The document discusses infrastructure virtualization and cloud solutions. It defines virtualization as the creation of virtual versions of hardware platforms, operating systems, storage devices, and network resources. It describes how desktops, servers, networks, storage, and applications can be virtualized. It outlines some advantages and limitations of desktop virtualization, server virtualization, network virtualization, and storage virtualization. It also discusses application virtualization and different cloud service and deployment models. In conclusion, the document notes that cloud computing provides benefits but also risks that can be managed.
A discussion of the risks of cloud computing. While the cloud has compelling benefits, we need to evaluate and mitigate the risks - this presentation identifies some risk categories to consider in using the cloud.
Basics of Virtualization:
What is Virtual and Virtualization?
Why do we need Virtualization?
Benefits of Virtualization.
Before and after Virtualization.
How Virtualization works?
Virtual Machines.
VMware
Types of Virtualization:
1. Server Virtualization
2. Storage virtualization
3. I/O virtualization
4. Network virtualization
5. Client virtualization
6. Desktop virtualization
7. Application Virtualization
General discussions
Why cloud?
The terminology: relating virtualization and cloud
Types of Virtualization and Cloud deployment model
Decisive factors in migration
Hands-on cloud deployment
Cloud for banks
A discussion of the risks of cloud computing. While the cloud has compelling benefits, we need to evaluate and mitigate the risks - this presentation identifies some risk categories to consider in using the cloud.
Basics of Virtualization:
What is Virtual and Virtualization?
Why do we need Virtualization?
Benefits of Virtualization.
Before and after Virtualization.
How Virtualization works?
Virtual Machines.
VMware
Types of Virtualization:
1. Server Virtualization
2. Storage virtualization
3. I/O virtualization
4. Network virtualization
5. Client virtualization
6. Desktop virtualization
7. Application Virtualization
General discussions
Why cloud?
The terminology: relating virtualization and cloud
Types of Virtualization and Cloud deployment model
Decisive factors in migration
Hands-on cloud deployment
Cloud for banks
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
IBM Cloud Infrastructure as a Service (IaaS)- Feb 2019 by Gianfranco Mollojoemolls
Presenting IBM Cloud IaaS during "Tech Up Tour 2019" to Customers and BPs @ IBM HQ in Rome, Italy
#ibmcloud #digitaltransformation #infrastructuremodernization #multicloud
This Presentation created by me Mayur Verma when i was pursuing IT Security Diploma. In this i Describe the about cloud computing and example of some cloud OS
Basic Cloud Computing and underlying technology, Hypervisor, Cloud Services, Cloud Deployment Models, AWS, REST APIs, Cloud Investment Trends, Cloud Investments, Cloud Value chain and lot of terms and references for further reading.
Agility and Cloud Computing
Ambs Kesavan, Xilinx
Voices 2015 www.globaltechwomen.com
Session Length: 45 minutes
The objective of this talk is to share technology trends in cloud computing industry and the opportunities they provide to innovate at scale. The presentation highlights the productivity and economic benefits from adopting this disruptive technology to create a sustained competitive advantage for businesses of all sizes ranging from SMB segment to high end enterprises.
Modern Architecture in the Cloud of 2018 (IT Camp 2018)Marius Zaharia
Today, the large public Clouds - Azure and AWS - deploy at high-speed a diversity of services and features. Between Azure Functions, Event Grid, Azure VM Scale Sets, or Logic Apps, what to choose? Shall I go on Microservices? Event-Driven? Lambda Architecture? Deploy on Serverless? Containers? Modern Compute? Let's put a bit of order in all that. Enter the Modern Architecture, the foundation of all the new wave of Cloud services and not only. Session focused on application and infrastructure architecture, examples based on Cloud, perspectives and roadmap of the corresponding services at Microsoft.
Introduction to Cloud Technology slide was prepared for Linux/Unix class lecture at Department of Computer Engineering, Chulalongkorn University in Jan 2013.
