Applications of Virtualization to Digital Forensics Education

Size: px
Start display at page:

Download "Applications of Virtualization to Digital Forensics Education"

Transcription

1 Applications of Virtualization to Digital Forensics Education Brian Hay Department of Computer Science University of Alaska Fairbanks Abstract Educators in digital forensics struggle with the desire to provide their students with realistic learning environments while protecting production systems from undesirable and potentially illegal interference. This paper describes methods in which virtualization technology can be used to create realistic learning environments for digital forensics that reduce cost and space requirements while saving students and instructors time. Host-based, network-based, and server-based approaches to virtualization are presented and analyzed. The issues associated with developing an image library for digital forensics are presented as well as the direction of future developments in the field including a vision for sharing virtual environments across institutions. At the recent Colloquium for Information Systems Security (CISSE 2009) approximately 60 attendees participated in virtualization bootcamps and working lunches, and the overwhelming level of interest in the group was determining how to deploy virtualization to provide high quality information assurance, computer security, and digital forensics lab exercises at their institutions. 1. Introduction Computer systems have traditionally consisted of physical desktop and server systems, but this model is rapidly changing to include the embedding of digital technologies in many other arenas, including cell phones, PDAs, digital music players, automobiles, and home automation. In many of these cases the added functionality includes processing capabilities in addition to data storage and network connectivity. As a result of this rapid expansion of computing platforms into non-traditional roles, digital forensics is becoming an increasingly relevant component of investigative efforts, including those conducted by law enforcement, intelligence and military agencies, corporate IT administrators, forensic accountants, and civil litigators. To support the digital forensics data collection and analysis effort there are many tools available, ranging from enterprise level commercial offerings such as Encase and FTK [1], to Linux distributions such as the Helix live CD [6] which includes many forensicallyoriented open-source tools. Although these tools are readily and publicly available, they still require a knowledgeable user to ensure that meaningful and relevant evidence is located and collected, is not corrupted or compromised during the acquisition process, and can be interpreted correctly. The increasing amount of data gathered from each target system, and the increasing number of target systems involved in any investigation means that highly skilled investigators are in short supply, and this is a challenge that the educational system must quickly address. While a strong theoretical background in areas such as file systems and operating systems is an important component of an education in digital forensics, computer science programs are already providing classes that address these needs as part of their undergraduate and graduate curricula. For some applications, particularly those involving the use of an investigation s results in a legal proceeding, a detailed understanding of the process by which data should be collected, stored, transferred, and analyzed is important, although this is an area in which CS programs are generally ill-equipped to provide. The application of theoretical concepts has been shown to be an important factor in ensuring that students fully grasp a subject, in addition a providing practical experience that can allow a student to more easily transition to a real work environment. However, actually providing high quality practical exercises for students is not an easy task. For educators seeking to provide such an experience in digital forensics, there are several goals for the learning environment which can be challenging to attain in the traditional computing lab environments, such as: Creating an interesting scenario at the host level. In the case of a single system, such as a server or workstation, this may involve deploying and configuring an operating /10 $ IEEE 1

