Privacy and the IoT

Privacy is defined many different ways, but however you define it, when it comes to how corporations use data your privacy becomes very important. What companies do with your data may at times seem like an invasion of your privacy, but in these cases, privacy has well-defined limitations in the eyes of the law. Will …

Coopetition: Citrix +/- VMware Products and People

In the virtualization marketplace, when a vendor expands its core business and attempts to grab a piece of the new market from an existing incumbent, the vendors view each other as competitors. In 2007, when Citrix purchased XenSource, VMware vSphere clearly became the enemy, and Citrix envisioned that XenServer + XenApp/XenDesktop would take over the …

Designing for Elasticity

One of the great advantages of the public cloud is its elasticity, the ability it gives systems to provision and deprovision resources as workloads increase and decrease. Much has been written about how building RESTful services is crucial to deploying elastic services in the cloud. I concur that writing code loosely coupled with the underlying …

Something Is Wrong: It Must Be the Hypervisor!

Something is wrong—it must be the hypervisor! If you work in any virtual or cloud environments, how many times have you heard that statement as soon as any kind of problem surfaces? Way back when during the twentieth century, as a problem deflection, the network would immediately be blamed. As we got into the twenty-first century, virtualization …

The Security of Converged Infrastructures

On the January 2, 2014, the Virtualization Security Podcast was joined on the spur of the moment by @Josh_Atwell, who works for VCE, to discuss the security of converged infrastructures. This was of particular interest to me due to my current research on the security of a VCE Vblock. The research got me thinking about …