Countdown to Launch

Friday was the day that the last space shuttle will be launch in to space. The shuttle Atlantis is on the launch pad and ready to go. As I watched the clock countdown to zero, I found myself reflecting on the idea that this launch will be the very last space shuttle flight. I grew up in Florida and have been able to walk outside and watch the shuttles, over the years, launch into space. I have enjoyed watching the launches as well as feeling the sonic booms when the shuttle would fly overhead on the way to the runway for touchdown. For me and many others, this launch signifies the end of an era and the start of something new.

Ericom blazes forward with an HTML5 Client for VDI

Ericom AccessNow is the first HTML5 client for Microsoft RDP/VMware View. An HTML5 offers the option of organisations delivering access to services not only from personal devices, or kiosk terminals, but from the growing range of devices that have a browser as their core OS such as the Chromebook. At the moment, this is a freely available resource – I’d recommend a look.

Start with SaaS Security: End with Data Security

The 6/30 Virtualization Security Podcast with Simon Crosby Founder and CEO of Bromium started with a discussion of SaaS security but soon went to a discussion of Data Security. Simon left Citrix not to long ago to form a new company, Bromium, to seriously look into how the hypervisor itself can provide better security for data manipulations than it does today. But first we started off with SaaS and how you can Identify the user within a cloud.

HP embraces AppSense for Reference Architecture

In a press release on June 29, 2011 AppSense announced that its User Virtualization Platform is now a core building block of HP’s new Client Virtualization Reference Architecture. Along with Microsoft, VMware and Citrix, AppSense User Virtualization has been recognized by HP as a crucial technology for a successful architecture that meets the goals for client virtualization.

Replication Receiver Clouds: Protecting your Data

Security in the cloud and the virtual environment is ‘all about the data’ and not specifically about any other subsystem. It is about the data. As such the data has something it knows (the contents of the data), something it is (its signature), and something it has (its digital rights) and since it has these three elements, the data has all it has identity. However, protecting the data requires us to put things between the data and the real world such as firewalls, and complex role based access controls, as well as methods to replicate the data to other locations in a non-intrusive mechanism. The goal to such replication could be to ensure multiple sites have the same data (such as a hot-site) or to have the data available in another locations in case of disaster.