SlideShare uma empresa Scribd logo
1 de 8
www.comptia.org/communities
www.comptia.org/communities
Q U I C K S TA R T G U I D E
www.comptia.org/uk
P O W E R E D B Y :
Virtualisation
A Practical Guide for Solution Providers
www.comptia.org/communities
2 www.comptia.org/research
Virtualisation
A Practical Guide for
Solution Providers
Since the early days of computing, there has been a push to utilise compute resources
as efficiently as possible. In the 1960s, IBM developed Virtualisation technology as a
way to break a single physical mainframe computer into several logical partitions. Each
partition could host a separate application, allowing the mainframe to multitask. To enable
this partitioning, IBM designed the mainframe with Virtualisation in mind, optimising
the hardware to run a Virtual Machine Monitor (VMM) that controlled the partitions
(also known as virtual machines). This VMM was originally termed a supervisor, but as it
extended to control multiple machines, it became known as a hypervisor.
In the 1980s and 1990s, the client-server model
along with lower prices for hardware with greater
capabilities caused Virtualisation to became a lower
priority. Customers could buy multiple inexpensive x86
machines to replace mainframes, and x86 hardware
and the Windows operating system were optimised
to run single applications. Eventually, cost pressures
drove new demand to virtualise x86 systems as
well. Virtualisation gained a new life when VMWare
introduced a hypervisor that could run on x86
architecture.
Virtualisation has become a critical component of
many corporate IT strategies and is a foundational
technology in cloud computing. However, CompTIA
research finds that although firms are moving rapidly
into the cloud, there is less adoption and familiarity
with Virtualisation. Understanding this underlying
element of the cloud will help these firms better
understand how to address issues such as cost
structure and security.
How Virtualisation Works
The primary function of Virtualisation is to allocate
resources intelligently for optimal use. This is done
mainly through two pieces of hardware: the hypervisor
and the management software. In a single-application
environment, the operating system is installed directly on
the hardware, and subsequent applications are installed
in the operating system. Operating systems derive their
Source: IDC 2010 Server Virtualisation Module
2011 2012 2013 2014
200 2012 2012 2013
Growing Virtualisation Needs
Physical Server Shipments
(in millions)
Virtual Machines
(as a share of total server market)
7.7
19%
20%
22%
23%
8.2
8.6
9
As physical machine ship-
ments are growing, virtual
machines are growing even
more rapidly and becoming
a larger part of the overall
server market.
P O W E R E D B Y :
3
quick start guide
virtualisation
power from the fact that they have intricate knowledge of the
hardware, using a kernel that directly communicates with the
processor, memory, and other devices. The hypervisor performs
the same function, but instead of applications being installed
on the hypervisor, complete operating systems are installed. A
hypervisor directly accesses the hardware of the host system,
and then presents subsets of those resources to each operating
system that is installed, creating virtual machines that are
completely self-contained.
While the hypervisor is the enabler of Virtualisation,
the management software is the differentiator among
Virtualisation vendors. As Virtualisation implementations
become more and more complex, the need to manage
becomes more critical. Management software provides
the ability to monitor virtual machines and ensure they are
operating properly. It also allows system administrators to
optimise the resources that are being allocated among all
virtual machines.
Server Virtualisation is the most common application of the
technology, but storage and networks have also become
candidates for Virtualisation. Network-Attached Storage (NAS)
and Storage Area Networks (SANs) provide abstracted storage
options for virtual machines to access. SANs are more expensive
implementations and are typically used by large enterprises.
Virtual Local Area Networks (VLANs) can group devices on a
network logically rather than physically, giving administrators
the ability to resegment networks without physically rearranging
devices or connections. These advances are leading to the
notion of a fully virtualised data centre, and as all three
Virtualisation techniques are employed, the management
software becomes increasingly important.
Benefits of Virtualisation
Most Virtualisation projects begin as an effort to consolidate
resources, gaining back efficiencies that were lost as servers
were underutilised by the applications running on them. As
resources are consolidated, the number of physical servers or
storage devices needed to maintain operations decreases. This
in turn reduces the energy demands of the resource pool.
There are some benefits to be realised in managing the
physical infrastructure in a virtual environment. New machine
requests no longer require approval of a complete system
and integration into a data centre. Instead, a machine that
is acting as a host may simply need additional memory to
accommodate new requests.
In addition to the data centre changes, the structure of an IT
department will change. Management of a virtual environment is
less labour-intensive, though the work itself is of a different nature.
Installation and maintenance are much simpler and happen much
faster in a virtual environment, and applications can more easily be
moved between virtual machines. Those personnel who previously
supported physical servers can be allocated to other IT work that
advances the objectives of an organisation.
•	 Nationwide Insurance reduced its number of physical
servers from 5000 to 3500 and increased utilisation rates
from 10% to 65%. This reduced hardware and operating
system support costs 20%-50%.
•	 St. Vincent’s Hospital Manhattan was able to achieve a
50% reduction in servers. In addition, the hospital found
that Virtualisation could be used to establish development,
test, and production environments without the cost of
three separate infrastructures.
•	 The Berryessa Union School District in California
consolidated 32 conventional servers to four blade servers.
Desktop resources doubled from 700 to 1400 available
systems, and fix time improved from weeks to minutes as
onsite visits were replaced by virtual machine repair.
Examples of Virtualisation Savings
Note: the diagram shows a form of server Virtualisation known as bare-metal
Virtualisation. Diagrams showing hosted Virtualisation and OS Virtualisation
