Tuesday, October 8, 2019
Security Issues Within Virtualization Coursework
Security Issues Within Virtualization - Coursework Example Citrix Systems, Inc. (2008, October). Citrix xenserver V5.0 and netapp storage best practices. Retrieved from CITRIX Web site: http://www.citrix.com/site/resources/dynamic/partnerDocs/CitrixXSNetAppStorageBestPracticesGuidefinal.pdf This article shows the best way to use NetApp storage systems and Citrix XenServer. It also speaks about the future of these methods in the furthering of virtualization. Although pushing their product, this article has good information. The great IT cost is reduced by the virtual desktop. The need to download extra software and patches are thing of the past according to this article. Since it was written in 2005, the author is full of promise for the virtual desktop, with no concern. This is important to show the attitude when the virtual desktop was new. This web site provides access to technology white papers and can provide me with an excellent source of information on the subject of virtualization. Most of the technology is being developed by well know vendors, having easy access to their technology white papers will help provide a reliable source for information. Ghodke, N. (2004). Virtualization techniques to enable transparent access to Peripheral devices across networks (Masters Thesis, University Of Florida, 2004). Retrieved from http://etd.fcla.edu/UF/UFE0005684/ghodke_n.pdf Many individuals get excited about virtualization without taking into account the security measures necessary to run virtualization without being hacked or interfered with by outside sources. This article informs about security measures needed. This article also speaks about security for virtualized environments. The authors did an empirical study into the security exposure to hosts of hostile virtualized environments. Their findings were very interesting and vital to my research. This article speaks about the unknown factors of virtualization. Mike Rothman believes that there are a number of potential
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.