SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
 

                                                                                                                       

     

    WHITE PAGE
 




           
                                               Virtualization for Non-Hosted Applications
                                               Introduction 
                                                
                                               Virtualization is the concept of using a program (the most popular is
                                               called VMware) to allow one computer to “host” other computers on it.
                                               These virtual computers, or virtual machines, can run applications
                                               simultaneously with each other and with the host machine.             The
                                               program shares the host computer’s hardware and peripherals with each
                                               virtual machine, so that each virtual machine acts as its own computer.
                                               Historically, virtualization has been confined to the realm of large scale
                                               servers and other hosted solutions. With faster and more efficient
                                               desktops and laptops, which boast as much memory as servers did only
                                               a few years ago, it is now possible to use virtualization outside of the
                                               realm of hosted solutions and large scale server farms. Virtualization
                                               has three major features:          the fact that you can run multiple
                                               environments on the same machine, the fact that you can take a
                                               snapshot of an environment, save it, and restore back to that snapshot
                                               extremely easily, and the fact that the snapshots are hardware
                                               independent, allowing them to be shared between computers, even if
                                               those computers have different hardware and peripherals.

                                               Use of Multiple Environments on one Machine 
                                                
                                               One of the prime advantages of Virtualization is the ability for one
                                               machine to act as a host to multiple additional environments. These
                                               environments are completely separate from one another. There is no file
                                               system overlap, no memory overlap, and the environments need not
                                               even be the same operating system or the same type of operating
                                               system. A Windows XP box can be used to host a Virtualized Linux
                                               server, or a Windows Vista installation, or even something older, like a
                                               Windows NT 4.0 installation.




 




www.partnersconsulting.com | 1(866) 736.5500
           
 

                                                                                                                            

     

    WHITE PAGE
 




           
                                               For a developer, this aspect
                                               can be utilized to create any
                                               number of test environments
                                               for their applications. Without
                                               it, the user would either have to
                                               have      dozens        of    extra
                                               computers, or spend the time
                                               and effort to install from scratch
                                               multiple operating systems, just
                                               to do his testing on. This could
                                               take days or even weeks, time
                                               which few developers have. If
                                               a developer is working on
                                               multiple applications, then he
                                               can use virtualization to keep Figure 1  Virtualization can be used to maintain 
                                               his application development
                                                                                   separate security connections to different apps 
                                               environments       on      separate
                                                                                   simultaneously 
                                               machines,       reducing        the
                                               possibility of conflict between them. If that developer is working
                                               remotely, he may have firewall or other security concerns for logging into
                                               remote client sites. These security restraints can often cause conflicts if
                                               he tries to maintain more than one on the same computer. Virtualization
                                               solves this problem by separating the security systems into each
                                               individual environment.

                                               For a salesperson or demonstrator, it allows his single laptop to act like a
                                               multitude of servers, displaying how the application would work if it
                                               utilized all of these separate servers for its enterprise, or it can show
                                               different versions of the application, or even different localizations. In
                                               addition, it can be used to display multiple applications, each one
                                               operating independently on its own machine.

                                               For the home user, virtualization can be used to create environments
                                               which would otherwise be unavailable for specific applications. For
                                               example, a Macintosh user can utilize VMware to create a Windows XP
                                               VM and then use that machine to play certain Windows-only games on it.
                                               The same can be done with a user who operates a Linux workstation. In
                                               addition, a home user who wishes to learn more about Linux operation
                                               and administration can setup a Linux VM on his Windows box, without
                                               having to perform dual booting or re-partitioning of his hard drive.
                                               But that’s only one feature of Virtualization.
 




www.partnersconsulting.com | 1(866) 736.5500
           
 

                                                                                                                        

     

    WHITE PAGE
 




           
                                               Ability to Easily Save and Restore Environments  
           
                                               VMware is one of the software packages available to perform
                                               virtualization. One of its features is the ability to take a snapshot of an
                                               environment. These snapshots are usually taken when the environment
                                               is in a stable configuration, with no viruses or malware active. This is
                                               obviously a boon to any user of a system, especially when they are in the
                                               process of installing and configuring unknown software or immature
                                               software. If the software installation fails, the user can restore back to
                                               the previous snapshot and the user doesn’t have to worry about whether
                                               the failed install correctly deleted any temporary files and removed any
                                               extraneous registry Key. In addition, the saved environments can be
                                               burned to a CD or stored in a tape backup system. This allows the
                                               saved environment to be physically located off-site in case of disaster.

