StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Defining the Subliminal Reality: Virtualization - Report Example

Cite this document
Summary
This report "Defining the Subliminal Reality: Virtualization" presents one of the most essential concepts that will continue to play a dramatic role in the century. Virtualization is a vital component for organizations as it upholds security and allows corporations to implement a modern IT system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Defining the Subliminal Reality: Virtualization
Read Text Preview

Extract of sample "Defining the Subliminal Reality: Virtualization"

?Defining the subliminal reality: Virtualization Virtualization is one of the most essential concepts that will continue to play a dramatic role in the modern century. Virtualization is undoubtedly a vital components for organization as it upholds security, embeds flexibility and allows corporations to implement a modern IT system. The problem that majority companies faced with the traditional IT infrastructure consists of several problems. One of the critical problems is the fact that it takes high energy costs. In addition, the traditional mainframe networks take too much space. Furthermore, the heat that is generated through these servers must be cooled. In fact, recent studies have found that organizations achieved on average an 18% reduction in their budget from cloud computing and a 16% reduction in data costs. Hence, virtualization should be embraced by organizations because it is cost-effective, flexible, and provides safe process of security protocols. As society progressed to 21st century, the criteria of defining and creating a feasible IT infrastructure continue to be a huge focal point for many companies. As mentioned above, many servers tend to create a huge problem with the traditional IT infrastructure. The problem with this idea is the fact that 90% of the time servers are not fully utilized. In order to combat this huge problem, the IT department attempts to install more applications. However, that is only a “band-aid” approach to a long-term problem. The result often times is the fact that that this solution is ineffective and unreliable. As the accumulation of factors such as: high energy costs, space issues, and generating heat become a huge issue, companies must seek a new and better solution that is available. Hence, virtualization is a cost-effective solution because it is a revolutionary concept that allows corporations to dynamically alter the current thinking of their IT infrastructure. Virtualization allows companies to be cost-effective as energy costs are saved through many deliverables. When a company utilizes virtualization, it does not have to worry buying fans to reduce the extra heat that must be cooled. Hence, the result often includes companies to be inefficient as these solutions take time, money, energy and technical expertise. Another amazing benefit of virtualization is the fact that it allows the organization’s system to be fully robust. Virtualization in essences allows the company to have a system that is flexible, independent, reliable, mobile and secured. Moreover, it can automate the IT process, manage a heterogeneous client environment, enhance application performance, and increase server utilization. Clearly, the biggest need for any organization is to foster an environment is data preservation and availability of service. For instance, a unique type of virtualization that is known as desktop virtualization is a prime example of the benefits that are illustrated in virtualization. Desktop virtualization allows organization to isolate machines in the network in an efficient manner. Moreover, it allows users to have a centralized data management system in which security and compliance is extremely enhanced. The unique element of virtualization is the fact that it can allocate resources effectively in a client/server model. Unlike conventional model of networking in which power is allocated to one client, virtualization enables users to grant resource and power based on demand, not based on priority. This undoubtedly leads to enhanced business continuity and remote access. Another unique element that is depicted in desktop virtualization is the fact that desktop virtualization enables users to do are flawless switching of application. Lastly, it eliminates the problem of reinstallation. For instance, if the network has to configure upgrades, clients do not have to log off in order to achieve the upgrade. Since the upgrade is so dynamic, virtualization allows companies to be efficient and productive. The third element of virtualization that is highly beneficial for organizations is the fact that it provides a complete and enhanced view of security measures. Unlike traditional firewalls that only guard the parameters of the traditional IT infrastructure, virtualization firewalls provide comprehensive security measures that monitor activity within clients. If one machine is to be attacked by a host, the other machine automatically copies data in almost dynamic time that the user is not aware of the situation. Clearly, that is a huge benefit for organizations since it allows them to have a safety net in case of an attack. The Intrusion Detection System (IDS) is a critical precautionary tool that monitors the network through monitoring packets that are passed within users. The first and easiest application of virtualization for security purposes is known as application isolation. This is a huge component towards the security aspect because it allows IT managers to gain leverage over application stability and application allocation. Currently the two major IT trends that continue to trend in organization is cloud computing and virtualization. Cloud Computing and Real-Time Infrastructure (RTI) along with virtualization are all some concepts that continue to dynamically evolve in the 21st century. Similar to virtualization, Cloud computing is not a new technology, but an innovation that is a method of delivering information using the current technologies. The internet infrastructure historically has allowed communication between client side and the server. Since cloud computing allows users to obtain multitenancy, which means users are sharing resources. Since the cloud provides a layer of abstraction between the computing resources and the architecture involved, the customers do not own the environment but are obligated to pay a subscription fee and the cloud service provider grants them access to the clouds. Cloud computing allows organizations with same benefits as virtualization. With the advent of cloud computing and Virtualization, security has become huge focal point in both IT environment. With the advent of cloud computing, many black hat hackers continue to utilize many methods to exploit these types of environment. One type attack is known as network sniffing. Utilizing a packet sniffer, an attacker