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
IBM Cloud Infrastructure as a Service (IaaS)- Feb 2019 by Gianfranco Mollojoemolls
Presenting IBM Cloud IaaS during "Tech Up Tour 2019" to Customers and BPs @ IBM HQ in Rome, Italy
#ibmcloud #digitaltransformation #infrastructuremodernization #multicloud
This Presentation created by me Mayur Verma when i was pursuing IT Security Diploma. In this i Describe the about cloud computing and example of some cloud OS
Basic Cloud Computing and underlying technology, Hypervisor, Cloud Services, Cloud Deployment Models, AWS, REST APIs, Cloud Investment Trends, Cloud Investments, Cloud Value chain and lot of terms and references for further reading.
Agility and Cloud Computing
Ambs Kesavan, Xilinx
Voices 2015 www.globaltechwomen.com
Session Length: 45 minutes
The objective of this talk is to share technology trends in cloud computing industry and the opportunities they provide to innovate at scale. The presentation highlights the productivity and economic benefits from adopting this disruptive technology to create a sustained competitive advantage for businesses of all sizes ranging from SMB segment to high end enterprises.
Modern Architecture in the Cloud of 2018 (IT Camp 2018)Marius Zaharia
Today, the large public Clouds - Azure and AWS - deploy at high-speed a diversity of services and features. Between Azure Functions, Event Grid, Azure VM Scale Sets, or Logic Apps, what to choose? Shall I go on Microservices? Event-Driven? Lambda Architecture? Deploy on Serverless? Containers? Modern Compute? Let's put a bit of order in all that. Enter the Modern Architecture, the foundation of all the new wave of Cloud services and not only. Session focused on application and infrastructure architecture, examples based on Cloud, perspectives and roadmap of the corresponding services at Microsoft.
Introduction to Cloud Technology slide was prepared for Linux/Unix class lecture at Department of Computer Engineering, Chulalongkorn University in Jan 2013.
Virtualization security for the cloud computing technologyDeep Ranjan Deb
Virtualization reduces the number of physical servers, reducing the energy required to power and cool them and save time. It's also much faster to deploy a virtual machine than it is to deploy a new physical server. It also reduces desktop management headaches.
Edge computing has been gaining popularity as it defines a model that brings compute and storage closer to where they are consumed by the end-user. By being closer to the end-user a better experience can be provided with a reduction in overall latency, lower bandwidth requirements, lower TCO, more flexible hardware/software model, while also ensuring security and reliability. In this talk, Abhishek discusses aligning Apache CloudStack with this evolving cloud computing model and supporting Edge Zones, which can be also looked upon as lightweight zones, with minimal resources.
Abhishek Kumar is a committer of the Apache CloudStack project and has worked on the notable features such as VM ingestion, CloudStack Kubernetes Service, IPv6 support, etc. He works as a Software Engineer at ShapeBlue.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
Cloud is getting industry's attention, as more applications are moving to Cloud, Understanding Cloud basics are no longer nice-to-have requirement but became necessity.
This Presentation was presented as an Internal training to employee for educational purposes.
Company: AST Corporation www.astcorporation.com
Presenter: Zeeshan Baig
Website: www.baigzeeshan.com
SoftLayer is Global cloud provider who provide cloud computing resources to customer worldwide. SoftLayer is IBM Company and operated under IBM Global Technology Services. IBM commit to expand SoftLayer cloud data center from 13 datacenter to 26 datacenter by end of 2015.
This presentation gives an overview of SoftLayer cloud capability which more URL information at the end of presentation. You can look for additional information of SoftLayer e.g. price, location, bandwidth from their web site at http://www.softlayer.com
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
2. What is Virtualization?
• Wikipedia: ‘... is the creation of a virtual (rather than actual) version of something,
such as a hardware platform, operating system (OS), storage device, or network
resources.’