                                               Developers can benefit from this feature as much as anyone else, as
                                               they often install applications which might be charitably called
                                               “immature”. If any of these applications spawn memory leaks or worms
                                               or accidentally cause operating system problems, the developer is
                                               secure in the fact that his system is easily restored.

                                               Demonstrators usually don’t have to worry about unexpected changes to
                                               their systems, so their dependence on this feature can be minimal. But
                                               there is one aspect of this feature which can be a great benefit to them.
                                               Sometimes demonstrations of a product include “destructive” changes.
                                               For example, if the demonstration calls for certain data to be removed
                                               from the database, either to show that the commands work properly, or
                                               to demonstrate the products ability to handle loss of data. In this case,
                                               the ability to easily restore an environment becomes a demonstrator’s
                                               best friend. The demonstrator simply restores the environment to the
                                               point it was before the demonstration began, and he’s ready for the next
                                               demonstration.

                                               Home users can benefit from this if their network isn’t that secure, or if
                                               they have a habit of downloading “questionable” files which might contain
                                               viruses or other malware. Or if they share their computers with kids who
                                               might not be as responsible with their computer usage as they should be.
                                                
                                                


 




www.partnersconsulting.com | 1(866) 736.5500
           
 

                                                                                                                      

     

    WHITE PAGE
 




           
                                               Ability to Share Saved Environments 
                                                
                                               VMwares snapshots have almost universal portability.      Since the
                                               virtualization client handles interfaces to hardware elements and
                                               peripherals, the shares can be moved from computer to computer with
                                               very few portability problems. This can be helpful to users in many
                                               ways.

                                               Developers can use these saved environments for knowledge
                                               management purposes. If the developer is moved from an application
                                               and another developer takes over, the first developer can give the new
                                               developer a snapshot of his current environment and the new developer
                                               would be up and running immediately. Also, these saved environments
                                               can be stored, so that if a developer is inactive on a project for a long
                                               time, and then has to go back to that project (for example, if the client
                                               elects to pay for an additional phase of implementation), he can easily
                                               restore the environment to exactly where he was when the previous
                                               phase was completed.

                                               The developer can create demonstration environments that he can then
                                               hand off to the demonstrators and sales people to use, secure in the
                                               knowledge that these demonstration environments will work. And, if the
                                               company uses Independent Validation and Verification, then the
                                               developer can provide the testers with an environment that they can
                                               easily test on.    One that the developers are confident is valid and
                                               doesn’t contain inconsistencies from the development environment or the
                                               production environments.       Demonstrators themselves can share
                                               environments to allow the same presentations to be made in different
                                               places at the same time.

                                               Home users don’t have as many reasons to share environments. There
                                               are some users who routinely setup other people’s machines and would
                                               probably love to be able to use VM ware to quickly install a working
                                               environment as easily as installing a VM, but until VMWare is widely
                                               used by home users, such a thing probably won’t happen.
                                                
                                                

                                                

                                                
 




www.partnersconsulting.com | 1(866) 736.5500
           
 

                                                                                                                         

     

    WHITE PAGE
 




           
                                               Disadvantages and Limitations 
                                                
                                               Virtualization is not the be all and end all of computing, and there are
                                               limitations to its abilities. One limitation is that a user can only run so
                                               many independent VM’s on his desktop before the whole thing starts
                                               running very slowly. Because each virtual machine acts and thinks like
                                               its own separate machine, it can quickly eat up all of the available cycles,
                                               especially on an older machine or a cheaper machine with fewer
                                               capabilities. It obviously runs best on machines with multiple processors,
                                               and requires lots of RAM and quite a bit of HD space. For the home
                                               user, there are certain graphic intensive games that might not run on it or
                                               might not run well on it. But with new computers getting faster and more
                                               powerful every day, virtualization becomes a viable option for many
                                               people who would otherwise never be able to afford multiple computers.


