logo

Recommendation to the CIO on virtualization technology

   

Added on  2022-11-29

4 Pages736 Words475 Views
Running head: VIRTUALIZATION TECHNOLOGY FUNDAMENTAL
Virtualization Technology Fundamental
Name of the Student
Name of the University
Author’s Note
Recommendation to the CIO on virtualization technology_1
1
VIRTUALIZATION TECHNOLOGY FUNDAMENTAL
Recommendation to the CIO on virtualization technology
For the adoption of the virtualization technology in the current business of the solar panel
manufacturing company the current hardware and software of the local center is analyzed. The
physical hardware needed for meeting the growth of the organization is evaluated with the
current hardware and software available and the following recommendations are made for the
adoption of the virtualization technology in the current business process.
The adoption of virtualization helps to run multiple operating system in a computer and
for the company the virtualization can be viewed as an overall IT trend help the organization to
manage perceived activity and utility computing. With the implementation of virtualization the
administrative task loads can be reduced and the scalability of the organization can be improved
(Thomas, Costa & Oliveira, 2016).
The security implication after the deployment of the new technology is uncertain but the
virtualization can provide many benefit which finds integration of virtualization in the
organizational infrastructure. Virtualization helps in saving cost and increase the efficiency of
the business with decreasing maintenance downtime and thus reduces the disruption in the
business (Lu & Xu, 2018). It can help in doing more work with the use of less hardware
equipment’s.
The virtualization can be implemented in the business in different sectors such as
network, storage, server and virtualization of desktop. There are certain security risk in each of
the virtualization types but it can be said that with the virtualization the security can be improved
but it is not capable for preventing all the attacks. Security controls are needed to be enforced
with the virtualization environment and sandboxing can be used for the separation of program
Recommendation to the CIO on virtualization technology_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Virtualization Assessment 2022
|7
|1962
|19

Hypervisor-Based Server Virtualization, Data Centers, Container-Based Virtualization
|14
|2963
|133

Operating Systems Assignment (Doc)
|16
|3395
|334

Virtualization Technologies: Efficiency, Benefits, and Differences
|6
|1297
|174

Simulation of Industrial Control System Literature Review 2022
|5
|785
|20

Cloud Virtualization: Types and Providers
|4
|799
|228