My Virtualization Review colleague, Tom Fenton, just published a tongue-in-cheek article that's a wonderful springboard to a deeper and fuller discussion of virtualization as a whole. Tom's article ...
Have you found yourself wondering what's wrong with all of the marketing mavens out there in virtualization land? It seems that everything is virtualization and nothing is virtualization. Over the ...
Symantec jumped into the virtualization game with both feet and put together a nice suite offering called Symantec Endpoint Virtualization Suite. The cornerstone technology in this suite comes from ...
Were they guilty of “cloudwashing” – slapping the cloud label on existing products? Were they ignoring the cloud and risking getting left in the dust? Were they scrambling to re-invent themselves as ...
A: Yes. Virtualization is one of the most widely interpreted themes I’ve ever known. Here’s my attempt to simplify the context of virtualization, which of course will add even more complexity to your ...
Virtual directory servers that aggregate identity information from a variety of sources promise to solve problems with directories and databases while creating an identity “layer” that can provide ...
The folks at Ravello Systems approached me to brief me on how they're offering "Virtualization 2.0." The exact words they used are: With your interest in innovation the cloud, I thought you may be ...
Virtualization can work wonders for an IT environment. Virtualization lets one computer do the job of many consuming less floor space, energy and operational costs than installing more hardware. These ...
Board-level briefing on hypervisor ransomware and ESXi risk, detailing revenue impact, oversight implications, and steps to strengthen governance and controls.
Ransomware groups are targeting hypervisors to maximize impact, allowing a single breach to encrypt dozens of virtual ...
Researchers at Core Security have issued an advisory warning users of a significant security flaw in a number of VMware desktop apps that could allow attackers to gain complete access to the ...