                                               Conclusion 
                                                
                                                          In conclusion there are many situations where virtualization is
                                               not only appropriate, but can be a great time-saver to developers,
                                               application demonstrators and salesmen, and even the advanced home
                                               user. Virtualization does require the latest hardware, though, so it is not
                                               something to be used lightly, but properly utilized, it can provide
                                               flexibility, security, and convenience to these types of users. As laptop
                                               and desktop computers become faster, and gain more and more
                                               processers and more and more hard disk space, virtualization suffers
                                               fewer and fewer limitations on its ability and users can get more and
                                               more out of having the ability to host multiple environments on their
                                               single computer.




 




www.partnersconsulting.com | 1(866) 736.5500
           

Contenu connexe

Tendances

Ws 2012 feature comparison hyper v
Ws 2012 feature comparison hyper vWs 2012 feature comparison hyper v
Ws 2012 feature comparison hyper vRamakrishnan M
 
Microsoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows WhitepaperMicrosoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows WhitepaperMicrosoft Private Cloud
 
CloudBees Toronto Presentation
CloudBees Toronto PresentationCloudBees Toronto Presentation
CloudBees Toronto PresentationXebiaLabs
 
Softchoice Webinar Series: VMware vSphere 5.1 Changes
Softchoice Webinar Series: VMware vSphere 5.1 ChangesSoftchoice Webinar Series: VMware vSphere 5.1 Changes
Softchoice Webinar Series: VMware vSphere 5.1 ChangesSoftchoice Corporation
 
Virtualizing Testbeds For Fun And Profit
Virtualizing Testbeds For Fun And ProfitVirtualizing Testbeds For Fun And Profit
Virtualizing Testbeds For Fun And Profitmatthew.maisel
 
Phdvb citrix-datasheet
Phdvb citrix-datasheetPhdvb citrix-datasheet
Phdvb citrix-datasheethi_deep990
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing Priti Banya Mohanty
 
Microsoft and Open Source Interoperability
Microsoft and Open Source InteroperabilityMicrosoft and Open Source Interoperability
Microsoft and Open Source Interoperabilityguest82d216
 
09 intel v_tune_session_13
09 intel v_tune_session_1309 intel v_tune_session_13
09 intel v_tune_session_13Niit Care
 
Virtualize All The Things!
Virtualize All The Things!Virtualize All The Things!
Virtualize All The Things!Sparkhound Inc.
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayObserveIT
 
Virtualize All the Things!
Virtualize All the Things!Virtualize All the Things!
Virtualize All the Things!David Pechon
 
Scale11x : Virtualization with Xen and XCP
Scale11x : Virtualization with Xen and XCPScale11x : Virtualization with Xen and XCP
Scale11x : Virtualization with Xen and XCPLars Kurth
 
Comp tia n+_session_09
Comp tia n+_session_09Comp tia n+_session_09
Comp tia n+_session_09Niit Care
 

Tendances (20)

Ws 2012 feature comparison hyper v
Ws 2012 feature comparison hyper vWs 2012 feature comparison hyper v
Ws 2012 feature comparison hyper v
 
Microsoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows WhitepaperMicrosoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows Whitepaper
 
XS Japan 2008 Ganeti English
XS Japan 2008 Ganeti EnglishXS Japan 2008 Ganeti English
XS Japan 2008 Ganeti English
 
CloudBees Toronto Presentation
CloudBees Toronto PresentationCloudBees Toronto Presentation
CloudBees Toronto Presentation
 
Softchoice Webinar Series: VMware vSphere 5.1 Changes
Softchoice Webinar Series: VMware vSphere 5.1 ChangesSoftchoice Webinar Series: VMware vSphere 5.1 Changes
Softchoice Webinar Series: VMware vSphere 5.1 Changes
 
Virtualizing Testbeds For Fun And Profit
Virtualizing Testbeds For Fun And ProfitVirtualizing Testbeds For Fun And Profit
Virtualizing Testbeds For Fun And Profit
 
