Feeds

What next for virtualization after we sort our servers out?

Virtual Insanity?

  • alert
  • submit to reddit

Protecting against web application threats using SSL

When we asked Reg readers for their views on virtualization last year, we thought we’d found the voice of reason. We still do.

As a rule, mainstream businesses were getting stuck into x86 server virtualization, often in the name of consolidation. It was nice to have side effects, like smaller electricity bills and positive fodder for the PR machine have been talked about a lot this year too.

Let’s jump ahead to where this could take us. A very simple view of future business IT is that we virtualize the pants off everything and apply superior (to what we have now, generally speaking) management and governance layers to achieve the ‘dynamic IT environments, that so many have heralded, for so long.

One day, our dynamic IT environments might end up looking like clouds. After all, cloud infrastructures are dynamic virtualized environments, in essence. Once we’ve all got one of these, matching or at least being compatible with external service providers’ infrastructures means we can take advantage of everything we’ll ever need in terms of raw processing power, application development platforms, and all the software we ever used in the old fashioned, desktoppy kind of way. Apparently.

In the here and now, much is to be gained already in business performance and operational efficiency. So are we done yet with consolidation or have we barely scratched the surface? Do we really have things like heterogeneous OS management licked in a virtualized environment and issues such as VM sprawl and security under control?

Here’s an even bigger whopper of a question: Do you see the hyper-virtu-dynamic IT environment as reality in your working lifetime? There are specific examples of lots of clever things organisations have done, thanks to virtualization doing the rounds. But they are by no means the norm.

In your organisation, does virtualization solve some specific pains today, and pave the way to lots more flexibility in the future in terms of taking advantage of other people’s services? Or is it all just virtual insanity, as comedy hat-toting Jamiroquai front man Jay Kay pointed out back in 1996?

Let us know, we’d love to hear your views.

The next step in data security

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.