SlideShare a Scribd company logo
1 of 15
Download to read offline
VIRTUALIZATION
TECHNOLOGY
INTRODUCTION
Virtualization is technology that allows you to create multiple simulated environments or
dedicated resources from a single, physical hardware system.
Creation of a virtual -- rather than actual -- version of something, such as an operating
system, a server, a storage device or network resources.
VIRTUALIZATION
Virtualization refers to Abstraction of the computer resources.
It refers to creation of a virtual resources such as server, file or network
CONCEPT OF VIRTUALIZATION
Virtualization describes a technology in which an application, guest operating
system or data storage is abstracted away from the true underlying hardware or
software.
A great example of how virtualization works in your daily life is the separation of your hard drive
into different parts. It started as the ability to run multiple operating systems on one hardware set
and now it is a vital part of testing and cloud-based computing.
WHY?
❏ Isolation among users
❏ Resource sharing
❏ Dynamical resources
❏ Aggregation of resources
IS IT SECURE?
► Virtualization is an elegant solution to many common security problems.
► In a development environment, each developer can have their own sandbox,
immune from another developer’s rogue or runaway code.
► When VMs and applications are properly isolated, only one application on one OS is
affected by an attack.
HOW IT WORKS?
● Virtualization software makes it possible to run multiple operating systems and multiple
applications on the same server at the same time” – Mike Adams, VMware
● Provide applications with the standard versions to their cloud users.
● Normally in the cloud computing, users share the data present in the clouds like application
Virtualization users share the Infrastructure.
SECURITY
● Security is one of the important concerns.
● Prevents unauthorised access.
● Protection from Harmful viruses and Cyber threats.
● Encryption process:
It takes place with protocols which will protect the data from other threats.
ECONOMICAL
● Saves the cost for a physical system such as hardware and servers.
● Stores Data in Virtual server.
● Reduces the wastage, decreases the electricity bills.
FLEXIBLE OPERATIONS
● The network switch implemented today is very easy to use, flexible and saves time.
● It eliminates the problem of recovering the data from crashed or corrupted devices and hence
saves time.
FLEXIBLE DATA TRANSFER
● The data can transfer to the virtual server and retrieve anytime.
● Easy to locate the required data and transfer them.
● Additional storage is provided.
ELIMINATES RISK OF SYSTEM FAILURE
● Failure can cause damage to the company but the virtualizations help you to perform
the same task in multiple devices at the same time.
● Even if a server crashes with the help of the second server the customer can access the data.
THANK YOU

More Related Content

What's hot

What is VDI And How Does It Work
What is VDI And How Does It WorkWhat is VDI And How Does It Work
What is VDI And How Does It WorkACECloudHosting1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingpradeepfdo
 
Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Chris Evans
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsVaibhav Khanna
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud ComputingJIM MUKERJEE
 
Cloud-computing part 1
Cloud-computing part 1Cloud-computing part 1
Cloud-computing part 1pallavi_gaurav
 
Hybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo TheaterHybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo TheaterJoe Conlin
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)Rohit Jain
 
The Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & OpinionsThe Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & OpinionsResolver Inc.
 
Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)PT Datacomm Diangraha
 
Virtualisation advances for teaching and research
Virtualisation advances for teaching and researchVirtualisation advances for teaching and research
Virtualisation advances for teaching and researchMichael Rees
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
Your Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to KnowYour Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to KnowResolver Inc.
 
Architecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingArchitecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingIndicThreads
 
Extend enterprise backup sheet
Extend enterprise backup sheetExtend enterprise backup sheet
Extend enterprise backup sheetJustin Trent
 

What's hot (20)

What is VDI And How Does It Work
What is VDI And How Does It WorkWhat is VDI And How Does It Work
What is VDI And How Does It Work
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concerns
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud Computing
 
Cloud-computing part 1
Cloud-computing part 1Cloud-computing part 1
Cloud-computing part 1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Let's talk CLOUD!
Let's talk CLOUD!Let's talk CLOUD!
Let's talk CLOUD!
 
