Saturday, 17 October 2015
A Look At Startup Opportunities In The Container Era
Add to this the approximately $500 million of VC investment in container-related companies to date; the lists of hot startups that are beginning to appear; the anointing of new paradigms by respected investors; and the user surveys with record-breaking buying-intention scores and there is no doubt that the container wave has propelled the DevOps engineer as a new power buyer in the enterprise.
I expect that the impact of containers will be similar to that of virtualization’s impact on the data center.
The key difference between virtualization and containers is well described by Mitchell Hashimoto, DevOps guru and founder of the data center automation and management company HashiCorp: “Whereas virtualization is like the sci-fi concept of terraforming a planet, embracing containers is more akin to building many isolated biodomes on a single planet.”
Here are some of the opportunities in the container ecosystem:Virtualization created one platform company in VMware, and it looks like Docker’s visionary approach has been rewarded with a first-mover advantage. However, just as how a host of other independent players who provided adjacent services were created in the virtualization era, I see greenfield potential for entrepreneurs founding container-related companies today.
Full Post
Friday, 26 June 2015
eBook: Storage Virtualization for Dummies
Download this 74 pages eBook
Saturday, 4 January 2014
Voke Research: Market Snapshot Report - Service Virtualization
More specifically the research highlights:
The 8 market forces intensifying the challenge every day
The 5 major reasons that cause software delays
The key IT and business benefits of eliminating constraints
How to assess Service Virtualization technology and build a Business Case
Download the full report
Wednesday, 30 January 2013
Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
While technologies such as firewalls, anti-virus, access control and perimeter monitoring remain an important base, they’re increasingly bypassed, as today’s skilled attackers directly target applications and data. What’s needed is a new security layer—one that makes it possible to manage risk more effectively.
According to Forrester Research Inc. “Proper management and control of user accounts, access permissions, and privileges is one of the most effective avenues to ensuring that data doesn’t walk out the door.” (“Twelve Recommendations For Your 2011 Security Strategy”, Forrester Research Inc. December 2010). Desktop virtualization provides that additional security layer, allowing full freedom for organizations to embrace workshifting and deploy personnel and resources wherever and whenever they’re needed, while fortifying information security and compliance in support of business and IT priorities.
Monday, 23 July 2012
Virtualization and Cloud Computing: Optimized Power, Cooling, and Management Maximizes Benefits
Thursday, 2 February 2012
Video Info-graphics: Stuxnet: Anatomy of a Computer Virus
Watch this 3min 20sec video info-graphics.