IBM has announced it is working on technology that enables a desktop environment to be streamed from cloud computing infrastructures to a PC endpoint, enabling workers to access their corporate desktop anywhere and on any system. Dubbed the Secure Enterprise Desktop, the technology is being demonstrated at the CeBIT show in Hanover this week. It is currently undergoing small-scale pilot tests, but IBM said it plans to make the service commercially available to customers later […]
hypervisor
One of the main reasons for deploying desktop virtualization is the security advantages it can provide, such as keeping sensitive data off the endpoint, according to Citrix. And Citrix is practicing what it preaches at its Ft. Lauderdale, Fla., headquarters where employees, for example, use the Citrix virtualization product Citrix Receiver for smartphones and tablets. Citrix Receiver brings full-fledged desktop apps to smartphones and tablets “It’s required to access some systems such as SAP,” says […]
Server virtualization is perhaps not as pervasive as many believe, and customers are not as locked into any particular hypervisor as many companies peddling this magic software layer might hope. This info comes from the latest V-Index survey from Veeam Software, a maker of add-on management tools for VMware’s ESXi hypervisor, which is conducted on a quarterly basis in the US, UK, France, and Germany. The survey only talks to fairly large companies – those […]
Telefonica and Verizon will become the first operators to offer Android phones running VMware’s mobile hypervisor, the companies announced on Wednesday at the VMworld 2011 Europe conference in Copenhagen. VMware has previously said that Verizon would offer the service, without disclosing details about timing, but this is the first time Telefonica has said it plans to offer phones with the hypervisor. Users of phones with the VMware product will find two profiles on their devices: […]
More and more enterprise IT shops – as they get comfortable with virtualization practices in their own private clouds – are considering a jump to the public cloud. But before making that leap, consider these pieces of advice from those that have already jumped. 1. Make sure your provider has VM-specific security “Hypervisors were never really designed to be running in a public environment,” says Beth Cohen, senior cloud architect for Cloud Technology Partners, a […]
Researchers from North Carolina State University and IBM have developed a new, experimental technique to better protect sensitive information in cloud computing – without significantly affecting the system’s overall performance. Under the cloud-computing paradigm, the computational power and storage of multiple computers is pooled, and can be shared by multiple users. Hypervisors are programs that create the virtual workspace that allows different operating systems to run in isolation from one another – even though each […]
If two technology trends were ever made for each other, at least in vendor marketing materials and generically simple diagrams of IT infrastructure, they are the consumerization of IT and desktop virtualization. Analysts who study desktop virtualization say many of its use cases fit neatly into problem areas that their client companies face, such as the consumerization of IT. End users who insist on using non-standard or unapproved computing devices, such as tablets and iOS […]
Notable trends in virtualization: 1. Hybrid clouds mature. The nature of hybrid clouds – meaning parts of your infrastructure are running in both public and private data centers – is getting more mature and sophisticated. New providers are springing up frequently, which make evaluating them all that much harder. Some are traditional hosting providers, other offer more virtualization expertise and some have built their own management tools around their services. One example: Terremark’s VMware-based computing […]
At the most fundamental level, virtualization is the separation of the physical from the logical, so desktop virtualization is the separation of the physical client device from the management of the OS. When most people hear the term desktop virtualization, they immediately think “VDI!” Note that virtual desktop infrastructure is just one type of desktop virtualization. In fact, the technology can be any of the following: VDI. Despite the term’s literal meaning, IT today uses […]
Worried about your data? If you’re not, you’re kidding yourself. It’s become clear over the past few months that the risk of security breaches has reached a new and frightening level — from sophisticated tools in the hands of national governments and organized crime to spontaneous attacks harnessing the resources of thousands of loosely connected vigilantes. Add to that the dizzying array of devices now used to access, move and store data. Security strategies that […]
Securing the endpoint has always been a headache for IT administrators. The less managed those endpoints are, the worse the headache is. In a virtualised desktop environment, where those operating systems and applications are more managed, does the problem go away? Ostensibly, security is less of a problem in a virtual desktop environment. In a VDI or Remote Desktop Services implementation, the entire operating system and applications run centrally, and the user’s data remains in […]
By now, most IT professionals are familiar with server and application virtualization. But Microsoft says it’s time to get ready for the next layer: server application virtualization. This new capability is now available in beta as part of System Center Virtual Machine Manager, and will hit general availability later this year as part of the larger System Center 2012 release, Microsoft said this week. Microsoft isn’t the first vendor to virtualize server applications, but it […]
Virtualization – not quite the nirvana it was promised to be. We expected exponentially better efficiency, higher availability and huge savings for IT budgets. However, now that the honeymoon is over, most organizations feel slighted. Not only have the promised benefits never been realized, but IT organizations also have been saddled with ever-increasing user demand and out-of-control costs – not to mention virtual sprawl, vendor lock-in and high provisioning effort. With all of these issues, […]
IT professionals looking to place data in the Cloud should be aware of three major risks, including data leakage, the loss of visibility or control of the data, and unauthorised access to data, according to global services firm Ernst and Young. The firm’s senior manager, Pieter Danhieux, told attendees of IDC’s Cloud for Business Conference 2011 that while Cloud service providers are often talking about scalability, availability, cost reductions, efficiency and effectiveness, they had not […]