2 system, applications, and services/daemons, then seeding the system with applicable and interesting files such as images, documents, and messages. More involved scenarios may include ensuring that forensically relevant data is deleted from the filesystem, or even the installation of rootkits, encryption software, or anti-forensics tools to provide students with a wide range of experiential activities. Creating an interesting network environment. An increasing number of computing devices today have built-in network connectivity, including almost all consumer computing devices, so including a network component in the learning scenarios can be an important addition. Not only do the systems need to be configured to allow network access, but some interesting traffic must also be present on the network, which may require that other systems, such as servers and clients or traffic generators are configured and deployed. Making the exercise available to students. Once the learning environment has been defined, it must be deployed for student use, which may require copies of the relevant systems to be installed on lab workstations. While this process can be simplified using utilities such as Symantec Ghost [11], the process can be time consuming and generally requires administrator intervention (i.e., the students typically can t deploy the system themselves). This also assumes that students are actually physically present, and doesn t provide for students who are involved in distance learning, or who prefer to work on personal workstations with their own suite of tools. Resetting the scenario systems for subsequent groups. At the end of an exercise it is usually necessary to reset the exercise systems to a known state for use in future exercises. Again, systems such as Symantec Ghost can simplify this process, although the previously discussed limitations of such utilities apply in this case too. Production systems, such as lab computers, could technically be used as targets for forensic investigation exercises. While this could potentially simplify the setup phase, the likelihood of sensitive or personal data belonging to lab users being discovered makes this approach at least undesirable, and likely a violation of acceptable use policies or even legal restrictions such as those required for FERPA compliance. Similarly the use of production networks is likely to have undesirable legal implications, even if it only involves students collecting and analyzing production network traffic. More serious problems can occur if any active network scanning is a component of the exercise on a production network, as it is easy for even experienced users to mistakenly target non-exercise systems, which again can have very serious legal implications. In addition to the legal risks, production systems are likely to be too complex to be useful as education exercises for novice students and difficult for the instructor to control the environment. For example, modern hard disks sizes have grown dramatically, making data acquisition more time consuming than is generally possible in a typical class lab session, and networks are likely to have an overwhelming large amount of traffic. This complexity combined with the lack of control that the students and educators encounter make this environment less-than-suitable for digital forensics education. 2. Virtualization Virtualization can be defined as an abstraction layer that decouples the physical hardware from the operating system to deliver greater IT resource utilization and flexibility [13]. Virtualization has long been a feature of high end, multi-processor mainframe systems, allowing multiple copies of the operating system to execute in isolation. However, x86 virtualization has been a more recent development. With multi-processor and multi-core systems and ever larger amounts of RAM and hard disk space becoming commonplace on x86 systems, virtualization on commodity hardware is now a very real, and increasingly mainstream, approach to more fully utilizing x86 desktop and server systems. Not only is virtualization becoming increasingly common, but the virtualization software offerings, which allows multiple virtual machines (VMs) to run concurrently on a single system, are becoming more powerful and user friendly, while simultaneously becoming less expensive, and in many cases are distributed freely. VMware is the current market leader in this arena, and has a wide selection of products, ranging from those targeted towards the home user to enterprise level server virtualization products [14]. In all cases except the enterprise level VMware Infrastructure and recently released vsphere products, VMware software is installed as a program within a host operating system (Windows or Linux). Once the software is installed, one or more guest operating systems can then be installed and executed concurrently, each of which 2

3 functions no differently from the user s perspective than a separate physical system. Supported guest operating systems include many Windows and Linux variants, in addition to other x86 operating systems such as Solaris x86 and BSD versions. VMware offers three free products to the public in addition to their commercial offerings, but for some academic uses all products are offered free of charge through the VMware Academic Program. [12] Xen is a virtualization program which grew out of a research project at Cambridge University. [15] A modified Linux kernel is installed as the virtualization hypervisor, after which other operating systems, known as domains, can be installed. Until recently Xen required that the guest operating system be modified in order to operate as a virtual machine, which made running closed-source operating systems, such as Windows, challenging. Support in Xen 3.x for the virtualization extensions in the latest Intel and AMD processors removed this requirement. While the management tools used with Xen are not as fully developed as those offered by VMware, two major Linux vendors (Red Hat and SUSE) have included Xen as an integral component of their latest enterprise distributions, and the products are being actively developed and improved. Xen is available at no charge, including in source form, and is also supported by a commercial company, XenSource [15]. Kernel-based Virtual Machine (KVM) is another product in the virtualization market, although it is based on the older QEMU [7, 10]. KVM installs as a kernel module on a Linux system, but unlike VMware and Xen, KVM requires the use of Intel or AMD processor virtualization extensions, which currently limits it to relatively new hardware. KVM is now integrated into version 2.6 of the Linux mainline kernel, and while it lacks some advanced functionality, particularly for use in high performance server environments, it is under active development and is likely to be a realistic option in the near future. QEMU, on which KVM is based, is another open source virtualization product, and while it tends to be less user friendly than some of the other products, it has one distinct advantage, namely that it can emulate other processor types, whereas the other products discussed can only run x86 virtual machines. While there are clearly performance implications involved in this emulation, the option to emulate non-x86 processors allows for a much wider range of devices, allowing for exercises involving less-common hardware platforms [10]. Microsoft has provided some basic virtualization software for some time, but those offerings were typically limited with respect to functionality and supported guest operating systems. The host based Virtual PC product is still available, but MS now also offers a true server-based virtualization product, named Hyper-V which may prove to be a serious challenger to VMware vsphere in terms of performance and functionality [8, 9]. 3. Virtual Laboratory Environments Virtualization can be used to address many of the challenges faced by educators attempting to provide their students with high quality digital forensics experience including the following: Creating an interesting scenario at the host level. Although virtualization does not remove the need to create interesting systems, the resulting virtual machines then exist as a small collection of files in a directory on the host system. VMs can be archived or deployed by simply copying the files (or in the enterprise level products through the use of templating and cloning functionality) Creating an interesting network environment. Virtual machines can connect to physical networks in the same manner that physical hosts can, allowing them to participate in exercises based on a physical network. However, multiple VMs running on a physical host can also be connected to a virtual network, allowing realistic networking exercises to be conducted in a completely isolated virtual environment. Making the exercise available to students. Deployment of VMs generally means making a few files available to the physical host. Although the files that comprise the VM can be large (depending on the VM configuration), one or more carefully configured VMs can commonly be stored on a CD or DVD, and made available for use by students anywhere that the associated virtualization software is available. Free software that provides sufficient capabilities for students to run most exercises is available from all of the major vendors. Resetting the exercise systems for subsequent groups. Restoring a known state for a virtual machine requires nothing more than restoring a file, which can either be done manually, or more commonly, can be accomplished in essentially zero time from within the virtualization software. This allows exercises to be configured to one of multiple known states with almost no delay. 3

