In Pictures: How to protect virtual machines (VMs)
These four products represent different approaches to VM security
CSIRO’s head of transformational bioinformatics Denis Bauer took to the stage at an Amazon Web Services event on Wednesday to proclaim: “Once you go serverless you never go back”.
The University of Auckland has moved 550 virtual machines to a distributed cluster for disaster avoidance without impacting daily operations as part of project to centralise its IT infrastructure.
True utility computing – where virtual machines are moved between competing service providers without an organisation's knowledge – is coming soon, according to Vic Winkler, CTO at data security provider Covata.
These four products represent different approaches to VM security
Yahoo Japan is set to roll out 50,000 virtual machines (VMs) next year as part of its data centre transformation program.
Principled Technologies tested to VDI solutions to find the number of virtual sessions each solution could support: (1) a Dell PowerEdge FX2 with Dell PowerEdge FC430 server sleds and FD332 storage using VMware Virtual SAN and (2) a fiver year old legacy Cisco UCS B200 M2 blade solution using a traditions SAN.