A team of expert judges -- consisting of editors, independent analysts, users and consultants -- will evaluate nominations. Not all nominees will be contacted directly by judges or interviewed in person during the show. Nonetheless, all products must be available for demo on the show floor should a judge request demonstration. The Best of Show winner will be selected from the individual category winners; nomination forms should not be submitted for this category.
The deadline for submission is Wednesday, July 31. If you submit multiple products, complete one form for each product. The same product may not be entered in multiple categories. Enter through our
Only products that have shipped between September 2012 and August 2013 and are generally available can be considered for categories other than New Technology. Products due to ship between September 2013 and December 2013 are eligible for the New Technology category.
Email queries to firstname.lastname@example.org.
Please review these descriptions carefully before submitting entries, as some category titles and descriptions have changed this year.
Storage and backup for virtualized environments. Legitimate entrants are software and/or hardware products that are designed to back up, restore and replicate data and/or achieve fault tolerance, or that support the storage needs of a virtual server infrastructure. Open to physical, virtualized and cloud-based storage technologies.
Security/compliance and virtualization. Legitimate entrants monitor and protect hypervisors, guest OSes, and virtual networks and enforce security and compliance best practices.
Virtualization management. Legitimate entrants monitor, track and troubleshoot virtual machine (VM) availability and performance problems, migrate files, manage VM lifecycles, configure and provision VMs or provide other VM management functions.
Networking and virtualization. Legitimate entrants are hardware and/or software technologies that enhance networking in virtual infrastructures and/or enable and optimize virtualized networks.
Desktop virtualization and end-user computing. Legitimate entrants are software and/or hardware platforms that deliver or enhance the delivery of desktops and applications to various endpoints. Examples include desktop virtualization software, client devices, connection brokers, mobile application management software and enterprise app stores.
Private cloud computing technologies. Legitimate entrants are those that use virtualization to enable private cloud infrastructures. A private cloud is operated solely for one organization, is typically managed by that organization and is on-premises.
Public and hybrid cloud computing technologies. Legitimate entrants are those that use virtualization to enable cloud infrastructure that is made available to the general public and is owned by an organization selling cloud services. Hybrid clouds are a composition of private and public clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability between clouds.
New technology. Legitimate entrants are new technologies in the previously listed seven virtualization categories that have not shipped but that will be available by the end of 2013.
Innovation. Does the product introduce new capabilities or significant improvements? Does it break new ground?
Performance. Does the product perform to the degree that it could improve overall data center operation?
Ease of integration into environment. How easily does the product integrate with other products? Can the product operate effectively in heterogeneous environments?
Ease of use and manageability. Is the product easy to install? Are the product's functions clear and easy to learn and run? Will the product scale to accommodate growth?
Functionality. Does the product deliver as promised? Does it provide greater or more useful functionality than others in its category?
Value. Does the product represent a cost-effective solution? Can its ROI be easily justified?
Fills a market gap. Highlight the need it fills and the problems it solves.
This was first published in June 2013