Making Virtualization Tangible: The CDW Bus

Making Virtualization Tangible: The CDW Bus

Making Virtualization Tangible: The CDW Bus

bus2

The VMWorld Convention, currently underway in San Francisco has brought 22,000 IT professionals face to face with the future. From the opening presentation, which included mini-keynotes from industry heavyweights to the dizzying selection of breakouts and events, through to an exhibit floor larger (seemingly) than many actual countries, this extremely well-run multi-day extravaganza is helping drive home the awareness that we live in a new age, where virtualization of information technology rules.

As Iddo Kadim, Director of Datacenter Technologies for Intel points out, this is not a reinvention of the wheel. The current infrastructure of servers, hardware and software has run out of places to grow, and the new era of virtualization stands to usher in new and remarkable advancements in speed, storage and throughput.

bus

Which is why it is such a pleasure to hang out in the CDW bus. CDW is a problem-solving company that helps consolidate all of the key elements of maintaining a modern-day data presence, including, mobility, networking, cloud computing and more.

Whereas all of the other vendors at the convention use sophisticated graphics and animations to illustrate their virtual product, CDW decided to put it all inside a vintage GM FutureLiner (The concept of a Futureliner), and take it out on the road. As their Lead Solutions Architect, Dan Vargas explains, the bus was first produced in the late 1940’s, and early 1950’s to address the postwar appetite for the new and futuristic. What better way is there, he says, to demonstrate the new and futuristic vision of cloud and virtualization than to package it inside a really retro-cool looking vehicle.

Although the bus is somewhat dwarfed by the enormous space of the Moscone Center, Vargas tells CloudTweaks that they drive the vehicle to all kinds of events including tailgate parties. Inside, carefully constructed display cases show off racks of servers and machines from all of the major players, highlighted in sleek red lighting.

The bus is no power-lightweight. It currently draws 100 amps and talks to its own cloud. There are plans to create an entire SDN network inside for a future tour.

Although some might categorize this as a simple marketing ploy, the bus helps create an image of high technology combined with tangibility, allowing curious potential customers to “kick the tires” of the technology in their own parking lot. And that’s a tangible advantage in a virtual world.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…