Expedient Pyramid
Expedient Pyramid Expedient Pyramid
Expedient Pyramid
 
Hybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo TheaterHybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
 
The Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & OpinionsThe Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & Opinions
 
Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)
 
Virtualisation advances for teaching and research
Virtualisation advances for teaching and researchVirtualisation advances for teaching and research
Virtualisation advances for teaching and research
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
Your Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to KnowYour Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to Know
 
Architecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingArchitecture Challenges In Cloud Computing
Architecture Challenges In Cloud Computing
 
Virtual environment
Virtual environmentVirtual environment
Virtual environment
 
Extend enterprise backup sheet
Extend enterprise backup sheetExtend enterprise backup sheet
Extend enterprise backup sheet
 

Similar to VIRTUALIZATION TECHNOLOGY

virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxXanGwaps
 
Cloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerCloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerFadly Rizal Ahmad Fadzil
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyDeep Ranjan Deb
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing Priti Banya Mohanty
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulizationAJIT NEGI
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxGauravPandey43518
 
Cloud computing
Cloud computingCloud computing
Cloud computingprasanth82
 
Cloud computing
Cloud computingCloud computing
Cloud computingwaghu
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxDeepikaPardeshi1
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
Cloud computing by shashank
Cloud computing by shashankCloud computing by shashank
Cloud computing by shashankShashank Shekhar
 

Similar to VIRTUALIZATION TECHNOLOGY (20)

virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
 
Cloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerCloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to Server
 
cloude computing
cloude computingcloude computing
cloude computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Cloudcpmuting journal
Cloudcpmuting journalCloudcpmuting journal
Cloudcpmuting journal
 
Cloud.pptx
Cloud.pptxCloud.pptx
Cloud.pptx
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptx
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Cloud computing by shashank
Cloud computing by shashankCloud computing by shashank
Cloud computing by shashank
 

More from RohitK71

Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsRohitK71
 
Negotiation
Negotiation Negotiation
Negotiation RohitK71
 
QUEUEING NETWORKS
QUEUEING NETWORKSQUEUEING NETWORKS
QUEUEING NETWORKSRohitK71
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTINGRohitK71
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCERohitK71
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminarRohitK71
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigmsRohitK71
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handlingRohitK71
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)RohitK71
 
Usp message queues
Usp message queuesUsp message queues
Usp message queuesRohitK71
 

More from RohitK71 (11)

Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellations
 
Negotiation
Negotiation Negotiation
Negotiation
 
QUEUEING NETWORKS
QUEUEING NETWORKSQUEUEING NETWORKS
QUEUEING NETWORKS
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTING
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCE
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminar
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigms
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handling
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
 
Usp message queues
Usp message queuesUsp message queues
Usp message queues
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

VIRTUALIZATION TECHNOLOGY

  • 2. INTRODUCTION Virtualization is technology that allows you to create multiple simulated environments or dedicated resources from a single, physical hardware system. Creation of a virtual -- rather than actual -- version of something, such as an operating system, a server, a storage device or network resources.
  • 3. VIRTUALIZATION Virtualization refers to Abstraction of the computer resources. It refers to creation of a virtual resources such as server, file or network
  • 4. CONCEPT OF VIRTUALIZATION Virtualization describes a technology in which an application, guest operating system or data storage is abstracted away from the true underlying hardware or software. A great example of how virtualization works in your daily life is the separation of your hard drive into different parts. It started as the ability to run multiple operating systems on one hardware set and now it is a vital part of testing and cloud-based computing.
  • 5. WHY? ❏ Isolation among users ❏ Resource sharing ❏ Dynamical resources ❏ Aggregation of resources
  • 6. IS IT SECURE? ► Virtualization is an elegant solution to many common security problems. ► In a development environment, each developer can have their own sandbox, immune from another developer’s rogue or runaway code. ► When VMs and applications are properly isolated, only one application on one OS is affected by an attack.
  • 7. HOW IT WORKS? ● Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same time” – Mike Adams, VMware ● Provide applications with the standard versions to their cloud users. ● Normally in the cloud computing, users share the data present in the clouds like application Virtualization users share the Infrastructure.
  • 8.
  • 9. SECURITY ● Security is one of the important concerns. ● Prevents unauthorised access. ● Protection from Harmful viruses and Cyber threats. ● Encryption process: It takes place with protocols which will protect the data from other threats.
  • 10. ECONOMICAL ● Saves the cost for a physical system such as hardware and servers. ● Stores Data in Virtual server. ● Reduces the wastage, decreases the electricity bills.
  • 11. FLEXIBLE OPERATIONS ● The network switch implemented today is very easy to use, flexible and saves time. ● It eliminates the problem of recovering the data from crashed or corrupted devices and hence saves time.
  • 12. FLEXIBLE DATA TRANSFER ● The data can transfer to the virtual server and retrieve anytime. ● Easy to locate the required data and transfer them. ● Additional storage is provided.
  • 13. ELIMINATES RISK OF SYSTEM FAILURE ● Failure can cause damage to the company but the virtualizations help you to perform the same task in multiple devices at the same time. ● Even if a server crashes with the help of the second server the customer can access the data.
  • 14.