• Webopedia: ‘... to create a virtual version of a device or resource, such as a server,
storage device, network or even an operating system where the framework
divides the resource into one or more execution environments.’
iMatrix ICT Cloud - www.imatrixcloud.com.au
3. What can be Virtualized?
• Desktop
• Server
• Network
• Storage
• Application
iMatrix ICT Cloud - www.imatrixcloud.com.au
6. Advantages
• Management
• Security
• OS migration
• VDI Image
• Snapshot technology
• Go green
• Independence
Desktop Virtualization
iMatrix ICT Cloud - www.imatrixcloud.com.au
7. Limitations
• Potential security risk if the network is not properly managed
• Challenges in setting up and maintaining drivers for printers
and other peripherals
• Difficulty in running certain complex applications (e.g.
Multimedia)
• Increased downtime in the event of network failures
• Reliance on connectivity to corporate or public networks
• Can be difficult for a user to permanently delete his/her data
• Complex and high cost of VDI deployments and management
iMatrix ICT Cloud - www.imatrixcloud.com.au Desktop Virtualization
10. Limitations
• Dedicated servers for application that require high demands
on processing power
• Cannot overload server’s CPU by creating too many virtual
servers
• Migration:
- VM can migrate if both physical machines use the same
manufacturer CPU
- If a physical server requires maintenance and migration of the VM
is not an option all VM’s will be unavailable
Server Virtualization
iMatrix ICT Cloud - www.imatrixcloud.com.au
15. Risks
• Backing out a failed implementation
• Interoperability and vendor support
• Complexity
– Management of environment
– Infrastructure design
– Software or device itself
• Meta-data management
• Performance and scalability
iMatrix ICT Cloud - www.imatrixcloud.com.au Storage Virtualization
16. Implementation
• Host-based
– Simple to design and code
– Supports any storage array
– Improve storage utilization without thin provisioning restrictions
• Storage device-based
– No additional hardware or infrastructure requirements
– Provide most of the benefits of storage virtualization
– Does not add latency to individual I/Os
• Network-based
– True heterogeneous storage virtualization
– Caching of data
– Single management interface
– Replication data across devises
iMatrix ICT Cloud - www.imatrixcloud.com.au Storage Virtualization
18. Application Virtualization
• Application Streaming
– On-demand software distribution
• Desktop Virtualization / Virtual Desktop Infrastructure (VDI)
– Application is hosted in a VM or blade PC
Benefits
• Simplified operating system migrations
• Improved security – applications can be isolated from OS
• Reduce system integration and administration costs
• Uses fewer resources than a separate virtual machine
iMatrix ICT Cloud - www.imatrixcloud.com.au
20. Cloud – Service Models
• Infrastructure as a service (IaaS)
– Virtual machines, Storage, Firewall, Load balancer, Network
• Platform as a service (PaaS)
– Operating systems, programming language execution environment,
database, and web server
• Software as a service (SaaS)
– Access application software using networked devices (desktop PC,
laptop, tablet and Smartphone)
iMatrix ICT Cloud - www.imatrixcloud.com.au
21. Cloud – Deployment models
• Public cloud
– Applications, storage and other resources made available to general
public free or as a pay-per-use model
• Community cloud
– Shares infrastructure between several organizations with common
concern
• Hybrid cloud
– Combination of any two (private, community and public)
• Private cloud
– Operated solely and certainly of in house-applications
iMatrix ICT Cloud - www.imatrixcloud.com.au
22. Benefits
• Reduced costs • Scalability
• Increased storage • Business continuity
• Highly automated • Collaboration efficiency
• Flexibility • Minimal IT footprint
• More mobility (anytime,
anywhere)
• Allows IT to shift focus
iMatrix ICT Cloud - www.imatrixcloud.com.au Cloud Computing
24. Cloud Computing
In conclusion:
