Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion: Respect For Customers Still Counts In The Virtual World

In recent years, the words "virtual" and "virtually" have come to mean almost nothing -- or virtually everything. There was a car ad on TV awhile back featuring a phony customer testimonial (I guess we could call it a "virtual" testimonial) in which the guy gushes his endorsement for a certain vehicle by saying, "I virtually live in my car -- to a degree." Now, I don't expect TV ads to be the equivalent of Thomas Aquinas or Shakespeare -- but what in the wide world of fluffery does that sentence mean? Or how often do you hear something like, "I'll virtually guarantee that this idea will work" or "My team's a virtual lock for the Super Bowl." Well, is it a guarantee, or isn't it? Will that team be in the championship, or won't it? What does the word "virtual" mean anymore? All I can tell you is that it's a virtual certainty that I don't know the answer.

But in the business-technology world, virtual servers and virtual machines and virtualization have become incredibly real as more businesses are finding them to be rich sources of flexibility, cost-savings, and simpler administration. Comparable to the aggressive push toward grid computing from IBM, Oracle, and others, virtualization at its core is an attempt to allow companies to make better use out of what they have -- and that's a value proposition high on the priority list of every CIO today.

OTHER VOICES

"Network security has a particularly affinity for myths," he says. "It's hard to change an opinion once it's made, and a lot of IT and security professionals have based their opinions on received wisdom. They've heard about security risks, but they haven't tried it for themselves. Some of these opinions might have been based on reality but are no longer valid, and some is just based on what we've been told."

-- Cybersecurity consultant Justin Peltier, quoted in "The Four Most Dangerous Security Myths," by Matthew Friedman, Networking Pipeline, Oct. 10

Accordingly, technology vendors are coming out with a range of approaches:

  • BMC Software last week introduced a suite of products designed to help get IT resources synchronized with the appropriate software updates and change-management processes. The ultimate objective is to help customers ensure that the right IT resources are being deployed in the most-beneficial ways at the proper times.
    • 1