can be found in the appendix.
Virtual Machine Virtual Machine
App App
OS OS
Hypervisor
Hardware
App
Hardware
App App
OS
App
App App App
Virtual Machine
OS
App App App
Non-virtualised server
Virtualised server
www.comptia.org/communities
4 www.comptia.org/research
The changes in the IT department do not end with virtual
machine management, though. Virtualisation opens the
door for more robust features and increased flexibility.
Backup and disaster recovery are implemented differently,
but more simply, than in a physical environment.
The ability to quickly move applications or bring up
new machines brings a new level of agility. Adding in
intelligence for resource utilisation and dynamic allocation
of those resources is what can then turn Virtualisation into
a cloud solution.
As organisations move more of their operations into the
cloud and also grapple with the implications of mobile
device use within the corporation, Virtualisation continues
to evolve. For example, IT administrators are examining
new uses for virtual desktops, in which employees use
their desktop, laptop, tablet, or smartphone to access
to a virtual machine running on a server. Many core
applications and data are accessed through this virtual
desktop, giving the IT department more of an ability to
control access to corporate systems.
Issues With Virtualisation
The change to IT operations can be a benefit, but it is
also an area of concern. Decoupling applications from
physical machines leads to greater efficiencies, but it also
requires a new knowledge of Virtualisation techniques
and a new mindset towards compute resources. There will
be a learning curve for IT administrators coming from a
traditional environment, and there will also be education
needed for end users.
There is also a learning curve involved in understanding
the best use of Virtualisation. There are performance
considerations in consolidating resources. Workloads
have to be analysed, and certain applications—such as
SQL databases and Voice over IP (VoIP)—should be
carefully examined to determine if they are Virtualisation
candidates. Administrators will need to ensure that peak
demands can be met as applications are sharing the
resource pool and that applications do not suffer from
being virtualised.
In restructuring an IT department to handle virtual
machines, the policies will also have to be addressed.
Virtual machines are simpler to bring up than physical
machines, but this can lead to a proliferation of machines
that is hard to manage. Some companies store images for
starting up virtual machines to save the time involved in
configuring the machine for specific applications. These
images also must be tracked and maintained.
Security is one of the most important policies to address.
The hypervisor adds a layer of software to the operational
stack, which in turn adds vulnerabilities. There must be
a plan for the security of each machine—including the
host machine and all virtual machines. Communications
between machines also must be monitored, and in the
case of virtual machines on a single host talking to
each other, this communication does not have external
components that can be monitored. Existing security
policies will need to be modified to handle these issues,
and additional tools may be required to secure the virtual
infrastructure.
Compliance must also be monitored in a virtual
environment. A single host may have a virtual machine
with PCI information and other virtual machines without
that information. This is allowed by the regulations, but
additional care is needed to ensure that data does not
cross the virtual machine boundaries.
Finally, a new focus on Virtualisation techniques
should not come at the cost of managing the physical
infrastructure. There are benefits to consolidation, but
it also means that host machines become more critical
as they support multiple applications. It is worthwhile to
revisit policy related to monitoring physical resources and
ensuring redundancy.
These issues are not insurmountable. There are a wide
variety of vendors and service providers who can assist
with these areas. However, dealing with these issues adds
to the cost of Virtualisation. It may be simple to calculate
how many physical servers can be removed by virtualising
or how much energy is saved, but the additional costs of
training and policy changes must be taken into account.
For this reason, calculating ROI on Virtualisation is not
a trivial matter. In a general sense, the economics of
Virtualisation are a net benefit to companies. But it is up
to individual firms to assess their Virtualisation strategy
and lay out the proper investment plan.
P O W E R E D B Y :
5
quick start guide
virtualisation
Getting Started With Virtualisation
For those companies who have not yet virtualised their
compute resource, Virtualisation may still be a good step
to take prior to considering cloud solutions. This will give
some experience with virtual environments that may prove
beneficial when dealing with cloud issues. As with all IT
projects, a thorough plan is the best path for success.
1.	Understand your workloads. Server consolidation will only
be effective if there are a sufficient number of underutilised
servers running similar workloads. Administrators can
start by monitoring performance loads to understand the
peak demand for resources. Next, applications should
be examined. Applications that require very low latency
are still in the early stages of being virtualised and may
not be ideal candidates. There is no exact formula for
determining how to virtualise, but best practices can
guide administrators who are examining their data centre.
Whether the Virtualisation initiative is being driven from
within the IT department or from the executive level,
this initial step is critical in assessing the feasibility of
Virtualisation.
2.	Build the business case. This may be less critical if the
push for Virtualisation is coming from executives, but
IT administrators hoping to convince management to
invest will need to have a thorough analysis. All costs
should be carefully considered, from hardware and
software to training and time. Less tangible items such as
organisational flexibility should be included in the list of
benefits.
3.	Train the staff. Once the plan is approved, IT staff will
need to begin building their knowledge and skills. Many
vendors offer training modules, and there are also a wide
range of consultative resources to consider. Certification
in Virtualisation can ensure that staff members are up to
speed on the most recent trends and best practices.
4.	Examine IT policies and plans. Policies surrounding
security and compliance will have to be modified for a
