{"id":680,"date":"2006-12-11T16:36:00","date_gmt":"2006-12-11T16:36:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm"},"modified":"2007-03-08T13:36:52","modified_gmt":"2007-03-08T13:36:52","slug":"introduction-to-virtualisation","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm","title":{"rendered":"Introduction to virtualisation"},"content":{"rendered":"<p><!--116894419918627350-->When thinking of IT security, there are a few names which immediately come to mind.  One of these is <a href=\"http:\/\/www.schneier.com\/\">Bruce Schneier<\/a>, another is <a href=\"http:\/\/www.projectbotticelli.co.uk\/\">Rafal Lukawiecki<\/a> and another is <a href=\"http:\/\/www.grc.com\/stevegibson.htm\">Steve Gibson<\/a>.  I recently began to listen to Steve Gibson&#8217;s <a href=\"http:\/\/www.twit.tv\/SN\">Security Now<\/a> podcast with Leo Laporte and originally I thought a security podcast would be dull &#8211; although it does seem to me that this one is as often about new hardware and software technologies as it is about security &#8211; but I was pleased to discover that it&#8217;s enjoyable listening as Steve does a very good job of describing security issues in basic terms (he can be very outspoken though and does sometimes let himself down on his broader knowledge of the non-security elements).<\/p>\n<p>I&#8217;ve written a lot on this blog about virtualisation technologies but never really covered the basics of what virtualisation is.  I had thought of writing a blog post on the topic but, as there are a number of Security Now podcasts that do a better job, I recommend listening to (or reading the transcript for):<\/p>\n<p><a href=\"http:\/\/www.twit.tv\/sn50\/\">Security Now episode 50: Introduction to virtualisation<\/a> (<a href=\"http:\/\/www.grc.com\/sn\/sn-050.htm\">transcript<\/a>).<\/p>\n<p>I found this particularly interesting, describing the history of virtualisation technology, from 1960s IBM mainframes right up to the present day. If that whetted your appetite then the following episodes may also be interesting:<\/p>\n<p><a href=\"http:\/\/www.twit.tv\/sn53\/\">Security Now episode 53: Virtualisation part 2<\/a> (<a href=\"http:\/\/www.grc.com\/sn\/sn-053.htm\">transcript<\/a>).<br \/>\n<a href=\"http:\/\/www.twit.tv\/sn54\/\">Security Now episode 54: Blue pill<\/a> (<a href=\"http:\/\/www.grc.com\/sn\/sn-054.htm\">transcript<\/a>).<br \/>\n<a href=\"http:\/\/www.twit.tv\/sn55\/\">Security Now episode 55: Application sandboxes<\/a> (<a href=\"http:\/\/www.grc.com\/sn\/sn-055.htm\">transcript<\/a>).<br \/>\n<a href=\"http:\/\/www.twit.tv\/sn57\/\">Security Now episode 57: Virtual PC<\/a> (<a href=\"http:\/\/www.grc.com\/sn\/sn-057.htm\">transcript<\/a>).<br \/>\n<a href=\"http:\/\/www.twit.tv\/node\/4548\/\">Security Now episode 59: Parallels<\/a> (<a href=\"http:\/\/www.grc.com\/sn\/sn-059.htm\">transcript<\/a>).<\/p>\n<p>I should point out though that I did notice a few errors:<\/p>\n<ul>\n<li>The reference to the 640MB memory limit in MS-DOS should be 640KB (as acknowledged in the following podcast).<\/li>\n<li>VMware Server does support both USB and sound (as acknowledged in the following podcast).<\/li>\n<li>Windows Vista has no noticeable performance issues on my Virtual Server 2005 R2 server although <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/will-vistas-3d-effects-work-in-virtual.htm\">it&#8217;s not possible to render 3D graphics as the virtual hardware does not support it<\/a>.<\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/windowsserversystem\/virtualserver\/evaluation\/linuxguestsupport\/default.mspx\">Microsoft does support Linux in a VM<\/a> (there are even VM Additions for Linux).<\/li>\n<\/ul>\n<p>It&#8217;s a shame that these errors crept in as it would have a huge effect on the overall positioning of Microsoft&#8217;s virtualisation products in the Virtual PC podcast (episode 57).  Having said that, Virtual Server does has a number of issues when it comes to managing it in a cross-platform environment &#8211; it may have a web interface but it relies on ActiveX (so, requires Internet Explorer on Windows) and the Virtual Machine Remote Control (VMRC) client is not available for non-Windows platforms (despite using port 5900, suggesting it may be related to VNC, I can&#8217;t seem to get it working using a VNC client).<\/p>\n<p>VMware may well have a more advanced product set (with Workstation, Virtual Infrastructure 3 and VirtualCenter 2) but from my experiences of dealing with the company it seems that they are going through some growing pains and I am sure that Microsoft will catch up over time.  What seems to be certain, is that virtualisation is more than just the buzzword of 2006.