latoga labs

Alliances & Partnership Advising

  • About
  • Contact
  • View latoga’s profile on Twitter
  • View greglato’s profile on LinkedIn

© 2006–2025 · Log in

VMware DPM & Data Center Monitoring Tools

March 24, 2010 12 Comments

In the past I’ve written about the DPM capabilities within vSphere.  I’m seeing more and more of my clients starting to implement DPM within their enterprise production data centers.  As they do, the issue of integrating DPM with their data center monitoring tools keep coming up.  How do you prevent your data center monitoring tools from sending off a barrage of false alerts when DPM realizes it can save power by shutting down servers?

The answer lies within the white paper VMware Distributed Power Management Concepts and Use. (specifically page 13).

There are events that get triggered within vSphere when DPM decides to power down a server.  These events can be tapped into via the vSphere API.  By adding some logic to your data center monitoring tool of choice, you can surpress alerts related to DPM actions or deprecate their priority to informational.  This will allow the event to be logged but not distract your operations team with false positives.

Filed Under: Virtualization, VMware Tagged With: DPM, Monitoring

Watch Out For The VMware Express

March 19, 2010 15 Comments

VMware Express Exterior

Coming soon to a City near you, the VMware Express….

As part of the Virtualization Tour 2010, keep your eye our for the VMware Express semi truckin’ down the highway or as part of various industry events.  Check out the tour website to see what dates it may be near you  and register for an event.

Inside the Express

VMware Express Conference Room

VMware Demo Stations
Multiple VMware Demo Stations

VMware View Comparison Station
VMware View Comparison Station

VMware Express Server Room
VMware Express Server Room

VMware Express Long View
VMware Express Long View

Honk if You Love VMware!
Honk if You Love VMware!

Filed Under: VMware Tagged With: Tour, VMware Express

Employee Owned IT – Security Holds it Back

March 11, 2010 13 Comments

Yesterday was the VMware Community Roundtable discussion on View which featured VMware’s own John Dodge.  If you haven’t participated or listened into one of the roundtables, this is a great one for those who are doing or thinking about virtual desktops.

At one point the discussion turned to Employee Owned IT (EOIT) and offline desktops within View.  It was great to hear all the different individuals whose companies are thinking or implementing EOIT in some form or fashion.  One aspect of EOIT which I have touched on in the past, is security.  Security has come up with multiple of my clients when discussion desktop virtualization and EOIT; I was a bit shocked that the topic didn’t come up yesterday during the roundtable.

When you start letting employees bring in their own computers, connect to the corporate network, and then run a corporate supplied desktop VM locally (or connect to a corporate supplied virtual desktop remotely) to do their work there are still some security risks to keep in mind.  Namely, the uncontrolled operating system attached to your corporate network.

Corporate IT may have locked down the VM the employee is using, but more times than not there are not adequate security mechanisms in place to protect the network from the EOIT OS that is running on that EOIT laptop.  What sites were the employee’s children looking at last night?  What malware might be lurking on the EOIT laptop?  And that employee just plugged their laptop into your corporate network.

Walk into most large enterprises (and many smaller ones too), plug your computer to the physical network and you probably are now behind the firewall.  Many companies don’t have any security in place to prevent outside computers from getting an IP address and instant network access–I know this because I’ve had this discussion with my clients when discussing EOIT and I’ve done it myself in the past.  Most companies setup their wireless network to require authentication, and if it doesn’t require authentication it only gives you guest access to the Internet only.  But this is not the case for the physical networks because the assumption is that those inside the building should have full access.

For EOIT to really take off in enterprises, this existing security mindset needs to be addressed.  Either at the physical network level or at the local computer level.  Since the entire idea of EOIT is to not need to manage the computer, it puts us in a tough spot.  Most large enterprises would take years of time and lots of money to update the security on their network to a level that would enable EOIT for wide spread use.  Many smaller companies would do it much faster and cheaper where the cost savings of EOIT far out ways the security measures needed to be installed.

But how do you solve this problem for the large enterprise?

Filed Under: Technology Ramblings, Virtualization Tagged With: EOIT, Virtual Desktops, VMWare View

  • « Previous Page
  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • 44
  • Next Page »

About latoga labs

With over 25 years of partnering leadership and direct GTM experience, Greg A. Lato provides consulting services to companies in all stages of their partnering journey to Ecosystem Led Growth.