SlideShare a Scribd company logo
Virtualization
Sohrab Monfared
Linux Professional Institute Certified
IT Administrator, Security Consultant, Instructor
@CentreICT
What is it?
●
At its simplest level, virtualization allows you,
virtually and cost-effectively, to have two or
more virtual computing environments, running
different operating systems and applications on
one piece of hardware.
●
Virtualization is also designed to enable a
generation of more energy-efficient computing.
What Does Virtualization
Deliver?
●
Consolidate workloads to reduce hardware,
power, and space requirements.
●
Run multiple operating systems simultaneously
as an enterprise upgrade path, or to leverage
the advantages of specific operating systems,
or for whatever reason you can imagine.
What Does Virtualization
Deliver?
●
Run legacy software on newer, more reliable,
and more power-efficient hardware.
●
Dynamically migrate workloads to provide fault
tolerance.
●
Provide redundancy to support disaster
recovery.
Why Virtualization ?
●
Reduce the Total Cost of Ownership (TCO).
●
Lowering the Operating Expenses (OPEX),
such as energy costs.
●
Save on capital expenditures for new server
equipment.
●
Provision new systems faster by building
standard server operating system images.
Consolidation: A real-world example
●
Replacing 100 Sun Fire V880 systems running
Oracle Solaris 8 with 17 Sun SPARC Enterprise
T5240s systems running Oracle Solaris 10:
– Reduced space: 100 V880s require 50 data center
racks, whereas 17 T5240s can fit in a single rack.
– Approximately 660,000 BTUs of heat generation
would be removed from the data center.
– Approximately $200,000 would be saved in electricity
costs per year (ignoring the cost of cooling).
Goal or Destination
None of them!
●
Virtualization isnot a goalby itself.
●
Virtualization is a means to the strategic goal
of enabling services-based IT in the enterprise
It is a journey —not a destination.
Hypervisor – Host - Guest
●
A hypervisor or Virtual Machine Monitor (VMM)
is a piece of computer software, firmware or
hardware that creates and runs virtual
machines.
●
A computer on which a hypervisor is running
one or more virtual machines is defined as a
host machine. Each virtual machine is called a
guest machine.
Type vs Type
●
Type 1 (or native, bare metal) hypervisors run directly
on the host's hardware to control the hardware and to
manage guest operating systems. A guest operating-
system thus runs on another level above the
hypervisor.
●
Type 2 (or hosted) hypervisors run within a
conventional operating-system environment. With the
hypervisor layer as a distinct second software level,
guest operating-systems run at the third level above
the hardware.
Types explained
That's all ?
Technically no !
It's Q/A Time !

More Related Content

What's hot

Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
Ahmad Hafeezi
 
Virtualization virtues
Virtualization virtuesVirtualization virtues
Virtualization virtues
Julie Chung
 
CloudSigma 101
CloudSigma 101CloudSigma 101
CloudSigma 101
CloudSigma
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
elliando dias
 
Implementation of affordable computing using virtualization Gargee S Hiray
Implementation of affordable computing using virtualization Gargee S HirayImplementation of affordable computing using virtualization Gargee S Hiray
Implementation of affordable computing using virtualization Gargee S Hiray
Gargee Hiray
 
Throughput oriented aarchitectures
Throughput oriented aarchitecturesThroughput oriented aarchitectures
Throughput oriented aarchitectures
Nomy059
 
Cloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisationCloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisation
Vaibhav Khanna
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.raj
NRajaMohanReddy
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
sagaroceanic11
 
Virtualization
VirtualizationVirtualization
Virtualization
Kamal Chauhan
 
Platform Virtualization
Platform VirtualizationPlatform Virtualization
Platform Virtualization
/ /
 
Virtualisation basics
Virtualisation basicsVirtualisation basics
Virtualisation basics
sagaroceanic11
 
Deco1
Deco1Deco1
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm ware
Yeditepe University
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
Israel Marcus
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
Akhilesh Jha
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mware
sagaroceanic11
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
Mayank Aggarwal
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
Dr.Neeraj Kumar Pandey
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
Alessandro Guli
 

What's hot (20)

Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Virtualization virtues
Virtualization virtuesVirtualization virtues
Virtualization virtues
 
CloudSigma 101
CloudSigma 101CloudSigma 101
CloudSigma 101
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Implementation of affordable computing using virtualization Gargee S Hiray
Implementation of affordable computing using virtualization Gargee S HirayImplementation of affordable computing using virtualization Gargee S Hiray
Implementation of affordable computing using virtualization Gargee S Hiray
 
Throughput oriented aarchitectures
Throughput oriented aarchitecturesThroughput oriented aarchitectures
Throughput oriented aarchitectures
 
Cloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisationCloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisation
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.raj
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Platform Virtualization
Platform VirtualizationPlatform Virtualization
Platform Virtualization
 
Virtualisation basics
Virtualisation basicsVirtualisation basics
Virtualisation basics
 
Deco1
Deco1Deco1
Deco1
 
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm ware
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mware
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
 

Viewers also liked

Как заработать деньги на своем сайте?
Как заработать деньги на своем сайте?Как заработать деньги на своем сайте?
Как заработать деньги на своем сайте?
E-Journal ICT4D
 
Learning management system
Learning management systemLearning management system
Learning management system
E-Journal ICT4D
 
Информационная безопасность в аспекте веб-разработки
Информационная безопасность в аспекте веб-разработкиИнформационная безопасность в аспекте веб-разработки
Информационная безопасность в аспекте веб-разработки
E-Journal ICT4D
 
