Verified Document

Virtualization Technologies Virtualization Refers To Research Paper

A virtualized environment also meets the requirement of offsite backup storage and geographical compliance requirements. Virtualization is also important to an organization with a mobile workforce because it enhances data concentration hence posing less risk of data loss compared to having the data dispersed on removable media, portable computers or embedded devices while out in the field. If the organizations security staff carefully constructs applications that restrict access and services to only the tasks and data that an employee requires to accomplish a given activity, then data exposure will be limited in the event that a device has been compromised.

On the other hand, a virtualized environment possess disadvantages to the business environment that may see to it that the organizations treasured business secrets are compromised and operations may come to a standstill.

Virtualization technologies may bring about system complexities to an organization's computer facilities compared to the traditional non-virtualized environment. Virtualization components are many and varied besides the general computing requirements such as data storage and deployed applications resulting to a large attack surface. The employees with no computer studies background therefore find it difficult to operate the facilities should they encounter setbacks.

Virtualization technologies also pose serious underlying complications because organizations typically share components and resources with other consumers that are unknown. Innovations on the technology continue to increase each and every year to enhance sophistication. Having to share infrastructure with unknown business clients can be a major setback for certain applications. This requires a high level of assurance relating to the strength of the security system used for logical separation which would incur most operation costs for the organization.

Virtualized technologies services are delivered over the internet meaning that administrative interfaces used to manage and self-service accounts and also administrative interfaces used to access deployed services are exposed. Data and applications that are virtualized face increased risk from network threats that were previously defended when they could be accessed from the organization's intranet. In some occasion when the internet is slow or is not available at all, the performance and quality of services delivered by the organization becomes an issue and customers suffer from not receiving services while the organization suffers losses.

Adoption of virtualization technologies in an organization implies that responsibility and control of information that was directly under the organizations control is now transferred. This situation makes the organization dependent on the virtualization technology provider to carry out activities that require the participation of both parties, for example, the continuous monitoring and accident response. This situation also poses a challenge on maintaining accountability hence interfering with other advantages discussed above.

From a business prospective, discuss the pre-deployment and post-deployment support requirements to operate a virtualized environment.

Business organizations considering adopting a virtualized environment need to consider how existing application are performing in a non-virtualized environment, how applications are likely to perform when moved into a virtualized environment in order weigh the foregone cost of adopting a virtualized environment and finally how the application will perform once they are operating in a virtualized environment Kusnetzky, 2011.

Physical requirements needed to implement a virtualized technology include a workstation, user traffic, application server with live application and infrastructure element being tested.

Pre-deployment support requirements

As discussed earlier, virtualization involves the moving of already existing servers and applications to a new server where new virtual servers will be established. This means the user access could be achieved over WAN'S with restricted packet loss, bandwidth and latency issues. When the business organization has realized how application is running in the current environment, then the next step...

One also needs to consider PCI option card placement, update all component firmware, check for detective hardware components, and test for defective memory modules and check for any vendor support materials. The process may be time consuming but greatly reduces the chances of unplanned service due hardware failure at post deployment. The capacity for the organization to conduct pre-deployment testing can be used as a strategy to convince decision makers about the benefits of adopting a virtualized environment.
Post deployment support requirements

Once a business organization has implemented the virtualization technology, it is important to check on the performance gains being recorded. Different technologies can be used to monitor performance and response times once applications have been moved such as iTrinegy APPQoS that could also be used to monitor the usage application as well.

Differences between three leading virtualization platforms in the industry

VM ware is the pioneer in the field of virtualization with the latest version vSphere being the fourth hence boosting a number of strengths. To begin with the version has a small footprint as it only needs about 60MB disk space to get it running as compared with other platforms that will definitely utilize more that the mentioned disk space. VMware also has a good record that has been established and proven. The platform is also highly compatible with most operating systems and is guaranteed to work as compared to other systems that rely on existing operating systems creating the notion of a lot of work before successfully installing any virtualization platform. The Microsoft Hyper-V is enjoying increased popularity because of its ease to install especially when one has the windows server 2008 software Marshall, Reynolds, & McCrory, 2006.

Individuals who are already familiar with the windows shop also have the opportunity to remain native to their service provider. The new management console allows an individual to control multiple Hyper-V servers. Xen is the leading open source virtualization platform freeing one from the responsibility of dealing with virus scans and patches. One of the best features of the Xen platform is the power to set priorities and add in disk and network utilization among other functions. It is easy to deploy with an enormous maximum disk size.