Phdvb citrix-datasheet
Phdvb citrix-datasheetPhdvb citrix-datasheet
Phdvb citrix-datasheet
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
 
Microsoft and Open Source Interoperability
Microsoft and Open Source InteroperabilityMicrosoft and Open Source Interoperability
Microsoft and Open Source Interoperability
 
Ian Pratt Usenix 08 Keynote
Ian Pratt Usenix 08 KeynoteIan Pratt Usenix 08 Keynote
Ian Pratt Usenix 08 Keynote
 
09 intel v_tune_session_13
09 intel v_tune_session_1309 intel v_tune_session_13
09 intel v_tune_session_13
 
Nakajima numa-final
Nakajima numa-finalNakajima numa-final
Nakajima numa-final
 
All Virtual All The Time
All Virtual All The TimeAll Virtual All The Time
All Virtual All The Time
 
Virtualize All The Things!
Virtualize All The Things!Virtualize All The Things!
Virtualize All The Things!
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI Gateway
 
Virtualize All the Things!
Virtualize All the Things!Virtualize All the Things!
Virtualize All the Things!
 
Scale11x : Virtualization with Xen and XCP
Scale11x : Virtualization with Xen and XCPScale11x : Virtualization with Xen and XCP
Scale11x : Virtualization with Xen and XCP
 
Introduction to Virtual Desktop Architectures
Introduction to Virtual Desktop ArchitecturesIntroduction to Virtual Desktop Architectures
Introduction to Virtual Desktop Architectures
 
XS Boston 2008 Fault Tolerance
XS Boston 2008 Fault ToleranceXS Boston 2008 Fault Tolerance
XS Boston 2008 Fault Tolerance
 
Comp tia n+_session_09
Comp tia n+_session_09Comp tia n+_session_09
Comp tia n+_session_09
 

En vedette (20)

Quality stories october
Quality stories  octoberQuality stories  october
Quality stories october
 
Selectivitat10
Selectivitat10Selectivitat10
Selectivitat10
 
Pr writing top ten
Pr writing  top tenPr writing  top ten
Pr writing top ten
 
Endocrinology
EndocrinologyEndocrinology
Endocrinology
 
Interactive Marketing 2010
Interactive Marketing 2010Interactive Marketing 2010
Interactive Marketing 2010
 
Parkour
ParkourParkour
Parkour
 
Quality stories - september
Quality stories - septemberQuality stories - september
Quality stories - september
 
Hall of fame feb
Hall of fame   febHall of fame   feb
Hall of fame feb
 
C:\fakepath\cd difference powerpoint 2010 updated.gae
C:\fakepath\cd difference powerpoint 2010 updated.gaeC:\fakepath\cd difference powerpoint 2010 updated.gae
C:\fakepath\cd difference powerpoint 2010 updated.gae
 
P1150803001
P1150803001P1150803001
P1150803001
 
P1111146023
P1111146023P1111146023
P1111146023
 
The element of art
The element of artThe element of art
The element of art
 
Ryan's photo slide
Ryan's photo slideRyan's photo slide
Ryan's photo slide
 
Acorde
AcordeAcorde
Acorde
 
Gran Feria de la Belleza
Gran Feria de la BellezaGran Feria de la Belleza
Gran Feria de la Belleza
 
E.C.G. Part 4
E.C.G. Part 4E.C.G. Part 4
E.C.G. Part 4
 
Cash balance & hybrid plans final & proposed reg
Cash balance & hybrid plans   final & proposed regCash balance & hybrid plans   final & proposed reg
Cash balance & hybrid plans final & proposed reg
 
3º treball psico
3º treball psico3º treball psico
3º treball psico
 
Futbol braulio
Futbol braulioFutbol braulio
Futbol braulio
 
The year you where born
The year you where bornThe year you where born
The year you where born
 

Similaire à Hosted Virtualization

Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxVivek Shelke
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...Neha417639
 
