Archive
Don’t Let OpenStack Hype Distort Your Selection of a Cloud Management Platform in 2012
This was an interesting article, I recommend reading it! And thx Ruben for the tip!
“Recommendations:
- Do not plan the future of your data center with the assumption that OpenStack will be at its core. OpenStack may be a promising project, with many vendors eager to join its marketing bandwagon, but its future success is by no means assured. Rather than counting the number of vendors joining the project, judge OpenStack’s progress by its ability to deliver future releases on-time, with the planned features and minimal bugs and achieving mainstream adoption.
- To maximize deployment flexibility and interoperability to enable the potential for multi-vendor substitution, try to choose CMP solutions that allow the layers of the service (access management, service management, service optimization, resource management and the underlying resources), to be logically independent of one another.”
http://www.gartner.com/technology/reprints.do?id=1-1C3IGID&ct=120919&st=sb
//Richard
Mobile Application Management (MAM) = Complete Mobile Workplace?
Ok, so I’ve been looking at some of the players out there that say they have a “MAM” product and everybody seem so hooked on talking about MAM and how that’s gonna solve all the needs of a Mobile Workplace… and to be totally frank I think that people tend to run to fast with new cool and hip buzz-words or solutions.
To start of with, what is the definition of a MAM system? This is a pretty good summary I’d say that I stole from WikiPedia;
“Mobile Application Management (MAM) describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes the deployment and management of in-house and commercially available mobile apps used in business settings on both company-provided and “bring your own” smartphones and tablet computers.
Mobile application management has also been defined as “the strategy and process around developing/procuring, securing, deploying, accessing, configuring, updating and removing (business) applications from mobile devices used by the employees. To read more at wikipedia click here…”
And does a solution like this provide all the capabilities for businesses today for a complete Mobile Workplace?
AppSense Webinar – Windows and the always connected workstyle
This should be very interesting!
“Join us for this webinar and hear about:
- Enabling flexible workstyles and deployment tools for Windows 7
- Embracing user virtualization to future proof your business for subsequent OS upgrades
- Migrating from Windows XP to Windows 7 and then to Windows 8 – see for yourself with a live demo
- Identifying ways to reducing time, cost and complexity while increasing user satisfaction”
Read more and register here!
//Richard
Free Site Recovery Manager Training
Finally Monday! A new week with new opportunities! 😉
And why not start the week with some free VMware Site Recovery Manager Training videos? Thanks Douglas for sharing this!
Free Site Recovery Manager Training Videos
“We’ve created 11 short instructional videos that lay out the basics of VMware vCenter Site Recovery Manager. Andrew Elwood, Senior Technical Instructor, walks us through SRM, talking as he would one of his many classes on the following topics, but this time there is no charge to hear his instruction:
1. SRM5 Concepts/Architecture scroll to FREE SRM Training Videos
2. Installing SRM5
3. Site Pairing
4. Storage Replication – Part 1
5. Storage Replication – Part 2
6. Inventory Mapping Protection Groups
7. Protection Groups
8. Creating a Recovery Plan
9.Testing a Recovery Plan
10. SRM Failover
11. SRM Failback“
//Richard
Cisco Ceasing Development Of Load-Balancer Products
Wow… ok, it may not be the biggest news but it’s indeed interesting!
“The ADN market has since become more crowded as the technology gets hotter. Behind F5 is No. 2 player Citrix(NSDQ:CTXS), estimated to hold between 15 percent and 17 percent, along with a host of other vendors, from Brocade and Radware to smaller, scrappier alternatives such as A10 Networks.
Suppiger’s research note highlighted F5, Citrix and A10 specifically as being well-positioned to take advantage of Cisco’s decline. Indeed, both F5 and A10 are among Cisco competitors that already are moving to capitalize on Cisco’s decision.”
Read more here!
//Richard
Microsoft Security Newsletter – September 2012
Ok, didn’t have the time to search where online the newsletter is located so I just copied some of it into this post. I think that there where some interesting posts/articles around “BYO”, Cloud etc. So browse and enjoy! 😉
| Welcome to September’s Security Newsletter! |
This month’s newsletter focuses on personal devices in the workplace, often times referred to as “Bring Your Own Device,” or BYOD. BYOD is a very hot topic these days as organizations grapple with the challenge of managing the risks involved in allowing corporate data to be placed on personal devices such as smart phones. At face value, BYOD has the potential to be a win-win proposition. However, depending on how BYOD is implemented and managed, it could be a Pandora’s box.The primary challenge is that some of the devices employees decide to bring to work may not have basic security or management capabilities. This challenge is compounded by the risks associated with connecting to social networks and by the diverse ways organizations and people are choosing to connect and share data today – such as the utilization of cloud services. We recently conducted a study to find out more about how personal devices are being used in the business environment. Our study found that:
BYOD does have distinct advantages. From the standpoint of the IT department, BYOD is generally seen as a cost-cutting measure because the burden of supplying the equipment is shifted to the employees. Some organizations subsidize BYOD policies with a per diem to offset the costs for users, but it still results in lower costs for the organization by relieving IT of its traditional role of maintenance and support. Another advantage of BYOD is that individuals tend to upgrade and embrace new platforms and technologies much faster than businesses. The organization benefits from being able to take advantage of cutting edge tools and features without the pain of deploying new hardware to the entire company. From the user’s perspective, BYOD means using devices and applications that are more familiar. Empowering users with the ability to choose which hardware and platforms they use creates more satisfied and productive workers. It also allows them to carry a single mobile device instead of one for work and another for personal use. The list of smart personal devices capable of connecting to private and public networks is rapidly and constantly expanding. For chief information security officers (CISOs) and chief security officers (CSOs), managing an ever growing list of devices and applications isn’t a sustainable model. Some of the security professionals I have talked to are shifting their focus to managing the data instead of the devices. They have concluded that device security is only a proxy for data security; if they can’t effectively manage the security of the devices that employees bring to work, they will focus on managing the security of the data itself. I think the industry recognizes the importance of securing personal devices and are making steps toward better management controls in the future. If you are interested in learning more about BYOD, I encourage you to read these blog posts recently published on the topic:
|
Lync 2013 client preview for VDI/Hosted Virtual Desktop environments
This is an update in the right direction for getting all Lync features to work in a hosted environment! But where are we on this topic of getting the collaboration features etc. to our end-users in a good way to the “Any Device” and “Anywhere” or BYOD if that’s what you wanna call it?
