Virtualization Technologies Virtualization Refers to Research Paper

Download this Research Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Research Paper:

A virtualized environment also meets the requirement of offsite backup storage and geographical compliance requirements.

Virtualization is also important to an organization with a mobile workforce because it enhances data concentration hence posing less risk of data loss compared to having the data dispersed on removable media, portable computers or embedded devices while out in the field. If the organizations security staff carefully constructs applications that restrict access and services to only the tasks and data that an employee requires to accomplish a given activity, then data exposure will be limited in the event that a device has been compromised.

On the other hand, a virtualized environment possess disadvantages to the business environment that may see to it that the organizations treasured business secrets are compromised and operations may come to a standstill.

Virtualization technologies may bring about system complexities to an organization's computer facilities compared to the traditional non-virtualized environment. Virtualization components are many and varied besides the general computing requirements such as data storage and deployed applications resulting to a large attack surface. The employees with no computer studies background therefore find it difficult to operate the facilities should they encounter setbacks.

Virtualization technologies also pose serious underlying complications because organizations typically share components and resources with other consumers that are unknown. Innovations on the technology continue to increase each and every year to enhance sophistication. Having to share infrastructure with unknown business clients can be a major setback for certain applications. This requires a high level of assurance relating to the strength of the security system used for logical separation which would incur most operation costs for the organization.

Virtualized technologies services are delivered over the internet meaning that administrative interfaces used to manage and self-service accounts and also administrative interfaces used to access deployed services are exposed. Data and applications that are virtualized face increased risk from network threats that were previously defended when they could be accessed from the organization's intranet. In some occasion when the internet is slow or is not available at all, the performance and quality of services delivered by the organization becomes an issue and customers suffer from not receiving services while the organization suffers losses.

Adoption of virtualization technologies in an organization implies that responsibility and control of information that was directly under the organizations control is now transferred. This situation makes the organization dependent on the virtualization technology provider to carry out activities that require the participation of both parties, for example, the continuous monitoring and accident response. This situation also poses a challenge on maintaining accountability hence interfering with other advantages discussed above.

From a business prospective, discuss the pre-deployment and post-deployment support requirements to operate a virtualized environment.

Business organizations considering adopting a virtualized environment need to consider how existing application are performing in a non-virtualized environment, how applications are likely to perform when moved into a virtualized environment in order weigh the foregone cost of adopting a virtualized environment and finally how the application will perform once they are operating in a virtualized environment Kusnetzky, 2011.

Physical requirements needed to implement a virtualized technology include a workstation, user traffic, application server with live application and infrastructure element being tested.

Pre-deployment support requirements

As discussed earlier, virtualization involves the moving of already existing servers and applications to a new server where new virtual servers will be established. This means the user access could be achieved over WAN'S with restricted packet loss, bandwidth and latency issues. When the business organization has realized how application is running in the current environment, then the next step is to replicate the new virtualized environment with the inclusion of all expected restrictions in relation to access to the virtual server NICs. One also needs to consider PCI option card placement, update all component firmware, check for detective hardware components, and test for defective memory modules and check for any vendor support materials. The process may be time consuming but greatly reduces the chances of unplanned service due hardware failure at post deployment. The capacity for the organization to conduct pre-deployment testing can be used as a strategy to convince decision makers about the benefits of adopting a virtualized environment.

Post deployment support requirements

Once a business organization has implemented the virtualization technology, it is important to check on the performance gains being recorded. Different technologies can be used to monitor performance and response times once applications have been moved such as iTrinegy APPQoS that could also be used to monitor the usage application as well.

Differences between three leading virtualization platforms in the industry

VM ware is the pioneer in the field of virtualization with the latest version vSphere being the fourth hence boosting a number of strengths. To begin with the version has a small footprint as it only needs about 60MB disk space to get it running as compared with other platforms that will definitely utilize more that the mentioned disk space. VMware also has a good record that has been established and proven. The platform is also highly compatible with most operating systems and is guaranteed to work as compared to other systems that rely on existing operating systems creating the notion of a lot of work before successfully installing any virtualization platform. The Microsoft Hyper-V is enjoying increased popularity because of its ease to install especially when one has the windows server 2008 software Marshall, Reynolds, & McCrory, 2006.

Individuals who are already familiar with the windows shop also have the opportunity to remain native to their service provider. The new management console allows an individual to control multiple Hyper-V servers. Xen is the leading open source virtualization platform freeing one from the responsibility of dealing with virus scans and patches. One of the best features of the Xen platform is the power to set priorities and add in disk and network utilization among other functions. It is easy to deploy with an enormous maximum disk size.

