SlideShare a Scribd company logo
4. EVALUATION


Overhead

                  Virtualization usually imposes little or no overhead, because programs in
virtual partition use the operating system's normal system call interface and do not need
to be subject to emulation or run in an intermediate virtual machine, as is the case with
whole-system virtualizers (such as VMware andQEMU) or para-virtualizers (such as Xen
and UML). It also does not require hardware assistance to perform efficiently.

Flexibility

                        Operating system-level virtualization is not as flexible as other
virtualization approaches since it cannot host a guest operating system different from the
host one, or a different guest kernel. For example, with Linux, different distributions are
fine, but other OS such as Windows cannot be hosted. This limitation is partially
overcome in Solaris Containers by its branded zones feature, which provides the ability to
run an environment within a container that emulates a Linux 2.4-based release or an older
Solaris release.

Storage

                    Some operating-system virtualizers provide file-level copy-on-write
mechanisms. (Most commonly, a standard file system is shared between partitions, and
partitions which change the files automatically create their own copies.) This is easier to
back up, more space-efficient and simpler to cache than the block-level copy-on-write
schemes common on whole-system virtualizers. Whole-system virtualizers, however,
can work with non-native file systems and create and roll back snapshots of the entire
system state.

Restrictions inside the container

The following actions are often prohibited:


•   Modifying the running kernel by direct access and loading kernel modules.

•   Mounting and dismounting file systems.

•   Creating device nodes.
•   Accessing raw, divert, or routing sockets.

•   Modifying kernel runtime parameters, such as most sysctl settings.

•   Changing secure level-related file flags.

•   Accessing network resources not associated with the container.




                    5. Conclusion and Future Work
               Virtualization technologies have matured to the point where the technology
is being deployed across a wide range of platforms and environments. The usage of
virtualization has gone beyond increasing the utilization of infrastructure, to areas like
data replication and data protection. This white paper looks at the continuing evolution of
virtualization, its potential, some tips on optimizing virtualization as well as how to
future proof the technology.

                   After all, server virtualization's value is well-established. Many, many
companies have migrated significant percentages of their servers to virtual machines
hosted on larger servers, gaining benefits in hardware utilization, energy use, and data
centre space. And those companies that haven't done so thus far are hatching plans to
consolidate their servers in the future. These are all capital or infrastructure costs, though.
What does server virtualization do for human costs—the IT operations piece of the
puzzle?

                Base level server consolidation offers a few benefits for IT operations. It
makes hardware maintenance much easier, since virtual machines can be moved to other
physical servers when it's time to maintain or repair the original server. This moves
hardware maintenance from a weekend and late night effort to a part of the regular
business day—certainly a great convenience.

                 The next step for most companies is to leverage the portability of virtual
machines to achieve IT operational agility. Because virtual machines are captured in disk
images, they are portable, no longer bound to an individual physical server. The ease of
reproducing virtual images means that application capacity can be easily dialed up and
down with the creation or tear down of additional virtual images. Server pooling allows
virtual machines to be automatically migrated according to application load. More
sophisticated virtualization uses include high availability, where virtual machines can be
moved—automatically, by the virtualization management software itself & mdash: when
hardware failures occur. Seeing the magic of a virtual machine automatically being
brought up on a new server after its original host is brought down, all without any human
intervention vividly demonstrates the power of more sophisticated virtualization use.
Certainly these kinds of uses of virtualization demonstrate its power to
transform IT operations, enabling IT organizations to offer the kind of responsiveness
and creativity that could only be dreamed of a few years ago. The deftness with which
applications can be migrated, upsized, down sized, cloned, etc. is something that will
forever change the way IT does its job.

More Related Content

What's hot

NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of VirtualizationNCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
ncceconnect
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
EMC
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environmentsArun Gopinath
 
Differences between Virtualization and Cloud
Differences between Virtualization and CloudDifferences between Virtualization and Cloud
Differences between Virtualization and CloudDuan van der Westhuizen
 
Virtualization
VirtualizationVirtualization
Virtualization
Utkarsh Soni
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
Radhika Kalavadiya
 
Virtualization Security Risks
Virtualization Security RisksVirtualization Security Risks
Virtualization Security Risks
Tommy Tracx Xaypanya
 
Virtualization
VirtualizationVirtualization
Virtualization
Yansi Keim
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
Sarbjeet Singh
 
Operating system 16 virtual machines
Operating system 16 virtual machinesOperating system 16 virtual machines
Operating system 16 virtual machines
Vaibhav Khanna
 
Virtualization
VirtualizationVirtualization
Virtualization
Kamal Chauhan
 
VMWARE
VMWAREVMWARE
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
AJIT NEGI
 
Virtualization and how it leads to cloud
Virtualization and how it leads to cloudVirtualization and how it leads to cloud
Virtualization and how it leads to cloud
Huzefa Husain
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
ofsorganizer
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
Mehul Jariwala
 
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm ware
Yeditepe University
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
Emirates Computers
 

What's hot (20)

NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of VirtualizationNCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 
Differences between Virtualization and Cloud
Differences between Virtualization and CloudDifferences between Virtualization and Cloud
Differences between Virtualization and Cloud
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
 
Virtualization Security Risks
Virtualization Security RisksVirtualization Security Risks
Virtualization Security Risks
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
 
Operating system 16 virtual machines
Operating system 16 virtual machinesOperating system 16 virtual machines
Operating system 16 virtual machines
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VMWARE
VMWAREVMWARE
VMWARE
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Virtualization and how it leads to cloud
Virtualization and how it leads to cloudVirtualization and how it leads to cloud
Virtualization and how it leads to cloud
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm ware
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 

