In its second year, VM Expo is the UK’s first and largest event dedicated to Virtualization. From 7th – 8th of October in London at Earls Court Two, this free to attend event has over 190 seminars and 180 vendors. This year’s virtualization keynote address will be delivered by Stephen Herrod, CTO and Senior VP …
Continue reading “News: Less than a week to VM Expo in London”
Things have been very busy at Cisco today in addition to the new that they are to release a Rack mounted version of there UCS servere. the Networking giant and server newboy on the block Cisco Systems announced that will be working with third-party blade server makers to create a version of its Nexus family of switches that tuck inside non-Cisco blades.
There is a great debate on which hypervisor vendor works with ISVs and which do not. You have a number of ISVs working with VMware that are just now starting to work with Hyper-V. A number of ISVs that are struggling to catch up in the virtualization space. Hypervisor Vendors that are directly competing with ISVs as well as welcoming ISVs. This story is not about any of this, but about how easy is it to launch a new product for each of the hypervisors available with or without help from the hypervisor vendor. In essence, is there enough documentation, community, and code out there to be interpreted as welcoming ISVs.
In the fog of the datacenter virtualization war, it is difficult to see clearly who will end up on top, and yet the outcome is almost certainly determined, and the victorious generals are even now moving on to fight new battles. Here at the Virtualization Practice we too would like to think we can see through the fog to work out who has won, so here are our thoughts, take account of them as you wish. They concern, primarily, the big four protagonists: Microsoft/Hyper-V, Citrix /Xen, VMware/vSphere and Red Hat/KVM.
I/O virtualization prominent at VMworld 2009. Whether it can displace Cisco at the top of the rack remains to be seen.
While at VMworld I was suddenly hit with a blast of heat generated by the 40,000 VMs running within the VMworld Datacenter of 150 Cisco UCS blades or so. This got me thinking about how would VMsafe fit into this environment and therefore about real virtualization security within the massive virtual machine possible within a multi-tenant cloud environment. If you use VMsafe within this environment there would be at least 40,000 VMsafe firewalls. If it was expanded to the full load of virtual NICs possible per VM there could be upwards of 400,000 virtual firewalls possible! At this point my head started to spin! I asked this same question on the Virtualization Security Podcast, which I host, and the panel was equally impressed with the numbers. So what is the solution?