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When thinking of IT security, there are a few names which immediately come to mind. One of these is Bruce Schneier, another is Rafal Lukawiecki and another is Steve Gibson. I recently began to listen to Steve Gibson&#8217;s Security Now podcast with Leo Laporte and originally I thought a security podcast would be dull &#8211; &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Introduction to virtualisation<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[13],"class_list":["post-680","post","type-post","status-publish","format-standard","hentry","tag-virtualisation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Introduction to virtualisation - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introduction to virtualisation - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"When thinking of IT security, there are a few names which immediately come to mind. One of these is Bruce Schneier, another is Rafal Lukawiecki and another is Steve Gibson. I recently began to listen to Steve Gibson&#8217;s Security Now podcast with Leo Laporte and originally I thought a security podcast would be dull &#8211; &hellip; Continue reading Introduction to virtualisation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2006-12-11T16:36:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-03-08T13:36:52+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/12\\\/introduction-to-virtualisation.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/12\\\/introduction-to-virtualisation.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Introduction to virtualisation\",\"datePublished\":\"2006-12-11T16:36:00+00:00\",\"dateModified\":\"2007-03-08T13:36:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/12\\\/introduction-to-virtualisation.htm\"},\"wordCount\":508,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Virtualisation\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/12\\\/introduction-to-virtualisation.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/12\\\/introduction-to-virtualisation.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/12\\\/introduction-to-virtualisation.htm\",\"name\":\"Introduction to virtualisation - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2006-12-11T16:36:00+00:00\",\"dateModified\":\"2007-03-08T13:36:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/12\\\/introduction-to-virtualisation.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/12\\\/introduction-to-virtualisation.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/12\\\/introduction-to-virtualisation.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introduction to virtualisation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introduction to virtualisation - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm","og_locale":"en_GB","og_type":"article","og_title":"Introduction to virtualisation - markwilson.it","og_description":"When thinking of IT security, there are a few names which immediately come to mind. One of these is Bruce Schneier, another is Rafal Lukawiecki and another is Steve Gibson. I recently began to listen to Steve Gibson&#8217;s Security Now podcast with Leo Laporte and originally I thought a security podcast would be dull &#8211; &hellip; Continue reading Introduction to virtualisation","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm","og_site_name":"markwilson.it","article_published_time":"2006-12-11T16:36:00+00:00","article_modified_time":"2007-03-08T13:36:52+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Introduction to virtualisation","datePublished":"2006-12-11T16:36:00+00:00","dateModified":"2007-03-08T13:36:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm"},"wordCount":508,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Virtualisation"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm","name":"Introduction to virtualisation - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2006-12-11T16:36:00+00:00","dateModified":"2007-03-08T13:36:52+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/introduction-to-virtualisation.