Feeds

What next for virtualization after we sort our servers out?

Virtual Insanity?

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

When we asked Reg readers for their views on virtualization last year, we thought we’d found the voice of reason. We still do.

As a rule, mainstream businesses were getting stuck into x86 server virtualization, often in the name of consolidation. It was nice to have side effects, like smaller electricity bills and positive fodder for the PR machine have been talked about a lot this year too.

Let’s jump ahead to where this could take us. A very simple view of future business IT is that we virtualize the pants off everything and apply superior (to what we have now, generally speaking) management and governance layers to achieve the ‘dynamic IT environments, that so many have heralded, for so long.

One day, our dynamic IT environments might end up looking like clouds. After all, cloud infrastructures are dynamic virtualized environments, in essence. Once we’ve all got one of these, matching or at least being compatible with external service providers’ infrastructures means we can take advantage of everything we’ll ever need in terms of raw processing power, application development platforms, and all the software we ever used in the old fashioned, desktoppy kind of way. Apparently.

In the here and now, much is to be gained already in business performance and operational efficiency. So are we done yet with consolidation or have we barely scratched the surface? Do we really have things like heterogeneous OS management licked in a virtualized environment and issues such as VM sprawl and security under control?

Here’s an even bigger whopper of a question: Do you see the hyper-virtu-dynamic IT environment as reality in your working lifetime? There are specific examples of lots of clever things organisations have done, thanks to virtualization doing the rounds. But they are by no means the norm.

In your organisation, does virtualization solve some specific pains today, and pave the way to lots more flexibility in the future in terms of taking advantage of other people’s services? Or is it all just virtual insanity, as comedy hat-toting Jamiroquai front man Jay Kay pointed out back in 1996?

Let us know, we’d love to hear your views.

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.