– Cloud computing is not risk-free
– Almost all the risks can be managed with minimal effort,
and balanced against all the benefits it provides
– Enterprises should decide whether or not adopting a cloud
solution comply with all of their organization requirements
iMatrix ICT Cloud - www.imatrixcloud.com.au
26. Thank you!
Gabriel Ionescu
iMatrix ICT Cloud - www.imatrixcloud.com.au
Editor's Notes
Management Central management of all desktops and full control of what is being installed and used. Security Desktop can have the image locked down from external devices or prevent copying data from the image to your local machine. If the devise is stolen, the information/data is protected as being stored in the data centre OS migration You can just push the new OS image from a central location to a group of users or to all. Snapshot technology Ability to roll back desktops to different states. Go green A thin client VDI use less electricity than a desktop computer. Independence Can be used on any device: thin client, PC, Apple, Linux, etc. As long as you can connect to your VDI with ICA or RDP.
There are essentially four models for VDI operation. - Hosted (delivered as a service) - Centralized - Remote Synchronization - Client-Hosted Both Hosted and Centralized modes rely upon a constant network or internet connection to the server where the VDI instance is running. This model is similar in concept to thin clients, in that the client device only displays the virtual desktop. For this reason, a constant network connection is required. The Remote Synchronization model allows users to copy a VDI instance to a system, and then run the virtual desktop without a connection. In this model, users normally use virtual machines that are running on a centralized server, but can copy an image to be used locally when travelling. This disconnected or untethered mode of operation has its own set of advantages and disadvantages compared to traditional desktops and centralized VDI desktops. The Client-hosted model only uses centralized servers to manage virtual machine images, always running virtual machines on laptops or desktops. Local execution eliminates the infrastructure required for VDI execution servers in the data centre and also reduces network bandwidth consumption since the virtual machines are executing locally and not over a remote network.
Isolation One of the key reasons to employ virtualization is to isolate applications from each other. Running everything on one machine would be great if it all worked, but many times it results in undesirable interactions or even outright conflicts. The cause often is software problems or business requirements, such as the need for isolated security. Virtual machines allow you to isolate each application (or group of applications) in its own sandbox environment. Standardization A standardized hardware platform reduces support costs and increases the share of IT resources Consolidation Virtual machines also increase utilization and promote consolidation. Consolidation of servers results in easier management and decreased hardware costs. Ease of Testing Virtual machines let you test scenarios easily. Most virtual machine software today provides snapshot and rollback capabilities. This means you can stop a virtual machine, create a snapshot, perform more operations in the virtual machine, and then roll back again and again until you have finished your testing. Mobility Virtual machines are easy to move between physical machines. Most of the virtual machine software on the market today stores a whole disk in the guest environment as a single file in the host environment. Snapshot and rollback capabilities are implemented by storing the change in state in a separate file in the host information. Reduce Delivery Time Increase the speed to deployment for your software applications by leveraging templates server deployments. Reduce Costs Virtual server software (such as VMware, or Microsoft Virtual Server) allows multiple servers to run within a single server platform. This provides significant cost savings and provides additional flexibility. Flexibility The most significant benefit of virtual servers is their flexibility. This means that the specification (CPU, memory and disks) can easily be changed on-the-fly (within minutes). Leverage Server resources can be applied to virtual servers on-demand. This means that server resources can be directed to where they are most needed, when they are most needed. Get more out of your existing resources : Pool common infrastructure resources and break the legacy “one application to one server” model with server consolidation. Reduce hardware and operating costs by as much as 50% and energy costs by 80% Reduce the time it takes to provision new servers by up to 70% Decrease downtime and improve reliability with business continuity and built-in data disaster recovery Deliver IT services on-demand now and in the future, independent of hardware, OS, application or infrastructure providers Reduce data centre costs by reducing your physical infrastructure and improving your server to admin ratio : Fewer servers and related IT hardware means reduced real estate and reduced power and cooling requirements. Better management tools let you improve your server to admin ratio so personnel requirements are reduced as well. Increase availability of hardware and applications for improved business continuity : Securely backup and migrate entire virtual environments with no interruption in service. Eliminate planned downtime and recover immediately from unplanned issues. Gain operational flexibility : Respond to market changes with dynamic resource management, faster server provisioning and improved desktop and application deployment. Improve desktop manageability and security : Deploy, manage and monitor secure desktop environments that users can access locally or remotely, with or without a network connection, on almost any standard desktop, laptop or tablet PC.
