Privacy is defined many different ways, but however you define it, when it comes to how corporations use data your privacy becomes very important. What companies do with your data may at times seem like an invasion of your privacy, but in these cases, privacy has well-defined limitations in the eyes of the law. Will …
TVP Strategy Archives
Clouds on the Horizon?
Over the holidays, I found myself facing a situation that is a microcosm of one that will confront many IT departments in the coming year. I was trying to decide whether to continue hosting my home lab on my own physical machines or to take the plunge and move to one of the big cloud-based …
Coopetition: Citrix +/- VMware Products and People
In the virtualization marketplace, when a vendor expands its core business and attempts to grab a piece of the new market from an existing incumbent, the vendors view each other as competitors. In 2007, when Citrix purchased XenSource, VMware vSphere clearly became the enemy, and Citrix envisioned that XenServer + XenApp/XenDesktop would take over the …
Continue reading “Coopetition: Citrix +/- VMware Products and People”
Designing for Elasticity
One of the great advantages of the public cloud is its elasticity, the ability it gives systems to provision and deprovision resources as workloads increase and decrease. Much has been written about how building RESTful services is crucial to deploying elastic services in the cloud. I concur that writing code loosely coupled with the underlying …
Something Is Wrong: It Must Be the Hypervisor!
Something is wrong—it must be the hypervisor! If you work in any virtual or cloud environments, how many times have you heard that statement as soon as any kind of problem surfaces? Way back when during the twentieth century, as a problem deflection, the network would immediately be blamed. As we got into the twenty-first century, virtualization …
Continue reading “Something Is Wrong: It Must Be the Hypervisor!”
The Security of Converged Infrastructures
On the January 2, 2014, the Virtualization Security Podcast was joined on the spur of the moment by @Josh_Atwell, who works for VCE, to discuss the security of converged infrastructures. This was of particular interest to me due to my current research on the security of a VCE Vblock. The research got me thinking about …
Continue reading “The Security of Converged Infrastructures”