VMware and Microsoft approach the Small to Medium companies quite differently, but which product to buy often depends on your business needs vs cost of the products. However, there needs to be at least one major distinction: SMB vs SME.
The Small to Medium Business (SMB) is quite a bit different than the growing number of Small to Medium Enterprises (SME), and VMware knows this does Microsoft or Citrix? Continue reading Small Business Virtualization: Part 1 – Licensing
After two years in development, the latest workplace collaboration service, Podio, was stood up to be counted at the end of March. Podio is focused on improving execution and collaboration for business processes, knowledge and projects. With Podio, business teams can define their own customizable work spaces: without external programming support.
Why is this important? There is much discussion on improving desktop management: and typically the driver is “to reduce cost”. This involves looking to ease deployment; introduce user personalisation and rights control; considering application virtualisation. The simple fact is, if you want to control your desktop management costs, you introduce better management: you make an unmanaged device, a managed one. However, when tightly defining a desktop workspace and controlling how it is configured (to reduce costs) it often prevents users from accessing their data in ways that they need. IT can become a barrier, not an enabler. Continue reading Podio Released. Does the social work platform herald the beginning-of-the-end of desktops?
With the diversity of cloud’s available today, data being sent from one to another could appear to be a hodge-podge of security. As one colleague put it recently when I asked what he was expecting to maintain integrity of data in motion between clouds:
“… what kind of kludge can things end up being when you have multiple connections to multiple hybrid clouds all doing different things” — Steve Beaver
So how does data transfer between the clouds? Is it a kludge? or can it be done using a uniform security policy, procedures, and protocols while maintaining Integrity and Confidentiality and auditability? Continue reading Multiple Hybrid Clouds Kludged Together? — Cloud Architecture
Virtual Computer are to optimize their NxTop client virtualization and management solution to operate with select models of Lenovo laptops and desktops PC platforms. For their part, Lenovo will allow customers to have Virtual Computer’s NxTop client loaded onto their custom images, direct from the factory. This announcement was an interesting for organisations considering changing their PC management model to use a client hypervisor. It not only promotes confidence in client hypervisors supporting a wider range of devices, it also demonstrates that device vendors themselves are willing to embrace client hypervisors as a deployment technology. Continue reading Virtual Computer collaborates with Lenovo-NxTop the industry’s best enterprise-class type 1 client hypervisor?
It is often very hard to plan which virtualization and cloud conferences to attend and why. You may need to start your planning now as justification from work could be hard to come by. It may mean you make the decision to go on your own dime. If you do the later, there are some alternative mechanisms that could work for the bigger conferences. The conferences and events I attend every year depend on my status with the organization hosting those events, and whether or not I can get a ‘deal’ as a speaker, analyst, or blogger. So what conferences do I find worth attending? That will also depend on your job role. There is one I would attend regardless of role, and a few I would attend as a Virtualization and Cloud Security person. All are good conferences. So here is my list: Continue reading Virtualization and Cloud Conferences for the Year
Monitoring computing infrastructure and applications for capacity, availability, and performance is a business that has been around for a long time – in fact for just about as long as computers have been used for business critical applications (since the mainframe lead era of the 1960’s). Since that time several waves of change have swept through the computer industry, and with each wave of change has come new computing architectures, new applications, requirements for monitoring and new monitoring approaches. Those waves have included mini-computers, personal computers, LAN based file sharing, client/server based computing, Internet (browser) based computing, N-tier SOA based applications, and now include agile development, virtualization, cloud based computing, and the proliferation of mobile based applications. Continue reading A Perfect Storm in Availability and Performance Monitoring