SlideShare a Scribd company logo
VIRTUALIZATION
TECHNOLOGY
INTRODUCTION
Virtualization is technology that allows you to create multiple simulated environments or
dedicated resources from a single, physical hardware system.
Creation of a virtual -- rather than actual -- version of something, such as an operating
system, a server, a storage device or network resources.
VIRTUALIZATION
Virtualization refers to Abstraction of the computer resources.
It refers to creation of a virtual resources such as server, file or network
CONCEPT OF VIRTUALIZATION
Virtualization describes a technology in which an application, guest operating
system or data storage is abstracted away from the true underlying hardware or
software.
A great example of how virtualization works in your daily life is the separation of your hard drive
into different parts. It started as the ability to run multiple operating systems on one hardware set
and now it is a vital part of testing and cloud-based computing.
WHY?
❏ Isolation among users
❏ Resource sharing
❏ Dynamical resources
❏ Aggregation of resources
IS IT SECURE?
► Virtualization is an elegant solution to many common security problems.
► In a development environment, each developer can have their own sandbox,
immune from another developer’s rogue or runaway code.
► When VMs and applications are properly isolated, only one application on one OS is
affected by an attack.
HOW IT WORKS?
● Virtualization software makes it possible to run multiple operating systems and multiple
applications on the same server at the same time” – Mike Adams, VMware
● Provide applications with the standard versions to their cloud users.
● Normally in the cloud computing, users share the data present in the clouds like application
Virtualization users share the Infrastructure.
SECURITY
● Security is one of the important concerns.
● Prevents unauthorised access.
● Protection from Harmful viruses and Cyber threats.
● Encryption process:
It takes place with protocols which will protect the data from other threats.
ECONOMICAL
● Saves the cost for a physical system such as hardware and servers.
● Stores Data in Virtual server.
● Reduces the wastage, decreases the electricity bills.
FLEXIBLE OPERATIONS
● The network switch implemented today is very easy to use, flexible and saves time.
● It eliminates the problem of recovering the data from crashed or corrupted devices and hence
saves time.
FLEXIBLE DATA TRANSFER
● The data can transfer to the virtual server and retrieve anytime.
● Easy to locate the required data and transfer them.
● Additional storage is provided.
ELIMINATES RISK OF SYSTEM FAILURE
● Failure can cause damage to the company but the virtualizations help you to perform
the same task in multiple devices at the same time.
● Even if a server crashes with the help of the second server the customer can access the data.
THANK YOU

More Related Content

What's hot

What is VDI And How Does It Work
What is VDI And How Does It WorkWhat is VDI And How Does It Work
What is VDI And How Does It Work
ACECloudHosting1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
pradeepfdo
 
Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017
Chris Evans
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Md. Asaduzzaman
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concerns
Vaibhav Khanna
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud Computing
JIM MUKERJEE
 
Cloud-computing part 1
Cloud-computing part 1Cloud-computing part 1
Cloud-computing part 1
pallavi_gaurav
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Nishith Kumar
 
Let's talk CLOUD!
Let's talk CLOUD!Let's talk CLOUD!
Let's talk CLOUD!
Santiago (Santi) Cuellar
 
Expedient Pyramid
Expedient Pyramid Expedient Pyramid
Expedient Pyramid
Shawn Allaway
 
Hybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo TheaterHybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Joe Conlin
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
Rohit Jain
 
The Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & OpinionsThe Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & Opinions
Resolver Inc.
 
Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)
PT Datacomm Diangraha
 
Virtualisation advances for teaching and research
Virtualisation advances for teaching and researchVirtualisation advances for teaching and research
Virtualisation advances for teaching and research
Michael Rees
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
Juniper Networks
 
Your Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to KnowYour Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to Know
Resolver Inc.
 
Architecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingArchitecture Challenges In Cloud Computing
Architecture Challenges In Cloud Computing
IndicThreads
 
Virtual environment
Virtual environmentVirtual environment
Virtual environment
Ragesh R Nair
 
Extend enterprise backup sheet
Extend enterprise backup sheetExtend enterprise backup sheet
Extend enterprise backup sheet
Justin Trent
 

What's hot (20)

What is VDI And How Does It Work
What is VDI And How Does It WorkWhat is VDI And How Does It Work
What is VDI And How Does It Work
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concerns
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud Computing
 
Cloud-computing part 1
Cloud-computing part 1Cloud-computing part 1
Cloud-computing part 1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Let's talk CLOUD!
Let's talk CLOUD!Let's talk CLOUD!
Let's talk CLOUD!
 
