If you’re from a Presentation Virtualization (PV) background (although maybe you know it as Terminal Services (TS); possibly even a Microsoft Remote Desktop Services (RDS); heck lets go on an old school ‘server based computing’ perspective) what vendors should you be looking out for at VMworld?
Search results for: vmware
Dell's Intention: Acquire 3Par. Is this a Stack Play?
The Consolidated server stack has been the big items over the last year using converged network adapters, blades, and integrated storage that is designed around providing an order-able element that is a single SKU that provides enough resources for a set number of VMs. Currently the VCE colition has the VBlock which combines VMware, Cisco, and EMC products into a single stack. HP has its Matrix stack. But where is IBM’s and Dell’s stacks. Could the acquisition of 3Par be the beginning of a integrated stack play from Dell?
VMworld from an Open Source Perspective
VMworld is clearly the largest dedicated virtualization conference, and yet from an Open Source perspective it is slightly disappointing because the VMware ecosystem naturally attracts proprietary software vendors, and also some of the more interesting activities in Open Source are through multi-vendor foundations which do not have the same marketing budgets as vendors themselves.
Nevertheless, there are a number of key Open Source players, and some interesting smaller players, represented at VMworld.
Quest + Vizioncore + Surgient = A Virtualization Management Gorilla?
The combination of Quest, Vizioncore and Surgient creates a company that for the first time has all of the management pieces required for an enterprise to be able to virtualize tier one applications and to automate the process of assuring service levels for these applications. This puts Quest in position to be a clear leader in the virtualization management market.
Virtualization Security Round-up (Updated)
In the End-to-End Virtualization Security Whitepaper we review various aspects of server security with an eye to determining how the products would work together to create a secure virtual environment. While some of these tools are cross-platform, the vast majority of them are geared specifically to VMware vSphere.
In this post we will look at Server Security, and we will follow-up with another post about Desktop Security? Are these very different? I believe so, desktops have daily, second by second user interactions. For desktops, one of the most important aspects is look and feel such as response time for actions. So things need to be as fast as possible. With Servers however, user interactions are limited and therefore have slightly different performance and security requirements. What may be acceptable for a server may not be acceptable for a desktop. So what do the tools provide for servers?
More on OpenStack – Cloud.com, GPL, Citrix, Oracle and the DMTF standards.
Cloud.com had lined itself up with Citrix by using only XenServer in the commercially-licensed version of its IaaS product, and now is being used by Citrix to ensure OpenStack supports XenServer (which it doesn’t at the moment), presumably to keep Red Hat’s KVM under control and VMware out. We’ve also been trawling through the available OpenStack documentation to understand why NASA thinks its cloud is more scalable than Eucalyptus. It seems to be all to do with how the state information is passed amongst the various servers that make up the system. GPL-based Open Core models break down when you move to multi-vendor foundations because the cross-licensing of IPR under GPL immediately infects the recipient codebase, and precludes commercial licensing of the resulting combined work. The result is that the GPL Open Core business model doesn’t work in the same way, and both Eucalyptus and Cloud.com cannot apply their current business model in these multi-vendor foundations. It is a big blow for Eucalyptus. They have turned their biggest potential customer into a massive and credible competitor, built in their own image (only – at least from a PR perspective – much more scalable).
In OpenStack the API is implemented in a separate service which translates external http requests into commands across the internal message bus, and so it looks (on the face of it) possible for someone (preferably Oracle) to implement the Oracle DMTF submission as a separable new API server module without disrupting the OpenStack architecture. In OpenStack the API is implemented in a separate service which translates external HTTP requests into commands across the internal message bus, and so it looks (on the face of it) possible for someone (preferably Oracle) to implement the Oracle DMTF submission as a separable new API server module without disrupting the OpenStack architecture.