can capture sensitive data if unencrypted such as passwords and other essential configurations. Another threat that is used by majority of the hackers is known as port scanning. However, port 80 is always open since the server resides on top if it. In order to protect these intrusions, a user can easily encrypt date. With the usage of public and private keys, encryption can be achieved. Encrypting data clearly mitigates the risk of an intrusion attack that can cause drastic damage. Moreover, VPNs and VLANs and strong encryption along with secure transport layer security. Cloud computing is dictated by private and public clouds. Corporations prefer private clouds because administrators control access through policies which designate capabilities. Private clouds also have a great capability to maintain a secured environment and be integrated with a public cloud. Moreover, the delegated administrators can manage a scoped environment. In addition, a self service user has many features to utilize in their network. For instance, Microsoft Cloud computing software allows individuals to have a fully integrated a web user interface. Although encryption is essential in any network; one cannot underestimate the role of intrusion detecting systems in a cloud environment. An intrusion detecting system is vital as it can play a dramatic role to monitor activity and eliminate them before a problem occurs. Another security measure that can be taken is known as “para virtualization”. Since “para virtualized” guests rely on the hypervisor to obtain support from operations which would require privileged access traditionally, the guest can only have “read access rights.” Moreover, Using scripts can be beneficial as the administrator can overview the activities that occur within a cloud network. Any changes should be approved, documented, and tested that are conducted by the administrator. All these security measures can drastically facilitate the attempt to secure a cloud based environment. Although both cloud computing and virtualizations have many benefits, they do have disadvantages. For instance, virtualization is never going to be utilized by banks or large healthcare subsidiaries because it cannot hold large volumes of transactions simultaneously. One can argue that servers have their own place in traditional organizations because they can accommodate the needs of large organizations. Moreover, the problems that exist in cloud computing and virtualization heavily focuses around segregation of duties. Segregation of duties is also associated with IT Internal control in which one user does not have all the power to direct these cloud networks. Additionally, the benefit of the cloud environment is the security they provide. Unlike traditional firewalls, which only create protection only outside the framework of network, cloud computing firewalls monitor activity within users. In essence, if one machine is to be attacked within the framework of the network, the firewalls would detect this intrusion at once. Threats that fall under availability completion causes increased failure and make clouds ready to be exploited by hackers, which diminish the whole purpose of cloud environments. Thus, securing these environments is highly crucial in any organization. Since the bounties and benefits of virtualization are endless, my organization has taken a solid approach to implement virtualization at the work place. For instance, at Blue Cross and Blue Shield, the leader in providing health care services, has embraced the idea of virtualization and adapted in their current IT infrastructure. One of the main concerns of the organization was to reduce cost of their servers and address the issue of a growing customer base that was vital for their organizational needs. Enacting the methods of virtualization allows Blue Cross and Blue Shield to attain a higher state of efficiency. First and foremost, it saved the company money as they did not have to invest in cumbersome servers that were taking up space. However, the key benefit that the Blue Cross achieved was the fact that it allowed its customers to accessibility of information without much delay. In an industry where information is vital, this organization was able to accommodate the needs of their growing customers as well as provide information that were compliant with HIPAA and ACA. Blue Cross had a huge dilemma of expanding their IT infrastructure boundaries by maintaining old records and creating space for new customers. Furthermore, the company’s auditing team was able to ensure the legitimacy of network passwords within their own IT infrastructure. In case of an emergency situation, host lockdowns were provided to individuals based on their role. In essence, virtualization has allowed the company to achieve a higher level of security and efficiency as it can dictate its settings based on government regulations and its own protocols. Clearly, virtualization has many benefits and can dramatically dynamically change the current model of traditional IT infrastructure. As a current IT trend pending, many companies will depend on virtualization in order to achieve a network that is fast, robust, intelligent, cost-efficient and secured. As with many technologies, companies are hesitant to embrace this idea. However, with proper knowledge and specialized training, companies can truly embed virtualization as part of their IT infrastructure and can attain these benefits. Works Cited virtualization.info | Security by virtualization. (n.d.). virtualization.info | News digest about virtualization technologies, products, market trends. Since 2003.. Retrieved November 18, 2011, from http://virtualization.info/en/news/2006/07/security-by-virtualization.html Knorr, E. (n.d.). What cloud computing really means | Cloud Computing - InfoWorld. Business technology, IT news, product reviews and enterprise IT strategies - InfoWorld. Retrieved November 18, 2011, from http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031 Halter, E. M., & Wolf, C. (2005). Virtualization. New York: Chris Wolf and Erick M. Halter. Size, C. (n.d.). VMware Virtualization Software for Desktops, Servers & Virtual Machines for Public and Private Cloud Solutions. VMware Virtualization Software for Desktops, Servers & Virtual Machines for Public and Private Cloud Solutions. Retrieved November 18, 2011, from Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Virtualization Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Virtualization Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1437048-virtualization-describe-a-major-it-trend-that-is
(Virtualization Essay Example | Topics and Well Written Essays - 1500 Words)
Virtualization Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1437048-virtualization-describe-a-major-it-trend-that-is.
“Virtualization Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1437048-virtualization-describe-a-major-it-trend-that-is.
  • Cited: 0 times

