The very nature of virtualization makes it unique in that it adds a barrier between the traditional hardware and operating system layers. By very definition, virtualization creates an operating environment on the host hardware that allows for complete customization and allocation of resources, regardless of which operating system is installed. It is not uncommon to have several different operating systems reside side by side. In fact, recently even Microsoft opened their proprietary Azure cloud platform to support Linux builds.
Month: April 2014
Fun with FUD: Business Continuity in the Cloud
As VM automation becomes more and more predominant in cloud environments, the issue of abstraction becomes more important. Consider if you will, an infrastructure in which the creation and management of VMs is fully automated. Now put all those applications and information and VMs in one big cloud that is all self-sufficient and constantly moving around due to load balancing and other automated processes. Then, add in cloud applications, plugins, security and anything else that could possibly run in that environment. Then, connect it all up so that every part of the infrastructure is inter-dependent and connects through a broker. And for fun’s sake, let’s assume there is a memory leak on one of the servers and your start losing VMs. Continue reading
Virtual Desktop Infrastructure: (Remote) Workers of the World Unite!
With the latest announcement of Google Chrome’s remote desktop application, it’s a great time to look at when and where virtual desktop infrastructure (VDI) makes sense. While there are significant benefits to leveraging VDI, there are still some security risks associated with these implementations.
Why Encryption is Still a Cloud Standard
As we see more and more organizations starting to outsource their data to services such as Amazon and Telco-based cloud environments, there is an increased importance around the security of the actual data that resides in these environments. In some cases, organizations are moving business-critical and privacy sensitive data off-site to take advantage of reduced infrastructure costs, but in some cases, to leverage the security postures of the cloud providers themselves.