Information Security
Information SecurityInformation Security
Information Security
E-Journal ICT4D
 
Управление проектом и ИКТР Учебное пособие по ИКТ для Развития для Вузов
Управление проектом и ИКТР Учебное пособие по ИКТ для Развития для ВузовУправление проектом и ИКТР Учебное пособие по ИКТ для Развития для Вузов
Управление проектом и ИКТР Учебное пособие по ИКТ для Развития для Вузов
E-Journal ICT4D
 
Программное обеспечение в государственных учреждениях
Программное обеспечение в государственных учрежденияхПрограммное обеспечение в государственных учреждениях
Программное обеспечение в государственных учреждениях
E-Journal ICT4D
 

Viewers also liked (7)

Как заработать деньги на своем сайте?
Как заработать деньги на своем сайте?Как заработать деньги на своем сайте?
Как заработать деньги на своем сайте?
 
Learning management system
Learning management systemLearning management system
Learning management system
 
Информационная безопасность в аспекте веб-разработки
Информационная безопасность в аспекте веб-разработкиИнформационная безопасность в аспекте веб-разработки
Информационная безопасность в аспекте веб-разработки
 
Jafar urunov
Jafar urunovJafar urunov
Jafar urunov
 
Information Security
Information SecurityInformation Security
Information Security
 
Управление проектом и ИКТР Учебное пособие по ИКТ для Развития для Вузов
Управление проектом и ИКТР Учебное пособие по ИКТ для Развития для ВузовУправление проектом и ИКТР Учебное пособие по ИКТ для Развития для Вузов
Управление проектом и ИКТР Учебное пособие по ИКТ для Развития для Вузов
 
Программное обеспечение в государственных учреждениях
Программное обеспечение в государственных учрежденияхПрограммное обеспечение в государственных учреждениях
Программное обеспечение в государственных учреждениях
 

Similar to Virtualization

Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
Binod Rimal
 
Virtualization
VirtualizationVirtualization
Virtualization
kousardiffi
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
Neha417639
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Rishikese MR
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
Anilkumarbehera16
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
Logicalis
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
Logicalis
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
Selvaraj Kesavan
 
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
Editor IJCATR
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
NIKHILKUMAR SHARDOOR
 
Sna lab prj (1)
Sna lab prj (1)Sna lab prj (1)
Sna lab prj (1)
alihaider922341
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
hktripathy
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravym456
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
Vivek Shelke
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
AkshithaReddy42848
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
Soumyajit Basu
 
Adaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin OrchestrateAdaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin Orchestrate
Novell
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
AJIT NEGI
 
Virtualization
VirtualizationVirtualization
Virtualization
vishnurk
 

Similar to Virtualization (20)

Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
 
Virtualization
VirtualizationVirtualization
Virtualization
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Sna lab prj (1)
Sna lab prj (1)Sna lab prj (1)
Sna lab prj (1)
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
Adaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin OrchestrateAdaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin Orchestrate
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Virtualization
VirtualizationVirtualization
Virtualization
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Virtualization

  • 1. Virtualization Sohrab Monfared Linux Professional Institute Certified IT Administrator, Security Consultant, Instructor @CentreICT
  • 2. What is it? ● At its simplest level, virtualization allows you, virtually and cost-effectively, to have two or more virtual computing environments, running different operating systems and applications on one piece of hardware. ● Virtualization is also designed to enable a generation of more energy-efficient computing.
  • 3. What Does Virtualization Deliver? ● Consolidate workloads to reduce hardware, power, and space requirements. ● Run multiple operating systems simultaneously as an enterprise upgrade path, or to leverage the advantages of specific operating systems, or for whatever reason you can imagine.
  • 4. What Does Virtualization Deliver? ● Run legacy software on newer, more reliable, and more power-efficient hardware. ● Dynamically migrate workloads to provide fault tolerance. ● Provide redundancy to support disaster recovery.
  • 5. Why Virtualization ? ● Reduce the Total Cost of Ownership (TCO). ● Lowering the Operating Expenses (OPEX), such as energy costs. ● Save on capital expenditures for new server equipment. ● Provision new systems faster by building standard server operating system images.
  • 6. Consolidation: A real-world example ● Replacing 100 Sun Fire V880 systems running Oracle Solaris 8 with 17 Sun SPARC Enterprise T5240s systems running Oracle Solaris 10: – Reduced space: 100 V880s require 50 data center racks, whereas 17 T5240s can fit in a single rack. – Approximately 660,000 BTUs of heat generation would be removed from the data center. – Approximately $200,000 would be saved in electricity costs per year (ignoring the cost of cooling).
  • 7. Goal or Destination None of them! ● Virtualization isnot a goalby itself. ● Virtualization is a means to the strategic goal of enabling services-based IT in the enterprise It is a journey —not a destination.
  • 8. Hypervisor – Host - Guest ● A hypervisor or Virtual Machine Monitor (VMM) is a piece of computer software, firmware or hardware that creates and runs virtual machines. ● A computer on which a hypervisor is running one or more virtual machines is defined as a host machine. Each virtual machine is called a guest machine.
  • 9. Type vs Type ● Type 1 (or native, bare metal) hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems. A guest operating- system thus runs on another level above the hypervisor. ● Type 2 (or hosted) hypervisors run within a conventional operating-system environment. With the hypervisor layer as a distinct second software level, guest operating-systems run at the third level above the hardware.