virtual environment. Even policies related to the physical
machines will have to be addressed, since there is now
a greater dependence on a host running several virtual
machines. In addition, plans such as disaster recovery and
business continuity will now take advantage of the virtual
infrastructure. This is a good time to involve other lines of
business in the Virtualisation planning.
5.	Start small. Attempting to virtualise as much infrastructure
as possible in the first iteration is likely to lead to mistakes
and higher costs. Virtualisation can be approached in
stages, which will give time for any issues to be resolved,
support structures to be put in place, and familiarity with
management tools to be built. Small implementations of
less critical applications provide learning opportunities for
larger implementations in the future.
6.	Monitor and adjust as needed. Virtualisation is not a
project with a defined end date. Instead, it is a new way of
operating IT, and as such it will be constantly adjusted as
with any business process. In addition to becoming more
adept at the technical aspects of Virtualisation, the IT
department can continue to learn more about the various
lines of business and how they use IT. This will give insight
as to how to optimise the virtual environment.
Though not every customer has sufficient computer resources
to benefit from a Virtualisation transition, knowing more
about the technology, the benefits, and the drawbacks will
help customers make educated decisions. As Virtualisation
continues to extend beyond servers into other functions,
solution providers and end users both will continue to find
innovative ways of operating in a virtual environment.
Taking Virtualisation Knowledge 	
Into the Cloud
•	 Those IT departments who maintain responsibility for server
maintenance can eventually move towards a private cloud
environment as automated resource management and self-
service provisioning are added to the virtualised solution.
•	 Public cloud users can ask their cloud providers about
the details of the virtual environment. Issues such as
security and restoration of service will depend on the
Virtualisation implementation, and users of Infrastructure
as a Service (IaaS) and Platform as a Service (PaaS) will
be provisioning and working on virtual machines.
www.comptia.org/communities
6 www.comptia.org/research
Appendix
Virtual Machine Virtual Machine
A virtualisation layer allows virtual machines, possibly with different operating systems,
to be created within the live operating system running on the host machine.
App App
OS1 OS2
Virtualisation Layer
OS
Hardware
App App
App App App
App App
Hosted Virtualisation
Container Container
The OS virtualisation layer creates separate containers,
all running the same operating system. These environments
run on the same base OS and hardware, but allow for individual processes and users
App App
OS1 OS2
OS Virtualisation Layer
OS
Hardware
App App
App App App
App App
OS Virtualisation
P O W E R E D B Y :
7
quick start guide
virtualisation
About Us
Stay Ahead of the Curve with CompTIA Research and
Market Intelligence
Every year, at least 15 new research studies provide members
with timely, relevant data and assessments that can be
immediately incorporated into business and marketing plans,
education, and sales strategies. Research studies typically
include the dual perspective of end users and IT firms and
adhere to rigorous research and ethical standards.
These studies offer the latest available information and trends
along with professional evaluation and projections for key
elements of the industry, including:
• Cloud/SaaS
• Healthcare IT
• IT security
• Managed IT services
• SMB market
• Government IT purchasing
• Green IT
• Channel intelligence
• Education
• Unified communications  collabouration
• Emerging technologies
• IT workforce
• Mobility
• IT industry business confidence
CompTIA members enjoy full access to all current and
archived reports, presentations, and white papers.
Members are encouraged to participate directly in the
research process by providing guidance on topics and
assisting in the design and formulation of the studies. They
are also invited to contact CompTIA research analysts at
research@comptia.org with questions regarding any study,
for assistance in finding data, or to discuss an aspect of the
IT industry.
Visit the Member Resource Centre and check out the
CompTIA ReSEARCH Engine today to discover a better way
to search for IT industry research and data. Simple and easy
to use, you’ll quickly find answers compiled solely from IT
industry, government, and CompTIA data sources.
For more information about CompTIA Research, visit
www.comptia.org/research.
About the UK Channel Community
CompTIA communities are the building blocks of the
Association’s industry- focused activities. Each group
engages a group of like-minded thought leaders in a
particular technology, market or business segment.
Community members discuss and develop initiatives
from hot topics, trends, and industry requirements that
are then managed with the resources and backing of
CompTIA, to ultimately help them grow their business.
The CompTIA UK Channel Community was formed in early
2011 following the acquisition of the Technology Channels
Association (TCA). The community was formed in an
effort to provide a platform for resellers, distributors, and
vendors to focus on developing best practices, business
education and resources for companies engaged in the
delivery of IT services in the UK.
The UK Channel Community meets face-to-face four
times a year, and monthly conference calls keep the
members up-to-date in between meetings. The group
also communicates with each other through the LinkedIn
forum. Non-members are also welcome to participate
in the online forum, access a selection of free pieces
of CompTIA education and attend events without
having the right to vote. CompTIA members have
full access to everything including our online forums,
education, certifications/credentials and events in
which they have full voting rights. For more information
about the CompTIA UK Channel Community or to get
involved in our community’s activities, please contact
communities@comptia.org.
www.comptia.org/uk
© 2012 CompTIA Properties, LLC , used under licence by CompTIA Member Services, LLC . All rights reserved. All membership activities and offerings to members of CompTIA, Inc. are
operated exclusively by CompTIA Member Services, LLC . CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names
mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent of
CompTIA Properties, LLC . Printed in the U.K. April 2012 2021-UK

