Many companies yet not explored the capabilities of x86 virtualization. For more than ten years, x86 virtualization is on the priority list of IT managers. More than three quarters of all the companies would take advantage of virtualization techniques to the end of 2013, six out of ten workloads are then already in virtual machines (VMs). The market for hypervisor has matured, the consolidated … [Read more...]
Virtualization
Virtualization and various virtualization related technologies has been explained including hardware virtualization, Software virtualization.
Oracle Engineered System for Application Virtualization
Oracle engineered system for Application Virtualization is apparently newer. It is an integrated system that can virtualize with virtually any (x86) workloads. The Virtual Compute Appliance is the latest addition to the family of so-called Engineered Systems, through which Oracle exploit expertise in the integration of software and hardware and wants to sell their customers an … [Read more...]
Cloud Computing : The now Non-Existent Border Between Free and Profit
Cloud Computing is entering through open source and free softwares. In recent years, Open Nebula, Open Stack, Eucalyptus have offered several alternatives. First the services of Amazon's cloud computing opened the way for a boom in the computer industry for powerful and flexible service only available at that time on the Internet. Now the same technology is entering the market of the major … [Read more...]
Host in Computer Network
Host in computer network refers to the clients or server hosts. The term host used in computing since the early 1960s in connection with mainframe computers. After Computer Networks conquered the everyday life in the 1980s, the term was also used for device connected to a network computers that provided services mostly to smaller or less powerful systems. In addition to the complex operating … [Read more...]
Virtualization : Essential To Know Before Moving to Cloud Computing
Virtualization is an investment for the long term. It is unthinkable to adopt cloud computing solutions without virtualization, at least for basic IT services. Companies are quite carefully considering now for switching to cloud computing, but this trend requires to know the existence of a virtual infrastructure, a necessary step to implement cloud computing in your own data center. How many SMEs … [Read more...]
Multiple Server Swift Installation : Outline
Multiple Server OpenStack Swift Installation appears a bit confusing to the new users who wants to create an cloud instance for storage. It is definitely not possible for all the Universities to arrange multiple bigger instances of own bare metal, possibly testing the softwares on own Servers becomes prohibitive for cost. The terminology Cloud itself is too much business centric. We have to … [Read more...]
How to Organize Cloud Infrastructure : Lesson 2
Every company nowadays, has essentially two basic needs that can be met through IT and the Internet - the accessibility by and speeding up the works. This article is named How to Organize Cloud Infrastructure Lesson 2 as the first and foremost important step to plan and get the maximum ROI has been discussed before. To satisfy the customers, to keep the activities official and organized; the … [Read more...]
XenServer is Now Open Source : Create Virtual Machines for Free
XenServer allows you to create and manage virtual machines within one or more physical nodes, it is now fully open source like prior to acquisition by Citrix. XenServer is again back to the basics and dusts off heir open source root of origin. In conjunction with the release of the new version 6.2, Citrix Systems makes XenServer and all its extensions available to all, distinguishing between free … [Read more...]
Comprehensive Cloud Security Strategy
Comprehensive cloud security strategy in brief describes the key points of a perfect approach for cloud computing security. Written in plain simple English for increasing consciousness about security and privacy. The key points of a cloud security approach are : The protection of infrastructure The protection of data Secure authentication and user authentication (Identity Management) The … [Read more...]
Security Risk and Virtualization : Network and Migrate Virtual Machines
Security Risk and Virtualization is layered issue and multi factorial. We have discussed the points descriptively through three separate articles. Just a quick recall - the first article is the most important one as it indexes the points. Second article was on Securing VM and Monitoring VDS. This is the third article of the series and we will discuss the 5th point - Identify the high risk networks … [Read more...]
Security Risk and Virtualization : Secure VM and Monitor VDS
Security Risk and Virtualization is multi-factorial which has been discussed before. This article is a part of measures to decrease the security risks and part of the above linked index article. So, we are discussing the 4th point, Use Secure virtual machines in the linked article and the 7th point - Monitor virtual desktops within this article. It is beyond saying that you must know the details … [Read more...]