4 3.1. Host-based Images Over the past 7 years, the University of Alaska Fairbanks (UAF) Advanced System Security Education, Research, and Training (ASSERT) Center [2, 5] has created several evolutionary virtualization lab configurations, based in part on the level of funding that was available and the state of the art in virtualization at the time. Each of these configurations can be used today as feasible roadmap for the deployment of a virtual lab at a given institution, depending on the needs and resources available. The first version involved the deployment of several high performance workstations, each running Microsoft Windows as the host OS, and VMware workstation as the virtualization software. In this version, a single wired network was provided in the lab, and a single basic server, acquired at no charge from the UAF surplus equipment was attached to the network and configured to provide domain (SAMBA) DHCP, DNS, NTP, HTTP, SMTP, and POP service to the workstations and their associated virtual machines. With this configuration, students were able to create and store VMs on the local hard drives on any of the workstations, and the workstations were sufficiently powerful that six VMs could easily be concurrently running on any given workstation, which was sufficient for even the most complex exercises at that time. The lab itself was completely physically isolated from any external network to ensure that no action, either accidental or deliberate, on any of the lab systems was capable of impacting any production host or network. While this architecture did offer many of the benefits associated with the use of virtualization, including the ability to relatively easily restore known configurations and perform exercises in isolated virtual networked environments, there were also several significant drawbacks. The first issue was that students were essentially tied to a specific workstation, as their VM files were too large to easily transfer between machines. As a result, if two students both created VMs on the same workstation, then they could not use the lab environment simultaneously, even if all other workstations were unused. In addition, there was no easy mechanism to allow an instructor to propagate a given VM to all students in the class, other than copying gigabytes of data across a single 100Mb network connection to multiple workstations Network-based Images The next iteration of the lab architecture attempted to address some of the shortcomings of the original version, in that all of the virtual machines were stored on a server. All students were allocated their own space on the server, and their VM directories were mapped onto whatever workstation they chose to login to. This architecture required reorganizing the network so that workstation authentication and VM directory mapping were performed using a dedicated gigabit Ethernet network, whereas the virtual machines were given access to a separate 100Mb Ethernet network, on which the DHCP, DNS, NTP, HTTP, SMTP and POP services were accessible. Using three gigabit connections in a bonded channel for the server connection and gigabit to each workstation proved to provide sufficient bandwidth to support the execution of six VMs per workstation with no noticeable lag time, other than occasionally when several users powered on VMs simultaneously, such as at the start of a lab session. This configuration did solve some of the problems encountered in the initial design, such as the issue of users being tied to a specific workstation. Basic scripts were also written to allow an instructor to copy any of the virtual machines created in an instructor directory to a group of students, which, since all VM files were stored on a single server merely required a copy operation on the server rather than network traffic. The lab network remained completely isolated from any external networks as a protective measure. While this was acceptable initially when class sizes were small, the opportunity to use the lab led to increased interest in courses such as digital forensics, and the physical limitations of the lab became a problem. Students could not use the lab from home, nor could the much larger CS or general use laboratory be used for these exercises as class sizes grew, and this led to scheduling issues and overcrowding Server-based Virtualization The third major iteration of the laboratory environment focused on addressing the need for extra capacity, while ensuring that the VMs have no ability to impact production networks. In this case the execution of the VMs was moved from the user workstations to a rack of servers, each of which was initially running VMware Server. Management of the system was performed using the VMware Virtual Center, which was at that point the only non-free virtualization software component in the lab, and the virtual machines were confined to any of 99 isolated virtual networks, or one of the physically isolated wired networks. Virtual machine files were stored on a 4

