Manfred Meier over at VMwareDirectory has launched a new utility. The vGuestExplorer is a Windows Explorer style tool which can copy files and folders to and from Virtual Machines, even without Network connectivity.
It connects through PowerCLI and VIX API to the ESXi Host or vCenter Server and lists all Virtual Machines with running VMware Tools. The files are retrieved and managed by VMware Tools on the Guest Virtual Machine. It will save you time, creating and connecting ISO files or disks to Virtual Machines to transfer files.
VMware vCloud Hybrid Service is a secure, dedicated hybrid cloud service operated by VMware, built on the trusted foundation of VMware vSphere. The service supports existing workloads and third-party applications as well as new application development, giving IT a common platform for seamlessly extending its data center to the cloud.
vCloud Hybrid Service is available in two service types—Dedicated Cloud and Virtual Private Cloud—and includes five primary service components:
VMware vCenter Log Insight delivers automated log management through log aggregation, analytics and search, extending VMware’s leadership in analytics to log data. With an integrated cloud operations management
approach, it provides the operational intelligence and enterprise-wide visibility needed to proactively enable service levels and operational efficiency in dynamic hybrid cloud environments.
Despite its name, the HyTrust Appliance is not a physical piece of hardware. It’s a VMware vSphere-compatible virtual appliance that’s deployed right alongside the rest of your virtual infrastructure. It can be deployed on the same hypervisor that it is actively protecting.
HyTrust Appliance sits in the management plane of the virtual infrastructure. In other words, it sits between the administrators of the virtual infrastructure—the virtualization admins, the network admins, the application owners—and the virtual infrastructure itself. From this centralized vantage point, HyTrust Appliance intercepts all administrative requests for the virtual infrastructure, determines whether or not the request is in accordance with the organization’s defined policy, then permits or denies the request as appropriate.