whats-the-latest-on-vmwares-project-michigan-and-vmware-monitoring

As expected, VMware Europe was a buzz of announcement, exciting keynote speeches, and amazing news in the world of networking. The event was held at the elegant Fira Gran Via in Barcelona, Spain, which is one of the largest and most sophisticated venues in all of Europe. It turned out to be the biggest VMworld yet, featuring more than 250 unique sessions, over 135 partners, and better than 10,000 attendees from all over the globe. Among the announcements came an in-depth explanation of VMware’s Project Michigan.

What’s Project Michigan?

Latest on VMware Project Michigan

Disaster Recovery services are just part of what Project Michigan has to bring to the VMware table.

Project Michigan is a new technology that will allow enterprises to deploy a secure gateway across VMware’s public cloud service, vCloud Air. The project will include a variety of enterprise-grade services, including Disaster Recovery and Dedicated Cloud. Project Michigan will support VM migration, as well as network and policy extension, via the Hybrid Cloud Manager. It boasts impressively low downtime and is able to be used to whirl up thousands of virtual machines with the same level of security and connectivity as an onsite private data center.

What Else Did VMware Unveil at VMware Europe?

Along with the announcements surrounding Project Michigan, VMware used the European event to unveil a collection of new tools and features that are designed to make it easier and faster to roll out new applications to its unified hybrid cloud. These features will expand the range of functionality of vCloud Air, including vSphere, which can be used to link vCloud Air with their own private cloud infrastructure.

VMware has upgraded the tool used to provide the vCloud Air public cloud service with vCloud Director 8. This is designed to assist the 4,000 or so service providers within the vCloud Air Network to link their services with the users’ private clouds using brand new hybrid cloud orchestration capabilities. vSphere 6 is supported with Director 8 as well as VMware NSX 6.1.4. Additionally, OAuth has been upgraded to offer support for identity sources and a few other enhancements.

VMware also took the opportunity at VMworld Europe to announce the tool Enhanced Identity Access Management, which is able to extend on-premises identity services to vCloud Air, offering support for single sign-on and unified governance and role management. Other enhancements and upgrades include making it simpler to take advantage of Google’s Anycast DNS servicers to host VMware’s email servicers, as well as Web-facing applications via vCloud Air. Now VMware will allow for control of Google DNS services through a REST API via the Developer’s Console or directly from the command line.

VMware Addresses Containerization

Latest on VMware

VMware also answered the questions regarding what they would do about the growth of containerization. For now, at least, the answer comes in vSphere Integrated Containers for vCloud Air, their public cloud platform.

Upcoming for vCloud Air are containerized applications and support for vSphere Integrated Containers. These are able to be managed through orchestration tools provided by several of VMware’s partners. This new capability resolves how VMware will handle the issues of containers, which are sometimes viewed as a competitor to the traditional virtual machine techniques.

VMware Addresses Networking Issues

Other announcements involved networking, including the availability of vCloud NFV. With a new accreditation program, VMware is trying to make it faster and easier for partners to roll out network function virtualization. The new NFV platform is able to support 40 virtual network functions available from 30 vendors. The accreditation program will enable other partners to certify that their virtual network functions are compatible with the VMware platform.

Are you in need of a better way to keep up with the happenings at VMware and upcoming VMworld events? 

Sign up for our newsletter now.

CNIL
Metrics and Logs

(formerly, Opvizor Performance Analyzer)

VMware vSphere & Cloud
PERFORMANCE MONITORING, LOG ANALYSIS, LICENSE COMPLIANCE!

Monitor and Analyze Performance and Log files:
Performance monitoring for your systems and applications with log analysis (tamperproof using immudb) and license compliance (RedHat, Oracle, SAP and more) in one virtual appliance!

Subscribe to Our Newsletter

Get the latest product updates, company news, and special offers delivered right to your inbox.

Subscribe to our newsletter

Use Case - Tamper-resistant Clinical Trials

Goal:

Blockchain PoCs were unsuccessful due to complexity and lack of developers.

Still the goal of data immutability as well as client verification is a crucial. Furthermore, the system needs to be easy to use and operate (allowing backup, maintenance windows aso.).

Implementation:

immudb is running in different datacenters across the globe. All clinical trial information is stored in immudb either as transactions or the pdf documents as a whole.

Having that single source of truth with versioned, timestamped, and cryptographically verifiable records, enables a whole new way of transparency and trust.

Use Case - Finance

Goal:

Store the source data, the decision and the rule base for financial support from governments timestamped, verifiable.

A very important functionality is the ability to compare the historic decision (based on the past rulebase) with the rulebase at a different date. Fully cryptographic verifiable Time Travel queries are required to be able to achieve that comparison.

Implementation:

While the source data, rulebase and the documented decision are stored in verifiable Blobs in immudb, the transaction is stored using the relational layer of immudb.

That allows the use of immudb’s time travel capabilities to retrieve verified historic data and recalculate with the most recent rulebase.

Use Case - eCommerce and NFT marketplace

Goal:

No matter if it’s an eCommerce platform or NFT marketplace, the goals are similar:

  • High amount of transactions (potentially millions a second)
  • Ability to read and write multiple records within one transaction
  • prevent overwrite or updates on transactions
  • comply with regulations (PCI, GDPR, …)


Implementation:

immudb is typically scaled out using Hyperscaler (i. e. AWS, Google Cloud, Microsoft Azure) distributed across the Globe. Auditors are also distributed to track the verification proof over time. Additionally, the shop or marketplace applications store immudb cryptographic state information. That high level of integrity and tamper-evidence while maintaining a very high transaction speed is key for companies to chose immudb.

Use Case - IoT Sensor Data

Goal:

IoT sensor data received by devices collecting environment data needs to be stored locally in a cryptographically verifiable manner until the data is transferred to a central datacenter. The data integrity needs to be verifiable at any given point in time and while in transit.

Implementation:

immudb runs embedded on the IoT device itself and is consistently audited by external probes. The data transfer to audit is minimal and works even with minimum bandwidth and unreliable connections.

Whenever the IoT devices are connected to a high bandwidth, the data transfer happens to a data center (large immudb deployment) and the source and destination date integrity is fully verified.

Use Case - DevOps Evidence

Goal:

CI/CD and application build logs need to be stored auditable and tamper-evident.
A very high Performance is required as the system should not slow down any build process.
Scalability is key as billions of artifacts are expected within the next years.
Next to a possibility of integrity validation, data needs to be retrievable by pipeline job id or digital asset checksum.

Implementation:

As part of the CI/CD audit functionality, data is stored within immudb using the Key/Value functionality. Key is either the CI/CD job id (i. e. Jenkins or GitLab) or the checksum of the resulting build or container image.

White Paper — Registration

We will also send you the research paper
via email.

CodeNotary — Webinar

White Paper — Registration

Please let us know where we can send the whitepaper on CodeNotary Trusted Software Supply Chain. 

Become a partner

Start Your Trial

Please enter contact information to receive an email with the virtual appliance download instructions.

Start Free Trial

Please enter contact information to receive an email with the free trial details.