Expedient Pyramid
Expedient Pyramid Expedient Pyramid
Expedient Pyramid
 
Hybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo TheaterHybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
 
The Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & OpinionsThe Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & Opinions
 
Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)
 
Virtualisation advances for teaching and research
Virtualisation advances for teaching and researchVirtualisation advances for teaching and research
Virtualisation advances for teaching and research
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
Your Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to KnowYour Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to Know
 
Architecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingArchitecture Challenges In Cloud Computing
Architecture Challenges In Cloud Computing
 
Virtual environment
Virtual environmentVirtual environment
Virtual environment
 
Extend enterprise backup sheet
Extend enterprise backup sheetExtend enterprise backup sheet
Extend enterprise backup sheet
 

Similar to VIRTUALIZATION TECHNOLOGY

virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
XanGwaps
 
Cloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerCloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to Server
Fadly Rizal Ahmad Fadzil
 
cloude computing
cloude computingcloude computing
cloude computing
Krishnalal Kj
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Upanya Singh
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Moustafa Mahmoud
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
Deep Ranjan Deb
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
Priti Banya Mohanty
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
AJIT NEGI
 
Cloudcpmuting journal
Cloudcpmuting journalCloudcpmuting journal
Cloudcpmuting journal
Priti Banya Mohanty
 
Cloud.pptx
Cloud.pptxCloud.pptx
Cloud.pptx
Ajit Wadhawan
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptx
GauravPandey43518
 
Cloud computing
Cloud computingCloud computing
Cloud computing
prasanth82
 
Cloud computing
Cloud computingCloud computing
Cloud computing
waghu
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptx
DeepikaPardeshi1
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
seleshkumar Prajapati
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
Abhijit Kundu
 
Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?
Bangladesh Network Operators Group
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
Er. Saba karim
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
Mehul Patel
 
Cloud computing by shashank
Cloud computing by shashankCloud computing by shashank
Cloud computing by shashank
Shashank Shekhar
 

Similar to VIRTUALIZATION TECHNOLOGY (20)

virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
 
Cloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerCloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to Server
 
cloude computing
cloude computingcloude computing
cloude computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Cloudcpmuting journal
Cloudcpmuting journalCloudcpmuting journal
Cloudcpmuting journal
 
Cloud.pptx
Cloud.pptxCloud.pptx
Cloud.pptx
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptx
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Cloud computing by shashank
Cloud computing by shashankCloud computing by shashank
Cloud computing by shashank
 

More from RohitK71

Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellations
RohitK71
 
Negotiation
Negotiation Negotiation
Negotiation
RohitK71
 
QUEUEING NETWORKS
QUEUEING NETWORKSQUEUEING NETWORKS
QUEUEING NETWORKS
RohitK71
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
RohitK71
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTING
RohitK71
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCE
RohitK71
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminar
RohitK71
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigms
RohitK71
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handling
RohitK71
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
RohitK71
 
Usp message queues
Usp message queuesUsp message queues
Usp message queues
RohitK71
 

More from RohitK71 (11)

Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellations
 
Negotiation
Negotiation Negotiation
Negotiation
 
QUEUEING NETWORKS
QUEUEING NETWORKSQUEUEING NETWORKS
QUEUEING NETWORKS
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTING
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCE
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminar
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigms
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handling
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
 
Usp message queues
Usp message queuesUsp message queues
Usp message queues
 

Recently uploaded

Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 

Recently uploaded (20)

Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 

VIRTUALIZATION TECHNOLOGY

  • 2. INTRODUCTION Virtualization is technology that allows you to create multiple simulated environments or dedicated resources from a single, physical hardware system. Creation of a virtual -- rather than actual -- version of something, such as an operating system, a server, a storage device or network resources.
  • 3. VIRTUALIZATION Virtualization refers to Abstraction of the computer resources. It refers to creation of a virtual resources such as server, file or network
  • 4. CONCEPT OF VIRTUALIZATION Virtualization describes a technology in which an application, guest operating system or data storage is abstracted away from the true underlying hardware or software. A great example of how virtualization works in your daily life is the separation of your hard drive into different parts. It started as the ability to run multiple operating systems on one hardware set and now it is a vital part of testing and cloud-based computing.
  • 5. WHY? ❏ Isolation among users ❏ Resource sharing ❏ Dynamical resources ❏ Aggregation of resources
  • 6. IS IT SECURE? ► Virtualization is an elegant solution to many common security problems. ► In a development environment, each developer can have their own sandbox, immune from another developer’s rogue or runaway code. ► When VMs and applications are properly isolated, only one application on one OS is affected by an attack.
  • 7. HOW IT WORKS? ● Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same time” – Mike Adams, VMware ● Provide applications with the standard versions to their cloud users. ● Normally in the cloud computing, users share the data present in the clouds like application Virtualization users share the Infrastructure.
  • 8.
  • 9. SECURITY ● Security is one of the important concerns. ● Prevents unauthorised access. ● Protection from Harmful viruses and Cyber threats. ● Encryption process: It takes place with protocols which will protect the data from other threats.
  • 10. ECONOMICAL ● Saves the cost for a physical system such as hardware and servers. ● Stores Data in Virtual server. ● Reduces the wastage, decreases the electricity bills.
  • 11. FLEXIBLE OPERATIONS ● The network switch implemented today is very easy to use, flexible and saves time. ● It eliminates the problem of recovering the data from crashed or corrupted devices and hence saves time.
  • 12. FLEXIBLE DATA TRANSFER ● The data can transfer to the virtual server and retrieve anytime. ● Easy to locate the required data and transfer them. ● Additional storage is provided.
  • 13. ELIMINATES RISK OF SYSTEM FAILURE ● Failure can cause damage to the company but the virtualizations help you to perform the same task in multiple devices at the same time. ● Even if a server crashes with the help of the second server the customer can access the data.
  • 14.