0%

Book Description

What exactly is virtualization? As this concise book explains, virtualization is a smorgasbord of technologies that offer organizations many advantages, whether you're managing extremely large stores of rapidly changing data, scaling out an application, or harnessing huge amounts of computational power. With this guide, you get an overview of the five main types of virtualization technology, along with information on security, management, and modern use cases.

Topics include:

  • Access virtualization—Allows access to any application from any device
  • Application virtualization—Enables applications to run on many different operating systems and hardware platforms
  • Processing virtualization—Makes one system seem like many, or many seem like one
  • Network virtualization—Presents an artificial view of the network that differs from the physical reality
  • Storage virtualization—Allows many systems to share the same storage devices, enables concealing the location of storage systems, and more

Table of Contents

  1. Preface
    1. About This Book
    2. Conventions Used in This Book
    3. Using Code Examples
    4. Safari® Books Online
    5. How to Contact Us
  2. 1. A Model of Virtualization
    1. Model of Virtualization
    2. What Is Virtualization?
    3. Layers of Virtualization at Work
    4. Goals of Virtualization
  3. 2. Access Virtualization: Providing Universal Access
    1. What Is Access Virtualization?
    2. What Does Access Virtualization Do?
    3. When Is Access Virtualization the Right Choice?
    4. Players in the Access Virtualization World
    5. A Few Examples of Access Virtualization in Use
  4. 3. Application Virtualization: Application Isolation, Delivery and Performance
    1. What Is Application Virtualization?
    2. What Does Application Virtualization Do?
    3. When Is Application Virtualization a Suggested Approach?
    4. Players in the Application Virtualization World
    5. A Few Examples of Application Virtualization in Use
  5. 4. Processing Virtualization: Doing System Tricks
    1. What Is Processing Virtualization?
    2. What Does Processing Virtualization Do?
    3. When Is Processing Virtualization the Preferred Approach?
    4. Players in the Processing Virtualization World
    5. A Few Examples of Processing Virtualization in Use
  6. 5. Network Virtualization: Controlling the View of the Network
    1. What Is Network Virtualization?
    2. What Does Network Virtualization Do?
    3. When Is Network Virtualization Required?
    4. Players in the Network Virtualization World
    5. A Few Examples of Network Virtualization in Use
  7. 6. Storage Virtualization: Where Are Your Files and Applications?
    1. What Is Storage Virtualization?
    2. What Does Storage Virtualization Do?
    3. When Should Storage Virtualization Be Used?
    4. Players in the Storage Virtualization World
    5. A Few Examples of Storage Virtualization in Use
  8. 7. Security for Virtual Environments: Guarding the Treasure
    1. What Is Security for Virtual Environments?
    2. What Does Security for Virtual Environments Do?
    3. When Is Security for Virtual Environments Needed?
    4. Players in the Security for Virtual Environments World
    5. A Few Examples of Security for Virtual Environments in Use
  9. 8. Management for Virtual Environments
    1. What Is Management for Virtual Environments?
    2. What Does Management for Virtual Environments Do?
    3. When Is Management Software for Virtual Environments Needed?
    4. Players in the Management for Virtual Environments World
    5. A Few Examples of Management for Virtual Environments in Use
  10. 9. Using Virtualization: The Right Tool for the Job
    1. Highlighting When Use Cases Are Confused with Technology
    2. Big Data
    3. Clusters
    4. Desktop Virtualization
    5. High-Performance Computing
    6. Server Virtualization
    7. Extreme Transaction Processing
  11. 10. Summary
    1. Virtualization Is a Double-Edged Sword
    2. Where to Go Next
  12. About the Author
  13. Colophon
  14. Copyright
3.17.74.148