Skip to main content

Consolidation and Virtualization top Data Center strategies

Like intel is on its massive 130 data center consolidation and virtualization spree, and it might take them 8 or so years, to get there. Many other data centers, large and small, ought to realize that this is a massive undertaking. Don't lose focus and make sure that you are ready for the next phase while you are half-way down the line, doing this consolidation and virtualization:
  • Staffing: You need to shuffle, train and hire some "Virtualization Aware" with strong business- and customer facing capabilities. Just start talking to your HR already to make sure you have agile staff to manage you highly agile, but also at the same time, vulnerable virtual data center.
  • Security: I sure hope for you, that you are doing this right from day one. If not go ahead and look for vendors that can provide you that. Check out Bluelane, Reflex Security, Catbird and several others (that I may have missed out here), even consult your virtualization vendors (VMware, Citrix, Microsoft) for their advice.
  • Are you current processes , ITIL, ITSM, Change Management, CMDB, Provisioning, SLA, etc , all aligned to go through this transformation?
  • Did you consider DRP? Please do that as well from day 1!
This is by no means a complete list, but a mere reminder, that you are just getting started with this thing, a lot has to happen before you can look back and heave a sigh of relief. I am sorry but that's the way it is :-|

The report, based on surveys of datacentre managers in 14 countries including the UK by Ziff Davis Enterprise, said Global 2000 enterprises were spending more than £3.2bn annually to help manage datacentre complexity.

The report said server virtualisation and consolidation were considered top cost containment strategies for the majority of respondents, with half implementing virtualisation strategies and 58% implementing consolidation strategies.



  1. We agree IT managers need to build their virtualization security plans in at the inception. But don't leave Catbird off of the top vendor list. We have the industry's only comprehensive hypervisor protection, Guest OS security, policy monitoring enforcement and server sprawl management solution.

  2. Then why aren't you on my radar? ;-)

  3. you haven't been going to the right parties.

  4. The "parties" take an effort to come within the vicinity of "the radar" :-)


Post a Comment

Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to; 1st Jan 2009 live


I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)

Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…