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Introduction to virtualisation"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1163,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/08\/microsoft-infrastructure-architecture-considerations-part-4-virtualisation.htm","url_meta":{"origin":680,"position":0},"title":"Microsoft infrastructure architecture considerations: part 4 (virtualisation)","author":"Mark Wilson","date":"Monday 25 August 2008","format":false,"excerpt":"Continuing the series of posts on the architectural considerations for designing a predominantly-Microsoft IT infrastructure, based on the MCS Talks: Enterprise Infrastructure series, in this post I\u00e2\u20ac\u2122ll look at some of the architectural considerations for using virtualisation technologies. Virtualisation is a huge discussion point right now but before rushing into\u2026","rel":"","context":"In \"Architecture\"","block_context":{"text":"Architecture","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/architecture"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1001,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/02\/no-more-heroes-please.htm","url_meta":{"origin":680,"position":1},"title":"No more heroes {please}","author":"Mark Wilson","date":"Wednesday 27 February 2008","format":false,"excerpt":"That's it.\u00a0 A single reference to [IT] heroes.\u00a0 No more - because I didn't count how many times that word was used at the 2008 Global Launch event today but I certainly didn't have enough fingers and toes to keep a tally - and now I'm tired of hearing it.\u2026","rel":"","context":"In \"Microsoft SQL Server\"","block_context":{"text":"Microsoft SQL Server","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/sql-server"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1224,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/10\/microsoft-virtualization-part-3-desktop-virtualisation.htm","url_meta":{"origin":680,"position":2},"title":"Microsoft Virtualization: part 3 (desktop virtualisation)","author":"Mark Wilson","date":"Thursday 2 October 2008","format":false,"excerpt":"Before the weekend, I started a series of posts on the various technologies that are collectively known as Microsoft Virtualization. So far, I've looked at host\/server virtualisation and in this post, I'll look at the various forms of desktop virtualisation that Microsoft offers. Whilst VMware have a virtual desktop infrastructure\u2026","rel":"","context":"In \"Microsoft Enterprise Desktop Virtualization (MED-V)\"","block_context":{"text":"Microsoft Enterprise Desktop Virtualization (MED-V)","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/med-v"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1232,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/10\/microsoft-virtualization-part-4-application-virtualisation.htm","url_meta":{"origin":680,"position":3},"title":"Microsoft Virtualization: part 4 (application virtualisation)","author":"Mark Wilson","date":"Monday 13 October 2008","format":false,"excerpt":"I'm getting behind on my blogging (my day job keeps getting in the way) but this post continues the series I started on Microsoft's virtualisation technologies. So far, I've set the scene, looked at host\/server virtualisation and desktop virtualisation and this time it's Microsoft Application Virtualization - formerly known as\u2026","rel":"","context":"In \"Microsoft Application Virtualization (App-V\/SoftGrid)\"","block_context":{"text":"Microsoft Application Virtualization (App-V\/SoftGrid)","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/app-v"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":369,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/09\/server-virtualisation-using-vmware-two.htm","url_meta":{"origin":680,"position":4},"title":"Server virtualisation using VMware: two real-life stories","author":"Mark Wilson","date":"Thursday 14 September 2006","format":false,"excerpt":"Last week, I attended the VMware Beyond Boundaries event in London - the first of a series of events intended to highlight the benefits that server virtualisation technology has to offer. The day included a number of high-quality presentations; however there were two that had particular meaning because they were\u2026","rel":"","context":"In \"Virtualisation\"","block_context":{"text":"Virtualisation","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/virtualisation"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1513,"url":"https:\/\/www.markwilson.co.uk\/blog\/2009\/08\/red-hat-enterprise-virtualisation-aka-me-too.htm","url_meta":{"origin":680,"position":5},"title":"Red Hat Enterprise Virtualisation (aka &#8220;me too!&#8221;)","author":"Mark Wilson","date":"Wednesday 26 August 2009","format":false,"excerpt":"Earlier this month, I managed to attend a Red Hat webcast about their forthcoming virtualisation products. Although Red Hat Enterprise Linux has included the Xen hypervisor used by Citrix for a while now (as do other Linux distros), it seems that Red Hat wants to play in the enterprise virtualisation\u2026","rel":"","context":"In \"Linux\"","block_context":{"text":"Linux","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/linux"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=680"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/680\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}