Mais conteúdo relacionado

Mais procurados

Performance Enhancement of Cloud Computing using Clustering
Performance Enhancement of Cloud Computing using ClusteringPerformance Enhancement of Cloud Computing using Clustering
Performance Enhancement of Cloud Computing using ClusteringEditor IJMTER
 
Virtualization: A Sustainable Resource Management Strategy in Computing Pract...
Virtualization: A Sustainable Resource Management Strategy in Computing Pract...Virtualization: A Sustainable Resource Management Strategy in Computing Pract...
Virtualization: A Sustainable Resource Management Strategy in Computing Pract...iosrjce
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computingmciobo
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloudVan Pham
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloudsree raj
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingRevathi Ram
 
Virtualisation optimisation, the cloud and beyond
Virtualisation optimisation, the cloud and beyondVirtualisation optimisation, the cloud and beyond
Virtualisation optimisation, the cloud and beyondInteractiveIdeas
 
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareIBM India Smarter Computing
 

Mais procurados (16)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Performance Enhancement of Cloud Computing using Clustering
Performance Enhancement of Cloud Computing using ClusteringPerformance Enhancement of Cloud Computing using Clustering
Performance Enhancement of Cloud Computing using Clustering
 
Virtualization: A Sustainable Resource Management Strategy in Computing Pract...
Virtualization: A Sustainable Resource Management Strategy in Computing Pract...Virtualization: A Sustainable Resource Management Strategy in Computing Pract...
Virtualization: A Sustainable Resource Management Strategy in Computing Pract...
 
Enterprise virtual machine on IBM Cloud
Enterprise virtual machine on IBM CloudEnterprise virtual machine on IBM Cloud
Enterprise virtual machine on IBM Cloud
 
cloud computing
cloud computingcloud computing
cloud computing
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud
CloudCloud
Cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
cloud computng
cloud computng cloud computng
cloud computng
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Virtualisation optimisation, the cloud and beyond
Virtualisation optimisation, the cloud and beyondVirtualisation optimisation, the cloud and beyond
Virtualisation optimisation, the cloud and beyond
 
Cloud computing (3)
Cloud computing (3)Cloud computing (3)
Cloud computing (3)
 
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and Software
 

Destaque

Ghidul Cetateanului
Ghidul CetateanuluiGhidul Cetateanului
Ghidul Cetateanuluisoadyk
 
You Suck! Prevent & Address Negative Customer Feedback
You Suck! Prevent & Address Negative Customer FeedbackYou Suck! Prevent & Address Negative Customer Feedback
You Suck! Prevent & Address Negative Customer FeedbackAffiliate Summit
 
Environmental management
Environmental managementEnvironmental management
Environmental managementRajesh Mhade
 
Медийная реклама и PR в социальных сетях
Медийная реклама и PR в социальных сетяхМедийная реклама и PR в социальных сетях
Медийная реклама и PR в социальных сетяхAnna Milyukova
 
Social engineeringpresentation
Social engineeringpresentationSocial engineeringpresentation
Social engineeringpresentationDonna Rougeau
 
Laporan tugas ketiga (tik)
Laporan tugas ketiga (tik)Laporan tugas ketiga (tik)
Laporan tugas ketiga (tik)vivisukriani
 
перегородки
перегородкиперегородки
перегородкиBagina
 
The New Inbox and Other Innovations Part 2
The New Inbox and Other Innovations Part 2The New Inbox and Other Innovations Part 2
The New Inbox and Other Innovations Part 2Vivastream
 
Delitos informáticos
Delitos informáticosDelitos informáticos
Delitos informáticosSalvador2006
 
Attendance 15th january 2016
Attendance 15th january 2016Attendance 15th january 2016
Attendance 15th january 2016maggiebarton
 