Conclusion

Virtualization technologies present vital features giving it the capability to be used across a wide range of applications. Virtualization has been in existence for about sixty years and offers area for further research around the globe today. Business organizations are adopting the technology because of the numerous benefits that arise in the information technology department and profits in general Menken, 2008.

The available platform are wide ranging so one can choose which one provide maximum output. Future research is required to study wide ranging taxonomies such as multi-layered technologies and fit them in the existing taxonomy.

References

Baschab, J., & Piot, J. (2007). The executive's guide to information technology. Hoboken, NJ: J. Wiley & Sons.

Golden, B. (2007). Virtualization for dummies. Hoboken, N.J: Wiley.

Hoopes, J. (2009). Virtualization for security: Including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting. Burlington, MA: Syngress Pub.

James, M. (2008). Virtualization: 100 success secrets: 100 most asked questions on server and desktop virtualization, Thinapp software, Windows and Vista applications.

Kusnetzky, D. (2011). Virtualization: A manager's guide. Sebastopol, CA: O'Reilly.

Marshall, D., Reynolds, W.A., & McCrory, D. (2006). Advanced server virtualization: VMware and Microsoft platforms in the virtual data center. Boca Raton: Auerbach.

Menken, I. (2008). A complete guide on virtualization. Sydney: Emereo Pty Ltd.

Van, L.R. (2012). Data Virtualization for Business Intelligence Systems: Revolutionizing Data Integration for Data Warehouses. Burlington: Elsevier Science.

Sources used in this document:
References

Baschab, J., & Piot, J. (2007). The executive's guide to information technology. Hoboken, NJ: J. Wiley & Sons.

Golden, B. (2007). Virtualization for dummies. Hoboken, N.J: Wiley.

Hoopes, J. (2009). Virtualization for security: Including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting. Burlington, MA: Syngress Pub.

James, M. (2008). Virtualization: 100 success secrets: 100 most asked questions on server and desktop virtualization, Thinapp software, Windows and Vista applications.
Cite this Document:
Copy Bibliography Citation

Related Documents

Networking, System Support, and Virtualization
Words: 2181 Length: 7 Document Type: Research Proposal

Ethical Concerns of the Research This research would adhere to the ethical aspect of studies in order to come up with quality information. One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The

New Generation Technology CRM at
Words: 2581 Length: 8 Document Type: Research Proposal

Figure 2: Dell Inc. Marketing and Manufacturing Process Integration Based on analysis of Sources: (Kapuscinski, Zhang, Carbonneau, Moore, Reeves, 2004) (Gunasekaran, Ngai, 2009) (Bilek, 2010) Discussion of Current Business Issues Today Dell suffers from not having enough insight into the most critical customer relationships necessary to grow its emerging virtualization and Cloud computing businesses, as the company's approach to managing by technology instead of customers created a very myopic mindset. The transition from being

Future of Cloud Computing Technologies
Words: 1735 Length: 5 Document Type: Essay

Abstract Cloud computing technologies have emerged in the recent past as a new model/paradigm for hosting and delivering computing resources and services through the Internet. This paper discusses cloud computing technologies as a mechanism for improving business operations through offering computing resources/services via the Internet. This discussion includes an overview of cloud computing technologies, its benefits, and recent trends. This is followed by a discussion of speculations regarding the future of

Centre Can Be Described As
Words: 5439 Length: 15 Document Type: Research Paper

A clear vision of objectives for the present and future of the center should be elucidated at this stage. Design and building are obvious and crucial aspects that also take into account and depend on the initial analysis and planning phase. One always has to take into account the fact that data centers will often need to expand. This can be catered for by a modular design and building approach;

Cloud Computing Emerging Trends for
Words: 2873 Length: 7 Document Type: Thesis

In addition to the stability, scalability and extensibility of its architecture, cloud platform have made it possible for workflows across government to become more pervasive and secure as a result [4]. The TCO of a given cloud platform or series of applications therefore has continued to become reduced by the experience effect (comparable to economies of scale yet only applied to data aggregated and knowledge creation) across government [6]. This

Capacity Planning and Performance Monitoring
Words: 788 Length: 3 Document Type: Case Study

This is why cloud computing is still an imprecise science at best, with significant lags in performance and inconsistent performance on large-scale performance requirements (Luo, 2010). VMWare is concentrating on these aberrations in performance to create optimized product and services mix for each of their software and hardware products, looking to ensure a high level of computer capacity utilization over time. Amazon's lessons learned in managing one of the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now