a distributed application won’t bring down the entire application. Use of multiple clouds ensures your eggs are not all in one basket, so to speak. Continue reading Distributed Cloud?
Who would have thought it? Parallels, the developer of the Mac-based hosted virtualization product, had a service provider business. As of March 24, 2015, Parallels has split it off from its core business of selling hosted virtualization to Mac users and marketed it as “Odin.” Yes, Odin, the Norse god, king of Asgard. At first glance, this might seem slightly pretentious for a service provider.
Yesterday (March 24, 2015), I spoke with Mendy Newman, head of solution management at Ericom, for Virtualization EUC Podcast episode 13. This was the day Ericom announced its sincere entrance into the broker space with Connect, not to be confused with Web Connect, another of its products. Continue reading Ericom Has a Brand-New Broker
At the GPU Technology Conference, NVIDIA CEO Jen-Hsun Huang and Tesla CEO Elon Musk talked about the security of a car. Musk stated that physical access is still required to hack most vehicles and that critical systems such as brakes and steering are segregated from the control display. This got me thinking about the security of the next generation of Internet of Things (IoT) devices.