Gold Well Introduction
Gold Well IntroductionGold Well Introduction
Gold Well IntroductionCoco He
 

Destaque (18)

Ghidul Cetateanului
Ghidul CetateanuluiGhidul Cetateanului
Ghidul Cetateanului
 
You Suck! Prevent & Address Negative Customer Feedback
You Suck! Prevent & Address Negative Customer FeedbackYou Suck! Prevent & Address Negative Customer Feedback
You Suck! Prevent & Address Negative Customer Feedback
 
Environmental management
Environmental managementEnvironmental management
Environmental management
 
Медийная реклама и PR в социальных сетях
Медийная реклама и PR в социальных сетяхМедийная реклама и PR в социальных сетях
Медийная реклама и PR в социальных сетях
 
Imperialism 2014
Imperialism 2014Imperialism 2014
Imperialism 2014
 
On going senteces 1.
On going senteces 1.On going senteces 1.
On going senteces 1.
 
Social engineeringpresentation
Social engineeringpresentationSocial engineeringpresentation
Social engineeringpresentation
 
Laporan tugas ketiga (tik)
Laporan tugas ketiga (tik)Laporan tugas ketiga (tik)
Laporan tugas ketiga (tik)
 
English Iv! Ultima
English Iv! UltimaEnglish Iv! Ultima
English Iv! Ultima
 
Brayan
BrayanBrayan
Brayan
 
перегородки
перегородкиперегородки
перегородки
 
The New Inbox and Other Innovations Part 2
The New Inbox and Other Innovations Part 2The New Inbox and Other Innovations Part 2
The New Inbox and Other Innovations Part 2
 
Delitos informáticos
Delitos informáticosDelitos informáticos
Delitos informáticos
 
Attendance 15th january 2016
Attendance 15th january 2016Attendance 15th january 2016
Attendance 15th january 2016
 
飢餓300
飢餓300飢餓300
飢餓300
 
Gold Well Introduction
Gold Well IntroductionGold Well Introduction
Gold Well Introduction
 
Age Gracefully
Age Gracefully Age Gracefully
Age Gracefully
 
Session 2.3 Gabeau
Session 2.3 GabeauSession 2.3 Gabeau
Session 2.3 Gabeau
 

Semelhante a Quick start guide_virtualization_uk_a4_online_2021-uk

IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxbudabrooks46239
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptMohammadArmanulHaque
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of VirtualizationHTS Hosting
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computingMehul Patel
 
Hardware Support for Efficient VirtualizationJohn Fisher-O
Hardware Support for Efficient VirtualizationJohn Fisher-OHardware Support for Efficient VirtualizationJohn Fisher-O
Hardware Support for Efficient VirtualizationJohn Fisher-Osimisterchristen
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation OverviewLogicalis
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session aleyeldean
 
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server FamilyThe Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server FamilyIBM India Smarter Computing
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computingijtsrd
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software TestingColloquium
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmwareWilson Erique
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentationhimanshu_ppt
 
Virtulization
VirtulizationVirtulization
VirtulizationAntu Sabu
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxvrickens
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Journals
 

Semelhante a Quick start guide_virtualization_uk_a4_online_2021-uk (20)

IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Hardware Support for Efficient VirtualizationJohn Fisher-O
Hardware Support for Efficient VirtualizationJohn Fisher-OHardware Support for Efficient VirtualizationJohn Fisher-O
Hardware Support for Efficient VirtualizationJohn Fisher-O
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server FamilyThe Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
The Value Of Memory-Dense Servers IBM’s System X Max5 For Its Ex5 Server Family
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage Architecture
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Virtulization
VirtulizationVirtulization
Virtulization
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 

Mais de Assespro Nacional

2018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-20172018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-2017Assespro Nacional
 
WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4Assespro Nacional
 
WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3Assespro Nacional
 
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...Assespro Nacional
 
2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: ResultadosAssespro Nacional
 
Dissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaDissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaAssespro Nacional
 
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping IIAssespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - AtestadosAssespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - ClippingAssespro Nacional
 
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - DepoimentosAssespro Nacional
 
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Assespro Nacional
 
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...Assespro Nacional
 
[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo DeclarationAssespro Nacional
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...Assespro Nacional
 
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...Assespro Nacional
 
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of MacedoniaAssespro Nacional
 
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and ServicesAssespro Nacional
 

Mais de Assespro Nacional (20)

2018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-20172018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-2017
 
WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4
 
WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3
 
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
 
2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados
 
Dissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaDissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz Paiva
 
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
 
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
 
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
 
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
 
Censo do Setor de TI 2013
Censo do Setor de TI 2013 Censo do Setor de TI 2013
Censo do Setor de TI 2013
 
[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
 
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
 
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
 
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Quick start guide_virtualization_uk_a4_online_2021-uk