Viewers also liked

Il mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospitiIl mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospitimargherita_caranfil
 
Il mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospitiIl mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospitimargherita_caranfil
 

Viewers also liked (7)

Imchub
ImchubImchub
Imchub
 
Il mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospitiIl mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospiti
 
Teste2
Teste2Teste2
Teste2
 
BranchOut
BranchOutBranchOut
BranchOut
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Il mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospitiIl mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospiti
 

Similar to Virtulization

Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
Vivek Shelke
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
Neha417639
 
virtualization system basic introduction
virtualization system basic introductionvirtualization system basic introduction
virtualization system basic introduction
BadriHjSidek1
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation OverviewLogicalis
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
shruti533256
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
XanGwaps
 
Sna lab prj (1)
Sna lab prj (1)Sna lab prj (1)
Sna lab prj (1)
alihaider922341
 
Virtualization
VirtualizationVirtualization
Virtualization
vishnurk
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
KelvinBakespear
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
Wilson Erique
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
budabrooks46239
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage Architecture
Gridstore
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Rishikese MR
 
virtualization-190329110832.pdf
virtualization-190329110832.pdfvirtualization-190329110832.pdf
virtualization-190329110832.pdf
AkshithaReddy42848
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
Colloquium
 
The Future of Server Virtualization
The Future of Server VirtualizationThe Future of Server Virtualization
The Future of Server Virtualization
Ahmed Banafa
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
Zarwashgulrez
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
 

Similar to Virtulization (20)

Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
virtualization system basic introduction
virtualization system basic introductionvirtualization system basic introduction
virtualization system basic introduction
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
 
Sna lab prj (1)
Sna lab prj (1)Sna lab prj (1)
Sna lab prj (1)
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage Architecture
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
virtualization-190329110832.pdf
virtualization-190329110832.pdfvirtualization-190329110832.pdf
virtualization-190329110832.pdf
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
The Future of Server Virtualization
The Future of Server VirtualizationThe Future of Server Virtualization
The Future of Server Virtualization
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Virtulization

  • 1. 4. EVALUATION Overhead Virtualization usually imposes little or no overhead, because programs in virtual partition use the operating system's normal system call interface and do not need to be subject to emulation or run in an intermediate virtual machine, as is the case with whole-system virtualizers (such as VMware andQEMU) or para-virtualizers (such as Xen and UML). It also does not require hardware assistance to perform efficiently. Flexibility Operating system-level virtualization is not as flexible as other virtualization approaches since it cannot host a guest operating system different from the host one, or a different guest kernel. For example, with Linux, different distributions are fine, but other OS such as Windows cannot be hosted. This limitation is partially overcome in Solaris Containers by its branded zones feature, which provides the ability to run an environment within a container that emulates a Linux 2.4-based release or an older Solaris release. Storage Some operating-system virtualizers provide file-level copy-on-write mechanisms. (Most commonly, a standard file system is shared between partitions, and partitions which change the files automatically create their own copies.) This is easier to back up, more space-efficient and simpler to cache than the block-level copy-on-write schemes common on whole-system virtualizers. Whole-system virtualizers, however, can work with non-native file systems and create and roll back snapshots of the entire system state. Restrictions inside the container The following actions are often prohibited: • Modifying the running kernel by direct access and loading kernel modules. • Mounting and dismounting file systems. • Creating device nodes.
  • 2. Accessing raw, divert, or routing sockets. • Modifying kernel runtime parameters, such as most sysctl settings. • Changing secure level-related file flags. • Accessing network resources not associated with the container. 5. Conclusion and Future Work Virtualization technologies have matured to the point where the technology is being deployed across a wide range of platforms and environments. The usage of virtualization has gone beyond increasing the utilization of infrastructure, to areas like data replication and data protection. This white paper looks at the continuing evolution of virtualization, its potential, some tips on optimizing virtualization as well as how to future proof the technology. After all, server virtualization's value is well-established. Many, many companies have migrated significant percentages of their servers to virtual machines hosted on larger servers, gaining benefits in hardware utilization, energy use, and data centre space. And those companies that haven't done so thus far are hatching plans to consolidate their servers in the future. These are all capital or infrastructure costs, though. What does server virtualization do for human costs—the IT operations piece of the puzzle? Base level server consolidation offers a few benefits for IT operations. It makes hardware maintenance much easier, since virtual machines can be moved to other physical servers when it's time to maintain or repair the original server. This moves hardware maintenance from a weekend and late night effort to a part of the regular business day—certainly a great convenience. The next step for most companies is to leverage the portability of virtual machines to achieve IT operational agility. Because virtual machines are captured in disk images, they are portable, no longer bound to an individual physical server. The ease of reproducing virtual images means that application capacity can be easily dialed up and down with the creation or tear down of additional virtual images. Server pooling allows virtual machines to be automatically migrated according to application load. More sophisticated virtualization uses include high availability, where virtual machines can be moved—automatically, by the virtualization management software itself & mdash: when hardware failures occur. Seeing the magic of a virtual machine automatically being brought up on a new server after its original host is brought down, all without any human intervention vividly demonstrates the power of more sophisticated virtualization use.
  • 3. Certainly these kinds of uses of virtualization demonstrate its power to transform IT operations, enabling IT organizations to offer the kind of responsiveness and creativity that could only be dreamed of a few years ago. The deftness with which applications can be migrated, upsized, down sized, cloned, etc. is something that will forever change the way IT does its job.