Servers dedicated for applications with high demands on processing power, virtualization isn't a good choice. That's because virtualization essentially divides the servers processing power up among the virtual servers. It's also unwise to overload a server's CPU by creating too many virtual servers on one physical machine. The more virtual machines a physical server must support, the less processing power each server can receive. In addition, there's a limited amount of disk space on physical servers. Too many virtual servers could impact the server's ability to store data. Another limitation is migration. Right now, it's only possible to migrate a virtual server from one physical machine to another if both physical machines use the same manufacturer's processor. If a network uses one server that runs on an Intel processor and another that uses an AMD processor, it's impossible to port a virtual server from one physical machine to the other. If a physical server requires maintenance, porting the virtual servers over to other machines can reduce the amount of application downtime. If migration isn't an option, then all the applications running on the virtual servers hosted on the physical machine will be unavailable during maintenance.
Components of a virtual network - Network hardware, such as switches and network adapters, also known as network interface cards (NICs) - Network elements such as firewalls and load balancers - Networks, such as virtual LANs (VLANs) and containers such as virtual machines (VMs) and Solaris Containers Network storage devices - Network mobile elements such as laptops, tablets, and cell phones Network media, such as Ethernet and Fibre Channel
Non-disruptive data migration The host only knows about the logical disk (the mapped LUN) and so any changes to the meta-data mapping is transparent to the host. This means the actual data can be moved or replicated to another physical location without affecting the operation of any client. When the data has been copied or moved, the meta-data can simply be updated to point to the new location, therefore freeing up the physical storage at the old location. The process of moving the physical location is known as data migration. Most implementations allow for this to be done in a non-disruptive manner, that is concurrently while the host continues to perform I/O to the logical disk (or LUN). The mapping granularity dictates how quickly the meta-data can be updated, how much extra capacity is required during the migration, and how quickly the previous location is marked as free. The smaller the granularity the faster the update, less space required and quicker the old storage can be freed up. Improved utilization Utilization can be increased by virtue of the pooling, migration, and Thin Provisioning services. When all available storage capacity is pooled, system administrators no longer have to search for disks that have free space to allocate to a particular host or server. A new logical disk can be simply allocated from the available pool, or an existing disk can be expanded. Pooling also means that all the available storage capacity can potentially be used. In a traditional environment, an entire disk would be mapped to a host. This may be larger than is required, thus wasting space. In a virtual environment, the logical disk (LUN) is assigned the capacity required by the using host. Fewer points of management With storage virtualization, multiple independent storage devices, even if scattered across a network, appear to be a single monolithic storage device and can be managed centrally. However, traditional storage controller management is still required. That is, the creation and maintenance of RAID arrays, including error and fault management
Backing out a failed implementation Once the abstraction layer is in place, only the virtualizer knows where the data actually resides on the physical medium. Backing out of a virtual storage environment therefore requires the reconstruction of the logical disks as contiguous disks that can be used in a traditional manner. Interoperability and vendor support Interoperability is a key enabler to any virtualization software or device. It applies to the actual physical storage controllers and the hosts, their operating systems, multi path software and connectivity hardware. Interoperability requirements differ based on the implementation chosen. For example virtualization implemented within a storage controller adds no extra overhead to host based interoperability, but will require additional support of other storage controllers if they are to be virtualized by the same software Complexity Complexity affects several areas: - Management of environment: Although a virtual storage infrastructure benefits from a single point of logical disk and replication service management, the physical storage must still be managed. Problem determination and fault isolation can also become complex, due to the abstraction layer. - Infrastructure design: Traditional design ethics may no longer apply, virtualization brings a whole range of new ideas and concepts to think about (as detailed here) - The software or device itself: Some implementations are more complex to design and code - network based especially in-band (symmetric) designs in particular — these implementations actually handle the I/O requests and so latency becomes an issue. Meta-data management The meta-data management also has implications on performance. Any virtualization software or device must be able to keep all the copies of the meta-data atomic and quickly updateable. Some implementations restrict the ability to provide certain fast update functions, such as point-in-time copies and caching where super fast updates are required to ensure minimal latency to the actual I/O being performed. Performance and scalability Due to the nature of virtualization, the mapping of logical to physical requires some processing power and lookup tables. Therefore every implementation will add some small amount of latency.
