I recently saw a great article in IT World Canada titled “Virtual stall: What it is and why you have it,” written by Jay Litkey, that took up my idea of VM stall, which I first came up with in…
Top Ways to Start and Expand Your Virtualization Deployments
Last week I spoke with Pam Baker, a writer with CIO Update, for an article titled The Top 5 Places to Use Virtualization. As you would expect from an experienced professional like Pam, it was a great article, with solid…
Vendor FUD: How Should Vendors, Enterprises, and Influencers React?
I, along with many others, witnessed this week (or was it last week?) a public squabble between two well-known vendors in the virtualization market. Of course, this is nothing new. The whole world has been watching as Adobe attacked Apple…
Cloud Computing in the Public Sector
If there was still any doubt about the real world use cases for cloud computing, the US Federal Government last week published a 38-page report entitled “State of Public Sector Cloud Computing†(link to PDF at CIO.gov). Attributed to the…
Is ‘VM Stall’ the Next Big Virtualization Challenge?
There appears to be a challenger to ‘VM sprawl’ as the scourge of virtualization success – a problem I call ‘VM stall’.
We know about ‘VM sprawl’ – because new virtual machines are so easy to deploy, organizations can end up with more VMs that they can handle, or even use. This has the potential to cause severe problems to availability, performance, compliance, costs, security, and more.
However, I am seeing more and more evidence of this new phenomenon I think of as ‘VM stall’ – the tendency for virtualization deployments to stall once the ‘low-hanging fruit’ has been converted (typically around 20-30% of servers).
I think it happens more or less like this…
Does Virtualization Security Really Matter?
Whatever happened to virtualization security? Back in the day, everyone was talking about blue pills and red pills, about sideways attacks and DOM-0 threats, about security profiles and isolation policies, about perimeter defense and security embedded in the hypervisor. Then,…