Monthly Archive: October 2010

Oct 27 2010

Virtual security: New attack vectors, new ballgame

When it comes to securing virtual environments, you have to take different measures from those for traditional physical security. With virtual security, new attack vectors –that is, the means by which a hacker gains control of a server OS — must be protected to prevent breaches. Because of these vectors — and thus risks — …

Continue reading »

Oct 20 2010

Why does vendor lock-in get such a bad rap?

In the context of virtualization, vendor lock-in often has negative connotations. But if a company provides solid products and support, this practice of purchasing the bulk of your data center components from a single vendor can be beneficial. Few vendors have the product lineup to supply every facet of a data center infrastructure, with the …

Continue reading »

Oct 13 2010

Using virtual hardware metrics to hit a performance home run

Virtualization is often a game of numbers. As you choose virtual hardware, you have to consider some important metrics, such as the number of virtual machines (VMs) that reside on a host or logical unit number (LUN). If you haven’t determined what these numbers should look like in your environment, your infrastructure will likely suffer …

Continue reading »

Oct 05 2010

10 tips for managing storage for virtual servers and virtual desktops

cover_vol9_iss9

Server and desktop virtualization have provided relatively easy ways to consolidate and conserve, allowing a reduction in physical systems. But these technologies have also introduced problems for data storage managers who need to effectively configure their storage resources to meet the needs of a consolidated infrastructure. Server virtualization typically concentrates the workloads of many servers …

Continue reading »