Host-based virtualization requires additional software running on the host, as a privileged task or process. In some cases volume management is built-in to the operating system, and in other instances it is offered as a separate product. Storage devise-based concept: A primary storage controller provides the virtualization services and allows the direct attachment of other storage controllers. Depending on the implementation these may be from the same or different vendors. Network-based : Storage virtualization operating on a network based devices that use iSCSI or FC Fibre channel networks to connect as a SAN.
Benefits of application virtualization: Allows applications to run in environments that do not suit the native application May protect the operating system and other applications from poorly written or buggy code Uses fewer resources than a separate virtual machine Run applications that are not written correctly, for example applications that try to store user data in a read-only system-owned location Run incompatible applications side-by-side, at the same time and with minimal regression testing against one another Reduce system integration and administration costs by maintaining a common software baseline across multiple computers in an organization Simplified operating system migrations Accelerated application deployment, through on-demand application streaming Improved security, by isolating applications from the operating system Enterprises can easily track license usage Fast application provisioning to the desktop based upon user's roaming profile Allows applications to be copied to portable media and then imported to client computers without need of installing them
Reduced Cost Cloud technology is paid incrementally, saving organizations money. Increased Storage Organizations can store more data than on private computer systems. Highly Automated No longer do IT personnel need to worry about keeping software up to date. Access to automatic updates for your IT requirements may be included in your service fee. Flexibility/Scalability Cloud computing offers much more flexibility than past computing methods. Businesses can scale up or scale down their operation and storage needs quickly to suit their situation, allowing flexibility as their needs change. More Mobility Employees can access information wherever they are, rather than having to remain at their desks. Allows IT to Shift Focus No longer having to worry about constant server updates and other computing issues, government organizations will be free to concentrate on innovation. Business Continuity Whether you experience a natural disaster, power failure or other crisis, having your data stored in the cloud ensures it is backed up and protected in a secure and safe location. Being able to access your data again quickly allows you to conduct business as usual, minimising any downtime and loss of productivity. Collaboration efficiency Cloud offers the ability to communicate and share more easily outside of the traditional methods. If you are working on a project across different locations, you could use cloud computing to give employees, contractors and third parties access to the same files.
Legal implications With cloud computing, data from multiple customers is typically commingled on the same servers. That means that legal action taken against another customer that is completely unrelated to your business could have a ripple effect. Your data could become unavailable to you just because it was being stored on the same server as data belonging to someone else that was subject to some legal action. For example, a search warrant issued for the data of another customer could result in your data being seized as well. Security In fact, no IT system is completely secure, not even the internal data centre with multiple firewalls, restricted access and housed in a fire-resistant, earthquake-proof building. Compatibility Cloud computing networks may not be compatible with existing IT infrastructures Availability Its availability at critical junctures is potentially a matter of concern. Need to find out how data and service availability during bandwidth interruptions and DDOS (Distributed Denial Of Service) attacks. Compliance Actual data resides on multiple servers in multiple locations, often in multiple countries. There may be issues regarding the legality of certain data being stored outside national borders. Monitoring Since data is in the hands of the provider, monitoring may be a problem unless the proper processes are put in place. However, end-to-end monitoring over clouds is certainly possible. Lock in How easy the client can shift to another provider, if dissatisfied with the current service, without having to incur initial setup costs again. Standardization With the absence of codified standards, it is very difficult to judge whether the service provided is good or bad.