Tagged: IT-Infrastructure

Tim Bray worries about WS-*

Tim and others are starting to worry that WS-* is getting out of control:

No matter how hard I try, I still think the WS-* stack is bloated, opaque, and insanely complex. I think it’s going to be hard to understand, hard to implement, hard to interoperate, and hard to secure

Now I want to make it clear that I am no expert on this, but I have followed the debate.  It seems to be that the reason that this stuff is getting so complex is so that developers don’t have to worry about it.  What the heck do I mean by that; well I mean that these spec’s are not meant to be implemented by developers, they will be implemented by the tools and libraries that the developers use.  At least that’s the impression I get when Don Box talks about Indigo.  I think he said something like, “I spent the last n years, before I joined Microsoft,  worrying about the plumbing”, then he said something like “Since I joined Microsoft I am working to make all that knowledge about the plumbing completely irrelevant”. 

My guess is that without a complete and comprehensive set of specifications, the tools …

VMware ACE, I like it and use it

VMware have just announced ACE, this is how they describe it:

VMware ACE is an enterprise solution for IT desktop managers who want to rapidly provision standardized and secure PC environments throughout the extended enterprise. VMware ACE installs easily, improving the manageability, security and cost-effectiveness of any industry standard PC. VMware ACE enables IT desktop managers to apply enterprise IT policies to a virtual machine containing an operating system, enterprise applications, and data to create an isolated PC environment known as an “assured computing environment”. VMware assured computing environments are self-policing, protect enterprise data, and enable safe access to enterprise resources.

I like the idea, I have been using VMWare myself for exactly this requirement.  On one of my home servers that sits on my home network I have a Windows XP VM, configured with corporate firewall, AV products, locked down configuration and VPN client.  I use this VM to connect to the company network. 

This has two advantages, The company network is pretty well isolated from my home network and I am well isolated from it, (since its pretty big and represents a fairly large threat).  I would prefer to be able to just fire up a Windows Terminal …

Great roundup of Windows Terminal Server products

For years, Citrix has been the only choice for software to power server-based computing environments. Sure, Microsoft’s Terminal Server products were out there, but their features paled in comparison to those of Citrix MetaFrame Presentation Server. However, as Terminal Server continues to gain ground as a standalone solution, many people...

More on the Consumerization of IT

Nic, points out in a comment on this post titled The decline of enterprise influence over IT that CSC Research Services have recently published a report on Consumerization, which I have just read and must say makes very good reading, especially the first few pages.  One of the authors is currently thinking through some of the related personal responsibility issues.  This topic has sparked my interest and I have been talking through some of the implications with network, storage and infrastructure services architects.  It took a while for them to get it until I used the Internet Access analogy which we all lived through:

1.      When the internet was first established enterprises saw individual Internet access it as an activity of little interest, undertaken by enthusiasts only, with niche needs.

2.      Then they saw it as a threat as they noticed people with networked PC’s who also had active modem connections to the internet, they started to create policies to control it

3.      Then they saw it as a need, but only to be provided to the select few and only then in very controlled conditions

4.      Then the saw it as obvious …