Feeds

Virtualization: A quick reality check

Dynamic IT vs dynamic mess

  • alert
  • submit to reddit

The smart choice: opportunity from uncertainty

Last week we talked about what lies around the corner in virtualization land. Many indicators suggest a quick reality check is in order.

Leave to one side for a moment the evangelists who predict the imminent death of the enterprise data centre and take a step back to survey the scene.

If we set off down the road to virtualization, are we heading towards dynamic nirvana or a provisioning nightmare? Technically and organisationally, can we reach our goal without getting lost, or did Jay Kay get it right and we should moonwalk off and try another game?

Virtualization technology is broadly applicable across the entire IT estate, but the breadth and depth of what we could do with virtualization presents many practical challenges. There may even be a danger of over-stretching ourselves. On the other hand, those of you that have seen all this before, albeit under different names and guises, may have already got a sensible game plan in mind.

The idea of everything coming together in a virtualised world - servers, applications, desktops and storage - and the value of having it all integrated with a single approach and management framework is pretty cool. It’s also a pretty serious end point in itself, without even considering the exciting things we could do with service sourcing from third parties, once we have the infrastructures to handle it.

But we wonder how many organisations are structured – technically or organisationally - to cope with so much joined-up-ness. The people running each piece, whether it’s a business unit or parts of the IT real estate, are often separate. Do we currently lack a major feature, the so-called management framework?

If many islands of politics, budgets, processes, skills and fragmented accountability exist in organisations today, then realising the full potential of virtualisation might actually have little to do with the availability of the enabling technology.

A key finding which crops up time and again in our research, regardless of the topic, is the notion of accountability and ownership to drive change. Who is responsible for pulling the threads together, for making it happen? At the nitty-gritty level, we know it’s you guys. IT’s voice needs to be acknowledged when it comes it working it all out.

As you are the people that ultimately know what’s going to work and what’s not at a practical level, we’d love to know what you think about all this. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.