Skip to main content

CIO and Virtualization: "Wait'n See" or act now?

I can fully understand the pressures of being a CIO. Someday I might be at that post, although I'd rather be a CSO ;-). But seriously the time to wait and see is come and gone, CIOs, Sr. Managers are gearing up to act. The ones who still want to see the virtualization phenomena as a freak wave, might have to really put on those glasses and aim for their guns.

I might (Still need Citrix to confirm that for me though ;-))be doing a CIO/Business Strategy Session at the upcoming Citrix Summit "Synergy 08", and the audience are CIOs and business managers. I'd love to share with you my perspectives/insights that I have gained in various industries.

Anyways here a perspective from the Arab world:

With more of the same set to arrive in forthcoming generations of server technology, there is a potential temptation to play ‘wait and see' - although as virtualisation is apparently here to stay, this process is likely to be never-ending.

Potentially more interesting is the impact virtualisation will have on client devices, especially in larger enterprises and those with significant customer-facing operations, such as banks or call centre operators.

By giving enterprises the possibility of creating hundreds or thousands of virtual machines, virtualisation has put thin clients on the corporate IT map again - and this time they might even catch on.

From an upgrade point of view, thin clients are very good news for firms - after an enterprise buys the initial stock of thin client terminals (usually slightly cheaper than regular desktops), it will be able to operate them for a much longer period of time than equivalent desktops. Then, if a user requires additional resources, this is simply a matter of back-end provisioning.
More here from my Middle East brothers...

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Virtualization: GlassHouse hopes to cash in with its IPO!

GlassHouse Technologies Inc. on Tuesday registered to raise as much as $100 million in an initial public offering that, despite the company's financial losses, could prove a hit with investors drawn to its focus on "virtualization" technology. The Framingham, Mass., company offers consulting services for companies that use virtualization software to improve the performance of corporate servers and cut costs in their data centers. GlassHouse also provides Internet-based data storage. "Software-as-a-service," or SaaS, companies and vendors of virtualization products have proved popular among investors in recent years as corporate customers seek alternatives to conventional packaged software. GlassHouse, with roots in both sectors, will test the strength of that interest, said Peter Falvey, managing director with Boston investment bank Revolution Partners. "It will be a bit of a bell weather," he says. "It's not as though it's the 15th SaaS m...