Before there has been a lot of issues with running Lync and what’s supported feature-wise depending on where you ran Lync, what protocol you where accessing it over and how Lync was presented (either as published desktop or as a published app). And this had it’s challenges for companies that for instance wanted to go to a BYOD model where the end-point device the user was sitting on wsn’t managed and didn’t allowed Lync to be installed and where those users then were relying on their XenApp or XenDesktop environment. And then there are features that aren’t supported or let’s say; didn’t work that well and really loaded the host server.
The table below is from a great Microsoft blog post by Jesper Osgaard where he compares the features of Lync in a virtualized environment;
What did Citrix do about it? Well first they released the HDX Realtime Optimization Pack for Microsoft Lync to address these issues and to ensure improved Lync functionality. And I must give Citrix credit for adding support for Linux directly!
Try it! – Profile Management Configuration Check Tool (UPMConfigCheck)
Ok, how often don’t you hear or see that technology just have been implemented with the “Next -> Next -> Finish” methodology? Now Citrix has introduced a tool to check whether you’ve configured your environment the most optimal way or not! Great!
“UPMConfigCheck is a PowerShell script that examines a live Profile management system and determines whether it is optimally configured.
UPMConfigCheck requires PowerShell 2. UPMConfigCheck is designed to run on XenApp servers and on XenDesktop virtual desktops with Profile management installed. Supported operating systems are the same as for Profile management.
These include:
• Windows XP
• Windows Vista
• Windows 7
• Windows Server 2003
• Windows Server 2008 / Windows Server 2008 R2
32-bit and 64-bit operating system versions, where available, are supported.”
Download it here and here you find a good blog post about it!
//Richard
Citrix Webinar: Increase your Citrix XenDesktop monitoring capabilities using HP Operations Management Software
Hot tip from Douglas:
Increase your Citrix XenDesktop monitoring capabilities using HP Operations Management Software
Citrix Ready Webinar with ComTrade
Join us to learn how ComTrade’s Smart Plug-in for Citrix (Citrix SPI) helps you measure, monitor and manage XenDesktop and gives you an end-to-end overview from within the HP Operations Manager and HP BSM. During this 45 minute webinar you will learn:
• Why customers buy SPI for Citrix and how it fits across the XenDesktop architecture
• How SPI for Citrix discovers your XenDesktop deployment, performs infrastructure health, checks and visualizes problematic areas
• How SPI for Citrix measures end-user experience, both real-user and synthetically, to help proactively identify issues before they impact your users
All of the above will be supplemented with real-world demos.
Speakers: Craig Ellrod (Senior Technical Marketing Manager, Citrix Systems) and Bogdan Viher (Senior Product Manager, ComTrade)
Date and Time: September 26th 2012, 1:00pm to 2:00pm EST
More info and registration here!
//Richard
Web Interface 5.4 vs. StoreFront 1.2 – What has changed since last comparison?
Hi all,
Ok, let’s start this post by thanking Thomas Koetzing for his newly updated post! Thx a lot man and keep up the great work!
Thomas has summarized most of the features that Web Interface 5.4 offers and how StoreFront matches that, it’s a really good table and one that all of you architects out there shall review and plan accordingly. What are you using today and what are the needs going forward, then once you have your business needs and requirements you have your wanted position and it’s just to make a roadmap of how your service gets there, or not if features are missing, then call Citrix!! 😉
I think that Thomas’s summary is good, one thing to consider though that I really urge you to think of is if you’re planning to use multiple access points around the world for an enterprise. How would this work? What if you have one in Europe, APAC and Americas? You would probably have a couple of NetScalers with AGEE and use GSLB to nicelly provide a simple URL for everyone and network proximity or so to direct the users to the closest entry point. But that regional NetScaler would most likely have its own set of StoreFront servers including a pair of AppControllers to ensure that you don’t have a single point of failure in terms of your internal WAN to get to another regional StoreFront/AppController setup from the local NetScaler AGEE? And if you then think like me; how are you going to do this?
The StoreFront server is relying on the DB for the subscriptions that the end-users have done in terms of selection apps etc for his “workspace”, and the same is with the AppController! There is no “supported” way today that I’ve found where you can synchronize two or multiple sets of HA-pairs of StoreFront or AppControllers so that no matter where the end-user is logging on he/she doesn’t get the same set of subscriptions (apps, desktops, SaaS, etc.) and neither his/her SSO credentials if AppController is used. And just imagine how it would be if you integrate and use the federation of SaaS applications on all locations and an end-user is logging in and subscribing from multiple AppControllers agains for instance Salesforce, and how would you do the overall enterprise reporting? This is the enterprise feature I’m missing and I’m hoping that we could see some solution to this fairly soon!
And it’s now you should start evaluating StoreFront, this is key to understand what it offers now so you know where you are compared to your As-Is architecture with Web Interface and map that to your wanted position going forward!
But a part from that I must say that Thomas did a great job in his comparison and read more about it in detail here!
//Richard





