In the long term, 2009 is likely to be known as the year that a commercial framework emerged around the Open source Hadoop framework for map-reduce.
TVP Strategy Archives
Virtual Disk Encryption
In the article End-to-End Virtual Machine Backup I mentioned the new VMware Workstation 7.0 feature that creates an encrypted disk but in reality it is an encrypted virtual machine, which also implies encrypting the virtual disk. This one option to VMware Workstation is something that is needed within VMware vSphere as well as the other hypervisors. Encrypting virtual disk data can add to the overall security stance based on the encryption technology employed. So what do we need with virtual disk encryption?
End-to-End Virtual Machine Backup
As of the end of last year, there are a new breed of virtualization backup tools (Veeam, vRangerPro, esXpress) now available, end-to-end backup tools (Acronis, Symantec). These tools will backup a virtual machine to tape using built in mechanisms instead of requiring scripting, or multiple backup tools. The question is: is this necessary? Should virtual machine backups be dropped to tape at all? Something to watch through out the year.
VMware and Xen VMs, not all that compatible
I have been doing some support work for an SMB that uses VMware Server where their VMs initially started as XenServer VMs, but due to networking and some other issues where converted to VMware VMs using V2V technology. However, these suddenly stopped working properly after an upgrade to VMware Server 2.
SMBs in the Cloud require better Service Level Agreements than Enterprise Customers
Small Businesses live by there online presence these days specifically during the holiday shopping season. Many small business also do not have the IT staff to maintain such a presence with the agility required when problems occur. In addition, they may also lack the basic management, networking, security, and storage knowledge to properly maintain this online presence internally, so they move their systems into hosting environments as virtual or physical machines or into the cloud. This begs the question of what service level such SMBs require?
Does Virtualization Security take a New Way of Thinking?
I recently participated in the InformationWeek Dark Security Virtual Event as a panel member with Hoff, Craig Balding, Chris Wolf, Glenn Brunette, and Jon Oberheide. A very far ranging group of individuals from research, security organizations, analysts, and authors. What is interesting is that most of these same people have joined me on the Virtualization Security Podcast, and the others I hope to have as guests next year. There was one question that set me to thinking even more, do we need a new way of thinking about virtualization security?