Conclusion

Virtualization technologies present vital features giving it the capability to be used across a wide range of applications. Virtualization has been in existence for about sixty years and offers area for further research around the globe today. Business organizations are adopting the technology because of the numerous benefits that arise in the information technology department and profits in general Menken, 2008.

The available platform are wide ranging so one can choose which one provide maximum output. Future research is required to study wide ranging taxonomies such as multi-layered technologies and fit them in the existing taxonomy.

References

Baschab, J., & Piot, J. (2007). The executive's guide to information technology. Hoboken, NJ: J. Wiley & Sons.

Golden, B. (2007). Virtualization for dummies. Hoboken, N.J: Wiley.

Hoopes, J. (2009). Virtualization for security: Including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting. Burlington, MA: Syngress Pub.

James, M. (2008). Virtualization: 100 success secrets: 100 most asked questions on server and desktop virtualization, Thinapp software, Windows and Vista applications.

Kusnetzky, D. (2011). Virtualization: A manager's guide. Sebastopol, CA: O'Reilly.

Marshall, D., Reynolds, W.A., & McCrory, D. (2006). Advanced server virtualization: VMware and Microsoft platforms in the virtual data center. Boca…[continue]

Cite This Research Paper:

"Virtualization Technologies Virtualization Refers To" (2012, August 09) Retrieved December 9, 2016, from http://www.paperdue.com/essay/virtualization-technologies-75102

"Virtualization Technologies Virtualization Refers To" 09 August 2012. Web.9 December. 2016. <http://www.paperdue.com/essay/virtualization-technologies-75102>

"Virtualization Technologies Virtualization Refers To", 09 August 2012, Accessed.9 December. 2016, http://www.paperdue.com/essay/virtualization-technologies-75102

Other Documents Pertaining To This Topic

  • Networking System Support and Virtualization

    Ethical Concerns of the Research This research would adhere to the ethical aspect of studies in order to come up with quality information. One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The

  • Centre Can Be Described as

    A clear vision of objectives for the present and future of the center should be elucidated at this stage. Design and building are obvious and crucial aspects that also take into account and depend on the initial analysis and planning phase. One always has to take into account the fact that data centers will often need to expand. This can be catered for by a modular design and building approach;

  • Frontiers of Computing Cloud Computing

    The author provides insightful analysis into how virtualization can be used to augment and strengthen the learning process associated with programming, advanced systems analysis and design of networks as well. Key points made include the fact that virtualization technologies are ideally suited for testing out risky code that could otherwise harm or cause production-based networks to cease functioning (Lunsford, 340). Virtualization also provides students with an opportunity to work

  • Dirt Bikes Case Study Analytics

    Case Study Two: Developing a Disaster Recovery Plan The greatest threats to Dirt Bike's systems today have to do with taking a minimal, low-cost approach to enterprise system security, leaving large areas of their system platform vulnerable to competitors and hackers to steal their sales, finance and product design data. The second most likely threat they face is having their systems hacked into by disgruntled employees, who are seeking to get

  • Michael Dell s Influence on Dell

    His leadership has also led to the build-to-order strategy becoming an exceptionally profitable manufacturing strategy across dozens of industries. References Buffington, J. 2011, "Comparison of mass customization and generative customization in mass markets," Industrial Management + Data Systems, vol. 111, no. 1, pp. 41-62. Dell Investor Relations (2012). Investor Relations. Retrieved February 23, 2012 from Dell Investor Relations and Filings with the SEC Web site: http://content.dell.com/us/en/corp/about-dell-investor "A revolution of one: Michael Dell invented

  • Sprint Nextel Telecommunications Services

    Sprint Nextel Telecommunications The business environment that is influenced by the process of globalization determines companies to develop flexible strategies in order to be able to ensure their position on the market. The competition in most business fields has increased as a result of companies expanding their activity on international level. The environmental factors that have determined the financial crisis have influenced the purchasing behavior of customers. This is because the

  • Input Output Devices Will You Be Using in

    input/output devices will you be using in the next one to three years as "computing" devices? Which features/components/form factors will be prominent? Why? Which features/components/form factors will be important to you? Why? Which applications will you be using on these devices? How may these devices change your life in terms of benefits and risks? (Two pages) A survey of experts identified five major themes that will carry forward through the next


Read Full Research Paper
Copyright 2016 . All Rights Reserved