Wednesday, June 19, 2019
Security Issues Within Virtualization Coursework
Security Issues Within Virtualization - Coursework ExampleCitrix Systems, Inc. (2008, October). Citrix xenserver V5.0 and netapp storage best practices. Retrieved from CITRIX Web post http//www.citrix.com/site/resources/dynamic/partnerDocs/CitrixXSNetAppStorageBestPracticesGuidefinal.pdfThis article shows the best way to use NetApp storage systems and Citrix XenServer. It also speaks about the future of these methods in the furthering of virtualization. Although pushing their product, this article has good information.The great IT greet is reduced by the virtual desktop. The need to download extra software and patches are thing of the past according to this article. Since it was written in 2005, the author is profuse of promise for the virtual desktop, with no concern. This is important to show the attitude when the virtual desktop was new.This web site provides devil to technology white papers and place provide me with an excellent source of information on the subject of virtua lization. Most of the technology is being developed by well know vendors, having easy access to their technology white papers will help provide a reliable source for information.Ghodke, N. (2004). Virtualization techniques to enable transparent access to Peripheral devices across networks (Masters Thesis, University Of Florida, 2004). Retrieved from http//etd.fcla.edu/UF/UFE0005684/ghodke_n.pdf galore(postnominal) individuals get excited about virtualization without taking into account the protective covering measures necessary to run virtualization without being hacked or interfered with by outside sources. This article informs about security measures needed.This article also speaks about security for virtualized environments. The authors did an empirical study into the security exposure to hosts of hostile virtualized environments. Their findings were very interesting and vital to my research.This article speaks about the unappreciated factors of virtualization. Mike Rothman bel ieves that there are a number of potential
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment