VMWorld: How Openness Becomes The New Normal

VMWorld: How Openness Becomes The New Normal

VMWorld: How Openness Becomes The New Normal

Seated high above the sleek yet carnival-like atmosphere of the VMWorld Exhibition Hall, Hubert Yoshida, Chief Technology Officer of Hitachi, watches over his suppliers, his customers and his competitors, all occupying neighboring parts of expansive show floor.

Hitachi is one of those names everyone knows. It has been around since 1910 and is widely diversified. Its name conjures up images of very physical objects, excavators, televisions and computer components, and its physicality remains front and center even as it moves into a virtual future.Yoshida

Much of the conversation at VMWorld has been about the virtual and the scalable, with VMWare’s NSX platform taking center stage as the obvious go-to tool for network virtualization, and Yoshida is proud of this. He points out that VMWare is owned by EMC, essentially a competitor to Hitachi, but that by taking a proactive lead in terms of openness and availability, they have helped create a world where advances in scalability and reliability can truly happen for all suppliers and their customers.

In old days, he recalls, people tried to consolidate applications. Servers and applications had to hook into the existing operating system. But “what VMWare did was brilliant.” By creating a space where operating systems and applications can be stacked up, rackspaces started shrinking. Cost savings were being realized while their information and usage opportunities grew. “The space problem,” he says, “is going away.

But virtualization doesn’t happen just by itself, he cautions. Intelligence applies to hardware as much as it does to the applications that now float above it. In other words, “there must be integration between hardware and software – hardware does not become just a commodity. It must integrate in order to set policy.” He specifically points out the versatility of the VMWare vCenter interface as an example of this efficient integration effort. “We do not have any ego,” he says. “There is a philosophy that exists among the key players of the industry just to ‘make it available.’”

Yoshida advises CEOs and decision-makers to observe and participate in the inevitable movement of vital information from the traditional data centre to the private cloud. He says this should be done in steps: First, virtualization, which leads to consolidation, which in turn gets rid of underused resources. This means virtualization of storage, network, each component in turn. The next step, he says, is automation. The virtualized world is one that relies on dynamic and automatic maintenance and oversight. It would be a misunderstanding, he says, to believe that software defined storage equals a commodity. There needs to be more intelligence built into the system.

You cannot take a 1960’s Mini Cooper and make it perform like a Porsche,” Yoshida said. “Hardware must have the intelligence to meet the service requirements of the software.

Recalling techniques of the past, where, for example, new storage devices had to be plugged in and formatted by the admin, redundancies created, unit numbers logged, LUN ownership assigned and volumes mapped, all of this can and must now be automated, based upon policies defined by the software.

“C-level decision-makers, he says, are buying into software, but are often ignoring the importance of the hardware. Don’t ignore the importance of the hardware.”

It’s one thing,” he adds, to build a cloud, but quite another thing to be able to scale it. The must exist an ability to refresh the hardware so as to not have to bring systems down. And this is what virtualization should be able to do: Virtualization should be able to bring in a new box, virtualize the new box, bring data across, and then drop the old box without anything going down. You cannot take things down when you’re in the online business,”he states. “It’s what is called non-disruptive migration.”

Returning to the idea of openness, Yoshida points out that Hitachi has an open approach to virtualization, just like VMWare. “For example,” he says, “most people redefine LUNS into virtual LUNS. We don’t do that. We don’t have to do anything unnatural to help make you virtual. We do not want to make anyone change. Openness is the key, as people move into private cloud, hybrid cloud and progressive automation of the procedures. This, he says, will allow security and failsafe redundancy to be better integrated into the whole. It must start within the box,” he says, “safety cannot be layered on the top as an afterthought.

By Steve Prentice

Post is sponsored by Hitachi and MaximizeYourIT.com

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Cloud Infographic: IoT For Automotive Deconstructed

Cloud Infographic: IoT For Automotive Deconstructed

IoT For Automotive Deconstructed The IoT automotive industry is moving rapidly with many exciting growth opportunities available. We’ve written about some of the risks and benefits as well as some of the players involved. One thing for certain as that the auto industry is starting to take notice and we can expect the implementation of a…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…