  • 1. www.comptia.org/communities www.comptia.org/communities Q U I C K S TA R T G U I D E www.comptia.org/uk P O W E R E D B Y : Virtualisation A Practical Guide for Solution Providers
  • 2. www.comptia.org/communities 2 www.comptia.org/research Virtualisation A Practical Guide for Solution Providers Since the early days of computing, there has been a push to utilise compute resources as efficiently as possible. In the 1960s, IBM developed Virtualisation technology as a way to break a single physical mainframe computer into several logical partitions. Each partition could host a separate application, allowing the mainframe to multitask. To enable this partitioning, IBM designed the mainframe with Virtualisation in mind, optimising the hardware to run a Virtual Machine Monitor (VMM) that controlled the partitions (also known as virtual machines). This VMM was originally termed a supervisor, but as it extended to control multiple machines, it became known as a hypervisor. In the 1980s and 1990s, the client-server model along with lower prices for hardware with greater capabilities caused Virtualisation to became a lower priority. Customers could buy multiple inexpensive x86 machines to replace mainframes, and x86 hardware and the Windows operating system were optimised to run single applications. Eventually, cost pressures drove new demand to virtualise x86 systems as well. Virtualisation gained a new life when VMWare introduced a hypervisor that could run on x86 architecture. Virtualisation has become a critical component of many corporate IT strategies and is a foundational technology in cloud computing. However, CompTIA research finds that although firms are moving rapidly into the cloud, there is less adoption and familiarity with Virtualisation. Understanding this underlying element of the cloud will help these firms better understand how to address issues such as cost structure and security. How Virtualisation Works The primary function of Virtualisation is to allocate resources intelligently for optimal use. This is done mainly through two pieces of hardware: the hypervisor and the management software. In a single-application environment, the operating system is installed directly on the hardware, and subsequent applications are installed in the operating system. Operating systems derive their Source: IDC 2010 Server Virtualisation Module 2011 2012 2013 2014 200 2012 2012 2013 Growing Virtualisation Needs Physical Server Shipments (in millions) Virtual Machines (as a share of total server market) 7.7 19% 20% 22% 23% 8.2 8.6 9 As physical machine ship- ments are growing, virtual machines are growing even more rapidly and becoming a larger part of the overall server market.
  • 3. P O W E R E D B Y : 3 quick start guide virtualisation power from the fact that they have intricate knowledge of the hardware, using a kernel that directly communicates with the processor, memory, and other devices. The hypervisor performs the same function, but instead of applications being installed on the hypervisor, complete operating systems are installed. A hypervisor directly accesses the hardware of the host system, and then presents subsets of those resources to each operating system that is installed, creating virtual machines that are completely self-contained. While the hypervisor is the enabler of Virtualisation, the management software is the differentiator among Virtualisation vendors. As Virtualisation implementations become more and more complex, the need to manage becomes more critical. Management software provides the ability to monitor virtual machines and ensure they are operating properly. It also allows system administrators to optimise the resources that are being allocated among all virtual machines. Server Virtualisation is the most common application of the technology, but storage and networks have also become candidates for Virtualisation. Network-Attached Storage (NAS) and Storage Area Networks (SANs) provide abstracted storage options for virtual machines to access. SANs are more expensive implementations and are typically used by large enterprises. Virtual Local Area Networks (VLANs) can group devices on a network logically rather than physically, giving administrators the ability to resegment networks without physically rearranging devices or connections. These advances are leading to the notion of a fully virtualised data centre, and as all three Virtualisation techniques are employed, the management software becomes increasingly important. Benefits of Virtualisation Most Virtualisation projects begin as an effort to consolidate resources, gaining back efficiencies that were lost as servers were underutilised by the applications running on them. As resources are consolidated, the number of physical servers or storage devices needed to maintain operations decreases. This in turn reduces the energy demands of the resource pool. There are some benefits to be realised in managing the physical infrastructure in a virtual environment. New machine requests no longer require approval of a complete system and integration into a data centre. Instead, a machine that is acting as a host may simply need additional memory to accommodate new requests. In addition to the data centre changes, the structure of an IT department will change. Management of a virtual environment is less labour-intensive, though the work itself is of a different nature. Installation and maintenance are much simpler and happen much faster in a virtual environment, and applications can more easily be moved between virtual machines. Those personnel who previously supported physical servers can be allocated to other IT work that advances the objectives of an organisation. • Nationwide Insurance reduced its number of physical servers from 5000 to 3500 and increased utilisation rates from 10% to 65%. This reduced hardware and operating system support costs 20%-50%. • St. Vincent’s Hospital Manhattan was able to achieve a 50% reduction in servers. In addition, the hospital found that Virtualisation could be used to establish development, test, and production environments without the cost of three separate infrastructures. • The Berryessa Union School District in California consolidated 32 conventional servers to four blade servers. Desktop resources doubled from 700 to 1400 available systems, and fix time improved from weeks to minutes as onsite visits were replaced by virtual machine repair. Examples of Virtualisation Savings Note: the diagram shows a form of server Virtualisation known as bare-metal Virtualisation. Diagrams showing hosted Virtualisation and OS Virtualisation can be found in the appendix. Virtual Machine Virtual Machine App App OS OS Hypervisor Hardware App Hardware App App OS App App App App Virtual Machine OS App App App Non-virtualised server Virtualised server
