Maximize Your IT And VMWorld: A Hybrid Approach To A New Chapter In IT

Maximize Your IT And VMWorld: A Hybrid Approach To A New Chapter In IT

Maximize Your IT and VMWorld: a hybrid approach to a new chapter in IT

One of the most fascinating elements of the new chapter in IT history that virtualization represents is the degree to which companies who are essentially competitors, or who have long-held alliances with others, actually work together in an open forum somewhat reminiscent of the open-source code communities that gave birth to products like Linux. There is no naiveté in that statement; obviously, every company is in it to make money for its shareholders, investors and employees, however the degree of collaboration demonstrated by many of the industry’s biggest players is impressive.

This is something that Chris Carrier, Director, Alliance Machris-vmwarerketing at VMWare, understands well. He is involved with maximizeyourit.com, a joint venture between Hitachi Data Systems (HDS), Intel and VMWare, intended to help companies and organizations understand the ideas behind the Software Defined Data Center and Intelligent Storage; in other words, to help prepare them for transition to the private cloud.

The goal of maximizeyourit.com, he says is twofold: first to generate awareness and comfort with the concepts of cloud and virtualization, and second to obviously demonstrate the capacity of its three founding companies to assist and oversee their clients’ transition, and to ease that transition from the traditional “building block approach.”

He has always been impressed, for example by the capacity of HDS to support its powerful assertion of 100 percent uptime. “HDS was very insightful when they built their service line, and now they have a product that supports the statement of 100 percent uptime.” He adds, “many companies are tentative about making a statement like that, but They do not regret putting that out there.”

It is this type of innovation and initiative that seems to attract proactive companies, whether as co-developers of a solution, or as clients. “We do get partners that step up and bring a lot to the table,” he says, “there is a culture of encouraging initiative.” In other words, Carrier states, “companies are betting their future on the products of other companies.”

CloudTweaks asked Chris for a short state-of-the-union summary; where are we right now, and where are we going with all this technology? He responded, “we have finally crossed the threshold where cloud is a reality. The majority of companies see it as a reality.” What he sees as the next chapter basically involve more steps towards making infrastructure invisible. He uses the phone as an example. In the days of the rotary phone, everything was visible. For example making a long distance call involved the assistance of an operator who set up the call, and in some cases scheduled it for a later time. Now, he points out, we have become so comfortable with picking up a smartphone and stating, ‘call Jimmy’ that most of us have forgotten about the infrastructure underneath, to the point that we seldom even memorize phone numbers anymore.

Carrier sees this new chapter as being rife with healthy challenges. Numerous add-in companies, for example, experts in security, or compliance, will work with clients in a more open way to help them to prove they are compliant and ready for business. There is a tangible sense of overall collaboration; even vendors that compete are working together to push innovation further.

Naturally, in line with his role at VMWare, Carrier is very pleased with this year’s event. It is seeing representation from all segments of the economy and many areas of the world. “People are paying the attendance fees because they are seeing the value of the event.” Indeed this is corroborated by any random sampling of tweets sent by attendees – VMWorld 2013 has provided a great deal of practical knowledge for IT people to chew on and learn from, rather than just product displays. “People,” he says, “are talking tech.”

CloudTweaks asked Chris about the 90-10 ratio of male to female conference attendees as an index of gender representation in the IT world. He recognizes that there is a significant imbalance, but has seen, in his years both at VMWorld and previously, a slow change as more women enter into the industry.

Carrier is interested to see how the VMWorld Conference in Barcelona will compare in terms of acceptance and innovation in the “old world.” He says that this event, as well as the regional events held in the South East Asian/Pacific rim areas will help demonstrate to those organizations that are still on the fence that virtualization and cloud technology is now a true reality.

The VMWorld2013 San Francisco event runs through August 29, and the Barcelona event runs October 15-17. Both events can be followed through the hashtags #VMWorld and #VMWorld2013.

By Steve Prentice

Post is sponsored by Hitachi and MaximizeYourIT.com

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…