Virtulization
VirtulizationVirtulization
VirtulizationAntu Sabu
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityBooz Allen Hamilton
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxZarwashgulrez
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxKelvinBakespear
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computingMayank Aggarwal
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docxshruti533256
 
virtualization system basic introduction
virtualization system basic introductionvirtualization system basic introduction
virtualization system basic introductionBadriHjSidek1
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxXanGwaps
 
Virtualization
VirtualizationVirtualization
Virtualizationvishnurk
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.rajNRajaMohanReddy
 
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...IJNSA Journal
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 

Similaire à Hosted Virtualization (20)

Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
Virtulization
VirtulizationVirtulization
Virtulization
 
Dz25764770
Dz25764770Dz25764770
Dz25764770
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization Security
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
 
VSS LEC5.pdf
VSS LEC5.pdfVSS LEC5.pdf
VSS LEC5.pdf
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
 
Virtualization
Virtualization Virtualization
Virtualization
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
 
virtualization system basic introduction
virtualization system basic introductionvirtualization system basic introduction
virtualization system basic introduction
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
 
Virtualization Approach: Theory and Application
Virtualization Approach: Theory and ApplicationVirtualization Approach: Theory and Application
Virtualization Approach: Theory and Application
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.raj
 
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Hosted Virtualization

  • 1.       WHITE PAGE     Virtualization for Non-Hosted Applications Introduction    Virtualization is the concept of using a program (the most popular is called VMware) to allow one computer to “host” other computers on it. These virtual computers, or virtual machines, can run applications simultaneously with each other and with the host machine. The program shares the host computer’s hardware and peripherals with each virtual machine, so that each virtual machine acts as its own computer. Historically, virtualization has been confined to the realm of large scale servers and other hosted solutions. With faster and more efficient desktops and laptops, which boast as much memory as servers did only a few years ago, it is now possible to use virtualization outside of the realm of hosted solutions and large scale server farms. Virtualization has three major features: the fact that you can run multiple environments on the same machine, the fact that you can take a snapshot of an environment, save it, and restore back to that snapshot extremely easily, and the fact that the snapshots are hardware independent, allowing them to be shared between computers, even if those computers have different hardware and peripherals. Use of Multiple Environments on one Machine    One of the prime advantages of Virtualization is the ability for one machine to act as a host to multiple additional environments. These environments are completely separate from one another. There is no file system overlap, no memory overlap, and the environments need not even be the same operating system or the same type of operating system. A Windows XP box can be used to host a Virtualized Linux server, or a Windows Vista installation, or even something older, like a Windows NT 4.0 installation.   www.partnersconsulting.com | 1(866) 736.5500  
  • 2.       WHITE PAGE     For a developer, this aspect can be utilized to create any number of test environments for their applications. Without it, the user would either have to have dozens of extra computers, or spend the time and effort to install from scratch multiple operating systems, just to do his testing on. This could take days or even weeks, time which few developers have. If a developer is working on multiple applications, then he can use virtualization to keep Figure 1  Virtualization can be used to maintain  his application development separate security connections to different apps  environments on separate simultaneously  machines, reducing the possibility of conflict between them. If that developer is working remotely, he may have firewall or other security concerns for logging into remote client sites. These security restraints can often cause conflicts if he tries to maintain more than one on the same computer. Virtualization solves this problem by separating the security systems into each individual environment. For a salesperson or demonstrator, it allows his single laptop to act like a multitude of servers, displaying how the application would work if it utilized all of these separate servers for its enterprise, or it can show different versions of the application, or even different localizations. In addition, it can be used to display multiple applications, each one operating independently on its own machine. For the home user, virtualization can be used to create environments which would otherwise be unavailable for specific applications. For example, a Macintosh user can utilize VMware to create a Windows XP VM and then use that machine to play certain Windows-only games on it. The same can be done with a user who operates a Linux workstation. In addition, a home user who wishes to learn more about Linux operation and administration can setup a Linux VM on his Windows box, without having to perform dual booting or re-partitioning of his hard drive. But that’s only one feature of Virtualization.   www.partnersconsulting.com | 1(866) 736.5500  