  • 4. www.comptia.org/communities 4 www.comptia.org/research The changes in the IT department do not end with virtual machine management, though. Virtualisation opens the door for more robust features and increased flexibility. Backup and disaster recovery are implemented differently, but more simply, than in a physical environment. The ability to quickly move applications or bring up new machines brings a new level of agility. Adding in intelligence for resource utilisation and dynamic allocation of those resources is what can then turn Virtualisation into a cloud solution. As organisations move more of their operations into the cloud and also grapple with the implications of mobile device use within the corporation, Virtualisation continues to evolve. For example, IT administrators are examining new uses for virtual desktops, in which employees use their desktop, laptop, tablet, or smartphone to access to a virtual machine running on a server. Many core applications and data are accessed through this virtual desktop, giving the IT department more of an ability to control access to corporate systems. Issues With Virtualisation The change to IT operations can be a benefit, but it is also an area of concern. Decoupling applications from physical machines leads to greater efficiencies, but it also requires a new knowledge of Virtualisation techniques and a new mindset towards compute resources. There will be a learning curve for IT administrators coming from a traditional environment, and there will also be education needed for end users. There is also a learning curve involved in understanding the best use of Virtualisation. There are performance considerations in consolidating resources. Workloads have to be analysed, and certain applications—such as SQL databases and Voice over IP (VoIP)—should be carefully examined to determine if they are Virtualisation candidates. Administrators will need to ensure that peak demands can be met as applications are sharing the resource pool and that applications do not suffer from being virtualised. In restructuring an IT department to handle virtual machines, the policies will also have to be addressed. Virtual machines are simpler to bring up than physical machines, but this can lead to a proliferation of machines that is hard to manage. Some companies store images for starting up virtual machines to save the time involved in configuring the machine for specific applications. These images also must be tracked and maintained. Security is one of the most important policies to address. The hypervisor adds a layer of software to the operational stack, which in turn adds vulnerabilities. There must be a plan for the security of each machine—including the host machine and all virtual machines. Communications between machines also must be monitored, and in the case of virtual machines on a single host talking to each other, this communication does not have external components that can be monitored. Existing security policies will need to be modified to handle these issues, and additional tools may be required to secure the virtual infrastructure. Compliance must also be monitored in a virtual environment. A single host may have a virtual machine with PCI information and other virtual machines without that information. This is allowed by the regulations, but additional care is needed to ensure that data does not cross the virtual machine boundaries. Finally, a new focus on Virtualisation techniques should not come at the cost of managing the physical infrastructure. There are benefits to consolidation, but it also means that host machines become more critical as they support multiple applications. It is worthwhile to revisit policy related to monitoring physical resources and ensuring redundancy. These issues are not insurmountable. There are a wide variety of vendors and service providers who can assist with these areas. However, dealing with these issues adds to the cost of Virtualisation. It may be simple to calculate how many physical servers can be removed by virtualising or how much energy is saved, but the additional costs of training and policy changes must be taken into account. For this reason, calculating ROI on Virtualisation is not a trivial matter. In a general sense, the economics of Virtualisation are a net benefit to companies. But it is up to individual firms to assess their Virtualisation strategy and lay out the proper investment plan.
  • 5. P O W E R E D B Y : 5 quick start guide virtualisation Getting Started With Virtualisation For those companies who have not yet virtualised their compute resource, Virtualisation may still be a good step to take prior to considering cloud solutions. This will give some experience with virtual environments that may prove beneficial when dealing with cloud issues. As with all IT projects, a thorough plan is the best path for success. 1. Understand your workloads. Server consolidation will only be effective if there are a sufficient number of underutilised servers running similar workloads. Administrators can start by monitoring performance loads to understand the peak demand for resources. Next, applications should be examined. Applications that require very low latency are still in the early stages of being virtualised and may not be ideal candidates. There is no exact formula for determining how to virtualise, but best practices can guide administrators who are examining their data centre. Whether the Virtualisation initiative is being driven from within the IT department or from the executive level, this initial step is critical in assessing the feasibility of Virtualisation. 2. Build the business case. This may be less critical if the push for Virtualisation is coming from executives, but IT administrators hoping to convince management to invest will need to have a thorough analysis. All costs should be carefully considered, from hardware and software to training and time. Less tangible items such as organisational flexibility should be included in the list of benefits. 3. Train the staff. Once the plan is approved, IT staff will need to begin building their knowledge and skills. Many vendors offer training modules, and there are also a wide range of consultative resources to consider. Certification in Virtualisation can ensure that staff members are up to speed on the most recent trends and best practices. 