Maximize Your IT And VMWorld: A Hybrid Approach To A New Chapter In IT

Maximize Your IT And VMWorld: A Hybrid Approach To A New Chapter In IT

Maximize Your IT and VMWorld: a hybrid approach to a new chapter in IT

One of the most fascinating elements of the new chapter in IT history that virtualization represents is the degree to which companies who are essentially competitors, or who have long-held alliances with others, actually work together in an open forum somewhat reminiscent of the open-source code communities that gave birth to products like Linux. There is no naiveté in that statement; obviously, every company is in it to make money for its shareholders, investors and employees, however the degree of collaboration demonstrated by many of the industry’s biggest players is impressive.

This is something that Chris Carrier, Director, Alliance Machris-vmwarerketing at VMWare, understands well. He is involved with maximizeyourit.com, a joint venture between Hitachi Data Systems (HDS), Intel and VMWare, intended to help companies and organizations understand the ideas behind the Software Defined Data Center and Intelligent Storage; in other words, to help prepare them for transition to the private cloud.

The goal of maximizeyourit.com, he says is twofold: first to generate awareness and comfort with the concepts of cloud and virtualization, and second to obviously demonstrate the capacity of its three founding companies to assist and oversee their clients’ transition, and to ease that transition from the traditional “building block approach.”

He has always been impressed, for example by the capacity of HDS to support its powerful assertion of 100 percent uptime. “HDS was very insightful when they built their service line, and now they have a product that supports the statement of 100 percent uptime.” He adds, “many companies are tentative about making a statement like that, but They do not regret putting that out there.”

It is this type of innovation and initiative that seems to attract proactive companies, whether as co-developers of a solution, or as clients. “We do get partners that step up and bring a lot to the table,” he says, “there is a culture of encouraging initiative.” In other words, Carrier states, “companies are betting their future on the products of other companies.”

CloudTweaks asked Chris for a short state-of-the-union summary; where are we right now, and where are we going with all this technology? He responded, “we have finally crossed the threshold where cloud is a reality. The majority of companies see it as a reality.” What he sees as the next chapter basically involve more steps towards making infrastructure invisible. He uses the phone as an example. In the days of the rotary phone, everything was visible. For example making a long distance call involved the assistance of an operator who set up the call, and in some cases scheduled it for a later time. Now, he points out, we have become so comfortable with picking up a smartphone and stating, ‘call Jimmy’ that most of us have forgotten about the infrastructure underneath, to the point that we seldom even memorize phone numbers anymore.

Carrier sees this new chapter as being rife with healthy challenges. Numerous add-in companies, for example, experts in security, or compliance, will work with clients in a more open way to help them to prove they are compliant and ready for business. There is a tangible sense of overall collaboration; even vendors that compete are working together to push innovation further.

Naturally, in line with his role at VMWare, Carrier is very pleased with this year’s event. It is seeing representation from all segments of the economy and many areas of the world. “People are paying the attendance fees because they are seeing the value of the event.” Indeed this is corroborated by any random sampling of tweets sent by attendees – VMWorld 2013 has provided a great deal of practical knowledge for IT people to chew on and learn from, rather than just product displays. “People,” he says, “are talking tech.”

CloudTweaks asked Chris about the 90-10 ratio of male to female conference attendees as an index of gender representation in the IT world. He recognizes that there is a significant imbalance, but has seen, in his years both at VMWorld and previously, a slow change as more women enter into the industry.

Carrier is interested to see how the VMWorld Conference in Barcelona will compare in terms of acceptance and innovation in the “old world.” He says that this event, as well as the regional events held in the South East Asian/Pacific rim areas will help demonstrate to those organizations that are still on the fence that virtualization and cloud technology is now a true reality.

The VMWorld2013 San Francisco event runs through August 29, and the Barcelona event runs October 15-17. Both events can be followed through the hashtags #VMWorld and #VMWorld2013.

By Steve Prentice

Post is sponsored by Hitachi and MaximizeYourIT.com

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…