  • 3.       WHITE PAGE     Ability to Easily Save and Restore Environments     VMware is one of the software packages available to perform virtualization. One of its features is the ability to take a snapshot of an environment. These snapshots are usually taken when the environment is in a stable configuration, with no viruses or malware active. This is obviously a boon to any user of a system, especially when they are in the process of installing and configuring unknown software or immature software. If the software installation fails, the user can restore back to the previous snapshot and the user doesn’t have to worry about whether the failed install correctly deleted any temporary files and removed any extraneous registry Key. In addition, the saved environments can be burned to a CD or stored in a tape backup system. This allows the saved environment to be physically located off-site in case of disaster. Developers can benefit from this feature as much as anyone else, as they often install applications which might be charitably called “immature”. If any of these applications spawn memory leaks or worms or accidentally cause operating system problems, the developer is secure in the fact that his system is easily restored. Demonstrators usually don’t have to worry about unexpected changes to their systems, so their dependence on this feature can be minimal. But there is one aspect of this feature which can be a great benefit to them. Sometimes demonstrations of a product include “destructive” changes. For example, if the demonstration calls for certain data to be removed from the database, either to show that the commands work properly, or to demonstrate the products ability to handle loss of data. In this case, the ability to easily restore an environment becomes a demonstrator’s best friend. The demonstrator simply restores the environment to the point it was before the demonstration began, and he’s ready for the next demonstration. Home users can benefit from this if their network isn’t that secure, or if they have a habit of downloading “questionable” files which might contain viruses or other malware. Or if they share their computers with kids who might not be as responsible with their computer usage as they should be.       www.partnersconsulting.com | 1(866) 736.5500  
  • 4.       WHITE PAGE     Ability to Share Saved Environments    VMwares snapshots have almost universal portability. Since the virtualization client handles interfaces to hardware elements and peripherals, the shares can be moved from computer to computer with very few portability problems. This can be helpful to users in many ways. Developers can use these saved environments for knowledge management purposes. If the developer is moved from an application and another developer takes over, the first developer can give the new developer a snapshot of his current environment and the new developer would be up and running immediately. Also, these saved environments can be stored, so that if a developer is inactive on a project for a long time, and then has to go back to that project (for example, if the client elects to pay for an additional phase of implementation), he can easily restore the environment to exactly where he was when the previous phase was completed. The developer can create demonstration environments that he can then hand off to the demonstrators and sales people to use, secure in the knowledge that these demonstration environments will work. And, if the company uses Independent Validation and Verification, then the developer can provide the testers with an environment that they can easily test on. One that the developers are confident is valid and doesn’t contain inconsistencies from the development environment or the production environments. Demonstrators themselves can share environments to allow the same presentations to be made in different places at the same time. Home users don’t have as many reasons to share environments. There are some users who routinely setup other people’s machines and would probably love to be able to use VM ware to quickly install a working environment as easily as installing a VM, but until VMWare is widely used by home users, such a thing probably won’t happen.           www.partnersconsulting.com | 1(866) 736.5500  
  • 5.       WHITE PAGE     Disadvantages and Limitations    Virtualization is not the be all and end all of computing, and there are limitations to its abilities. One limitation is that a user can only run so many independent VM’s on his desktop before the whole thing starts running very slowly. Because each virtual machine acts and thinks like its own separate machine, it can quickly eat up all of the available cycles, especially on an older machine or a cheaper machine with fewer capabilities. It obviously runs best on machines with multiple processors, and requires lots of RAM and quite a bit of HD space. For the home user, there are certain graphic intensive games that might not run on it or might not run well on it. But with new computers getting faster and more powerful every day, virtualization becomes a viable option for many people who would otherwise never be able to afford multiple computers. Conclusion    In conclusion there are many situations where virtualization is not only appropriate, but can be a great time-saver to developers, application demonstrators and salesmen, and even the advanced home user. Virtualization does require the latest hardware, though, so it is not something to be used lightly, but properly utilized, it can provide flexibility, security, and convenience to these types of users. As laptop and desktop computers become faster, and gain more and more processers and more and more hard disk space, virtualization suffers fewer and fewer limitations on its ability and users can get more and more out of having the ability to host multiple environments on their single computer.   www.partnersconsulting.com | 1(866) 736.5500