4. Examine IT policies and plans. Policies surrounding security and compliance will have to be modified for a virtual environment. Even policies related to the physical machines will have to be addressed, since there is now a greater dependence on a host running several virtual machines. In addition, plans such as disaster recovery and business continuity will now take advantage of the virtual infrastructure. This is a good time to involve other lines of business in the Virtualisation planning. 5. Start small. Attempting to virtualise as much infrastructure as possible in the first iteration is likely to lead to mistakes and higher costs. Virtualisation can be approached in stages, which will give time for any issues to be resolved, support structures to be put in place, and familiarity with management tools to be built. Small implementations of less critical applications provide learning opportunities for larger implementations in the future. 6. Monitor and adjust as needed. Virtualisation is not a project with a defined end date. Instead, it is a new way of operating IT, and as such it will be constantly adjusted as with any business process. In addition to becoming more adept at the technical aspects of Virtualisation, the IT department can continue to learn more about the various lines of business and how they use IT. This will give insight as to how to optimise the virtual environment. Though not every customer has sufficient computer resources to benefit from a Virtualisation transition, knowing more about the technology, the benefits, and the drawbacks will help customers make educated decisions. As Virtualisation continues to extend beyond servers into other functions, solution providers and end users both will continue to find innovative ways of operating in a virtual environment. Taking Virtualisation Knowledge Into the Cloud • Those IT departments who maintain responsibility for server maintenance can eventually move towards a private cloud environment as automated resource management and self- service provisioning are added to the virtualised solution. • Public cloud users can ask their cloud providers about the details of the virtual environment. Issues such as security and restoration of service will depend on the Virtualisation implementation, and users of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) will be provisioning and working on virtual machines.
  • 6. www.comptia.org/communities 6 www.comptia.org/research Appendix Virtual Machine Virtual Machine A virtualisation layer allows virtual machines, possibly with different operating systems, to be created within the live operating system running on the host machine. App App OS1 OS2 Virtualisation Layer OS Hardware App App App App App App App Hosted Virtualisation Container Container The OS virtualisation layer creates separate containers, all running the same operating system. These environments run on the same base OS and hardware, but allow for individual processes and users App App OS1 OS2 OS Virtualisation Layer OS Hardware App App App App App App App OS Virtualisation
  • 7. P O W E R E D B Y : 7 quick start guide virtualisation About Us Stay Ahead of the Curve with CompTIA Research and Market Intelligence Every year, at least 15 new research studies provide members with timely, relevant data and assessments that can be immediately incorporated into business and marketing plans, education, and sales strategies. Research studies typically include the dual perspective of end users and IT firms and adhere to rigorous research and ethical standards. These studies offer the latest available information and trends along with professional evaluation and projections for key elements of the industry, including: • Cloud/SaaS • Healthcare IT • IT security • Managed IT services • SMB market • Government IT purchasing • Green IT • Channel intelligence • Education • Unified communications collabouration • Emerging technologies • IT workforce • Mobility • IT industry business confidence CompTIA members enjoy full access to all current and archived reports, presentations, and white papers. Members are encouraged to participate directly in the research process by providing guidance on topics and assisting in the design and formulation of the studies. They are also invited to contact CompTIA research analysts at research@comptia.org with questions regarding any study, for assistance in finding data, or to discuss an aspect of the IT industry. Visit the Member Resource Centre and check out the CompTIA ReSEARCH Engine today to discover a better way to search for IT industry research and data. Simple and easy to use, you’ll quickly find answers compiled solely from IT industry, government, and CompTIA data sources. For more information about CompTIA Research, visit www.comptia.org/research. About the UK Channel Community CompTIA communities are the building blocks of the Association’s industry- focused activities. Each group engages a group of like-minded thought leaders in a particular technology, market or business segment. Community members discuss and develop initiatives from hot topics, trends, and industry requirements that are then managed with the resources and backing of CompTIA, to ultimately help them grow their business. The CompTIA UK Channel Community was formed in early 2011 following the acquisition of the Technology Channels Association (TCA). The community was formed in an effort to provide a platform for resellers, distributors, and vendors to focus on developing best practices, business education and resources for companies engaged in the delivery of IT services in the UK. The UK Channel Community meets face-to-face four times a year, and monthly conference calls keep the members up-to-date in between meetings. The group also communicates with each other through the LinkedIn forum. Non-members are also welcome to participate in the online forum, access a selection of free pieces of CompTIA education and attend events without having the right to vote. CompTIA members have full access to everything including our online forums, education, certifications/credentials and events in which they have full voting rights. For more information about the CompTIA UK Channel Community or to get involved in our community’s activities, please contact communities@comptia.org.
  • 8. www.comptia.org/uk © 2012 CompTIA Properties, LLC , used under licence by CompTIA Member Services, LLC . All rights reserved. All membership activities and offerings to members of CompTIA, Inc. are operated exclusively by CompTIA Member Services, LLC . CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent of CompTIA Properties, LLC . Printed in the U.K. April 2012 2021-UK