A virtualized environment also meets the requirement of offsite backup storage and geographical compliance requirements.
Virtualization is also important to an organization with a mobile workforce because it enhances data concentration hence posing less risk of data loss compared to having the data dispersed on removable media, portable computers or embedded devices while out in the field. If the organizations security staff carefully constructs applications that restrict access and services to only the tasks and data that an employee requires to accomplish a given activity, then data exposure will be limited in the event that a device has been compromised.
On the other hand, a virtualized environment possess disadvantages to the business environment that may see to it that the organizations treasured business secrets are compromised and operations may come to a standstill.
Virtualization technologies may bring about system complexities to an organization's computer facilities compared to the traditional non-virtualized environment. Virtualization components are many and varied besides the general computing requirements such as data storage and deployed applications resulting to a large attack surface. The employees with no computer studies background therefore find it difficult to operate the facilities should they encounter setbacks.
Virtualization technologies also pose serious underlying complications because organizations typically share components and resources with other consumers that are unknown. Innovations on the technology continue to increase each and every year to enhance sophistication. Having to share infrastructure with unknown business clients can be a major setback for certain applications. This requires a high level of assurance relating to the strength of the security system used for logical separation which would incur most operation costs for the organization.
Virtualized technologies services are delivered over the internet meaning that administrative interfaces used to manage and self-service accounts and also administrative interfaces used to access deployed services are exposed. Data and applications that are virtualized face increased risk from network threats that were previously defended when they could be accessed from the organization's intranet. In some occasion when the internet is slow or is not available at all, the performance and quality of services delivered by the organization becomes an issue and customers suffer from not receiving services while the organization suffers losses.
Adoption of virtualization technologies in an organization implies that responsibility and control of information that was directly under the organizations control is now transferred. This situation makes the organization dependent on the virtualization technology provider to carry out activities that require the participation of both parties, for example, the continuous monitoring and accident response. This situation also poses a challenge on maintaining accountability hence interfering with other advantages discussed above.
From a business prospective, discuss the pre-deployment and post-deployment support requirements to operate a virtualized environment.
Business organizations considering adopting a virtualized environment need to consider how existing application are performing in a non-virtualized environment, how applications are likely to perform when moved into a virtualized environment in order weigh the foregone cost of adopting a virtualized environment and finally how the application will perform once they are operating in a virtualized environment Kusnetzky, 2011.
Physical requirements needed to implement a virtualized technology include a workstation, user traffic, application server with live application and infrastructure element being tested.
Pre-deployment support requirements
As discussed earlier, virtualization involves the moving of already existing servers and applications to a new server where new virtual servers will be established. This means the user access could be achieved over WAN'S with restricted packet loss, bandwidth and latency issues. When the business organization has realized how application is running in the current environment, then the next step...
Ethical Concerns of the Research This research would adhere to the ethical aspect of studies in order to come up with quality information. One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The
Figure 2: Dell Inc. Marketing and Manufacturing Process Integration Based on analysis of Sources: (Kapuscinski, Zhang, Carbonneau, Moore, Reeves, 2004) (Gunasekaran, Ngai, 2009) (Bilek, 2010) Discussion of Current Business Issues Today Dell suffers from not having enough insight into the most critical customer relationships necessary to grow its emerging virtualization and Cloud computing businesses, as the company's approach to managing by technology instead of customers created a very myopic mindset. The transition from being
Abstract Cloud computing technologies have emerged in the recent past as a new model/paradigm for hosting and delivering computing resources and services through the Internet. This paper discusses cloud computing technologies as a mechanism for improving business operations through offering computing resources/services via the Internet. This discussion includes an overview of cloud computing technologies, its benefits, and recent trends. This is followed by a discussion of speculations regarding the future of
A clear vision of objectives for the present and future of the center should be elucidated at this stage. Design and building are obvious and crucial aspects that also take into account and depend on the initial analysis and planning phase. One always has to take into account the fact that data centers will often need to expand. This can be catered for by a modular design and building approach;
In addition to the stability, scalability and extensibility of its architecture, cloud platform have made it possible for workflows across government to become more pervasive and secure as a result [4]. The TCO of a given cloud platform or series of applications therefore has continued to become reduced by the experience effect (comparable to economies of scale yet only applied to data aggregated and knowledge creation) across government [6]. This
This is why cloud computing is still an imprecise science at best, with significant lags in performance and inconsistent performance on large-scale performance requirements (Luo, 2010). VMWare is concentrating on these aberrations in performance to create optimized product and services mix for each of their software and hardware products, looking to ensure a high level of computer capacity utilization over time. Amazon's lessons learned in managing one of the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now