Research: Virtualising mission-critical apps - part 2

clock

John Leonard examines the technical and institutional hurdles to the virtualisation of core business systems

In part one of this research we looked at how, as a consequence of their fundamental importance to the enterprise, mission-critical applications have tended to remain stubbornly attached to bare me...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Hacking

Italian spyware used to target Apple and Android phones, says Google

Italian spyware used to target Apple and Android phones, says Google

News comes as NSO says Pegasus spyware used by at least five EU countries

clock 24 June 2022 • 3 min read
Yodel experiencing service disruption following cyberattack

Yodel experiencing service disruption following cyberattack

Company says it can't give customers a precise delivery slot

clock 22 June 2022 • 3 min read
Paige Thompson worked for Amazon from2015-2016, and conducted her hack three years later in July 2019

Ex-Amazon worker found guilty in Capital One breach

Paige Thompson built a tool to find vulnerable AWS accounts, exfiltrate data and plant cryptomining software

clock 21 June 2022 • 3 min read