CHECK THESE SAMPLES OF Defining the Subliminal Reality: Virtualization

Virtualisation Technologies

This paper ''Virtualisation Technologies'' tells that virtualization is simply creating an online-based system that can be used to deliver processes.... hellip; virtualization is being deployed and implemented by many institutions of all kinds across the world.... Economic benefits of virtualization Virtualisation has had many economic benefits for the New Castle College....
13 Pages (3250 words) Essay

Computer Systems and Virtualization

The paper "Computer Systems and virtualization" highlights that the Virtual Directory is a separate register including a website that connects to an additional directory.... The Midrange virtualization includes Solaris containers and zones and the commodity virtualization consists of VM ware, Oracle VM and Xen.... The desktop virtualization is categorized in two PC / MAC and Virtual desktop infrastructure (VDI).... VDI consists of Oracle VDI and desktop virtualization by Citrix....
13 Pages (3250 words) Assignment

Advertising: Subliminal Messages

This paper discusses how advertisement influences our buying decisions with subliminal messages and psychological trickery.... This essay "Advertising: subliminal Messages" outlines how the advertisement using psychology tricks makes us buy some product.... A subliminal message is a message which appeals to our sub-conscience.... Suggestive subliminal messages should be viewed the same way....
11 Pages (2750 words) Essay

Virtualization across the Board

At the same time, it is essential that both performance of the… virtualization has been seen to improve the overall performance of various companies without having an impact on uptime or the performance of the IT systems. According to a study done by sagelogix (2011), ehensive performance metrics was done on an environment that had 38 physical servers, and x-servers that were providing a variety of services like running an oracle database.... On cost management, the study proved that cost savings could be increased by using some of the virtualization products offered by Oracle....
4 Pages (1000 words) Assignment

Concepts Associated with Desktop Virtualization

Desktop virtualization is one of the technologies, which is used to separate the physical setting of a client device with regard to the logical interface.... In other words, desktop virtualization is accessed by the users devoid of being tied to a particular hardware device.... This… Desktop virtualization is in the market for quiet sometime, however it has gained its importance in recent times.... Propagation of desktop devices in accordance with the The notion of desktop virtualization is turning out to be a deliberate IT practice in the recent years (Intel Corporation 3-20)....
4 Pages (1000 words) Assignment

Virtualization and Security

The paper "virtualization and Security" discusses that most of the organization nowadays adopts the method of storing data in the virtual server instead of using a physical server.... virtualization involves the process of creating a virtual version instead of the actual thing.... hellip; The user should take caution against threats against virtualization such as theft, virus hacking, Trajons and several others.... virtualization refers to the process of generating a virtual version of something that relates to its actual version....
9 Pages (2250 words) Essay

Server Virtualization

This paper, Server virtualization, outlines that the rise of popularity of networked systems has spurred an increase in client/server applications.... virtualization is a technique that is used to alter one or more properties of the service, without modification to the clients or servers....
9 Pages (2250 words) Term Paper

Cloud Computing Virtualisation Security Threats

The purpose of this paper is to present an overview of the various virtualization security vulnerabilities plus threats that are particular to hypervisors.... virtualization makes the concept complicated but never makes security better or worse.... There exists a set of crucial security concerns to be addresses if considering virtualization in a cloud computing environment.... The purpose of this paper is to present an overview of the various virtualization security vulnerabilities plus threats that are particular to hypervisors....
6 Pages (1500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us