Posts Tagged ‘ enterprise ’

joshsimons

2013 Predictions: When Worlds Collide

December 18, 2012
By
2013 Predictions: When Worlds Collide

It’s time again to dust off the crystal ball, cast the yarrow sticks, read the tea leaves, and share some thoughts about where the IT world is heading over the next twelve months and beyond. Because my focus at VMware is on High Performance Computing (HPC), I’ll confine my prognostications primarily to the growing area of overlap between mainstream Enterprise Computing and HPC — places where each world can benefit from the other in important ways. Before I start, let’s get one no-brainer prediction out of the way: 2012 will be remembered for Nicira , and not Nibiru . Yes, software-defined networking ( SDN ) will trump planetary collisions and the...

Read more

javiersoltero

The Greenfield Enterprise – Part 1: Introduction & Core Principles

October 13, 2010
By
The Greenfield Enterprise – Part 1: Introduction & Core Principles

Adventures with Windows XP A few weeks ago I had a problem where I required access to a Windows XP machine in order to track down a bug in a PowerPoint file that was crashing on my Mac. Luckily, such access is easily to accommodate nowadays thanks to the wonders of VMware View and our IT department’s ability to rapidly enable access to desktop VMs when they are needed.   So, with View access at hand, I set out to launch a pristine XP virtual machine and proceed to remove the offending OLE object that Office 2008 for Mac couldn’t seem to digest. Upon launching the VM, I was greeted with a site I hadn’t seen in quite some time…    ...

Read more

scottdavis

Project Horizon: The “Secure” Journey to the Cloud – Software-as-a-Service and the Compliant Enterprise

September 28, 2010
By
Project Horizon: The “Secure” Journey to the Cloud – Software-as-a-Service and the Compliant Enterprise

An Office of the CTO Guest Blog By Noah Wasmer, Director of Advanced Development, VMware   At VMware, we love to read the latest Gartner and IDC reports, but what we love more than anything is our road trips into the field.  I am lucky enough to work in advanced development at VMware, and one of our biggest priorities is to get out in the field to better understand use cases – ensuring that the next generation technologies we develop and deliver are helping customers to solve real pain points.   On one such road trip, I had an opportunity to meet with several healthcare workers at Stanford Medical Center , where I was able to learn not...

Read more

scottdavis

View 4.5 & The Journey Towards Enabling the Consumer Cloud Experience for the Enterprise

August 31, 2010
By
View 4.5 & The Journey Towards Enabling the Consumer Cloud Experience for the Enterprise

User expectations of their business computing environments are changing, being driven by their experiences as consumers. New state of the art devices and user interfaces, cloud computing and the associated SaaS-based applications, ubiquitous connectivity. These trends are converging and when combined are profoundly influencing the direction of end-user computing.   What are some of the traits of this consumer cloud experience?   A better user experience – simplicity; Instant gratification, multiple devices; Always available – my apps and data are backed up, replicated or synched; Ubiquitous access; Personalized – small, engaging applications (at least the client part is small); Pay as you go; Excitement and anticipation for the next great device or application.   In the technology sense, what does this mean?   Self-service;...

Read more

allwynsequeira

Securing Enterprise Assets as Virtualization and Cloud Computing take hold.

August 24, 2010
By
Securing Enterprise Assets as Virtualization and Cloud Computing take hold.

The massive transformation of IT, driven by virtualization and cloud computing initiatives, is compelling a re-think of the way enterprises protect their critical assets. The most critical resources are typically the applications and their data, and their systems that support them i.e. servers, storage and databases. Good security design employs a defense in depth approach to protect these resources from unauthorized user access and attacks. Our belief is that “all-virtual” architectures open the door for discontinuous innovation resulting in better security than was earlier possible, leveraging virtualization attributes such as introspection, instant insertion/layering, distributable enforcement, and policies that migrate with the workload. Ultimately, virtualization’s greatest benefit is un-tethering processing from the hardware, leaving the door open to migrate workloads and their dependencies to the...

Read more