5 SAN, attached to each server using a Fibre Channel connection. Users connected to the lab using the freely available Virtual Center client, allowing them to monitor the state of their own VMs, which are manually load balanced across the available servers. They could also perform power actions, such as power on and shutdown from this interface. Users could also connect to the console of any of their virtual machines, allowing them to have the same ability to interact with their VMs as they would having sitting at the keyboard of a physical system. Users could attach to the console of several of their VMs running on the servers. While this console view may appear no different from other remote access methods, such as Remote Data Protocol (RDP) for example, it has one important distinction in that it does not require the VM to have any network connection on the external network, as would be required by RDP or Secure Shell (SSH). Without this capability the VMs would no longer be solely on isolated networks, violating the principle that no VM should be able to impact a production network. 3.4 Server-based Virtualization Using Enterprise Software The VMware Academic Program provided UAF with access to the enterprise level products, including VMware ESX, and in 2007 the ASSERT Lab was transitioned to use VMware Infrastructure (ESX) instead of VMware Server, VMware Infrastructure has some similarity to VMware Server from a cosmetic perspective. However it runs as its own OS, rather than requiring a host operating system such as Linux to be installed as is the case with VMware Server. One limitation in this case is that Infrastructure supports a limited range of server hardware, network cards, and storage devices, but the Infrastructure suite supports many additional capabilities, such as a high performance filesystem specifically tuned to the efficient storage of virtual machines disk files, and automated load balancing of virtual machines between physical servers, even while the VMs are running. As the virtualization field continues to evolve, we are also periodically reassessing the suitability of alternatives to the VMware tools, such as Xen and Hyper-V, to digital forensics education environments. 4. Digital Forensics Image Library developing high quality systems to investigate, whether virtual or physical, is a challenging and time consuming process. However, because virtual machines can be duplicated simply by copying a small set of files, VMs can easily be stored in a central library, and easily shared between educators using a web site, or even mailed CDs and DVDs if necessary. Using this approach, the workload of creating a set of virtual machines which are suitable for digital forensics exercises can be shared across the entire community. UAF has created such a repository, and is populating it with example virtual machines at his time Challenges Related to the Image Library There are at least two major challenges related to building such a library, the first of which relates to the size of the virtual machine files, on which the entire hard disk for the virtual machine is stored. Even the most basic operating system installations require several hundred megabytes of disk storage, and more complex systems could have virtual machine files that are gigabytes in size. In order to deliver these VMs to interested institutions, all of that data must either be delivered across the network, or alternatively mailed on some physical media, such as a DVD. Even using the fast networks commonly found in campus environments, downloading several gigabytes of data can be a time consuming task. The second major challenge relates to software licensing issues. If institution A creates a virtual machine which includes an operating system or software for which they have a valid license, there are many cases where it is at least unclear whether they can then share that VM, even with other institutions who also have licenses for the operating system or software in question. In some cases, such as VMs using some of the freely available Linux operating systems, this does not appear to be an issue, but in other cases, such as those involving the commercial Linux systems like Red Hat Enterprise Linux, or any of the Windows operating systems, the issue of sharing images without violating license agreements is much more problematic. UAF faculty are currently in contact with Microsoft staff in an attempt to address this issue, and while initial interactions have been promising, and there is a general agreement that the ability to share such images would benefit the digital forensics community, no specific solution has yet been agreed upon. Building labs using virtualization solves many of the problems that are faced by digital forensics educators, but it does not directly address the issue that 5

6 4.2. Shared Image Usage The shared digital forensics images available from the online library can not only be used for classroom/lab exercise, but may also have value as reference systems for testing new digital forensics tools. In this manner, new tools could undergo preliminary testing against a set of well defined reference images to gauge their performance. The reference images may also provide a mechanism by which the applicability of tools to different types of digital forensics problems, such as identifying image files or locating encrypted content, could be gauged Shared Scenarios In addition to the VM images files, the online library can also store associated supporting materials, such as a document providing a back-story for the images, or set of images. Such a document may provide environmental information regarding the VM, such as the location of the system or the conditions under which it is being investigated, giving students a richer environment in which to conduct their exercise. Other supporting documents may include worksheets for example exercises that could be conducted using the VM, and even solution sets that describe the relevant information that students should find as part of their investigation Access Restrictions Access to library resources is likely to be restricted to support at least two goals, namely the need to ensure that licenses violations do not occur, and to ensure that students do not gain access to instructor resources. In the event the Microsoft, for example, allows virtual machines using their operating systems to be shared through this library, it is almost certain that institution downloading the VM will still need an existing valid license for Microsoft software, so access to such resources would be restricted to those institutions that had demonstrated their possession of such a license. In addition, some resource, such as the virtual machine files themselves, may be available to students, whereas other components, such as the solution sets may require more restricted access. 5. Future Considerations Although virtualization offers many benefits to academic programs, including digital forensics, there are still some challenges, including the need to administer the virtual server infrastructure, which can be a daunting task in some cases. In addition, while some institutions may be heavy users of digital forensics labs, others may simply include it as a module in a more general CS course, and as a result cannot justify hosting a specialize virtual lab. This situation is extremely similar to the problems successfully address by the supercomputing community, where there are many users of supercomputing resources nationwide, each with different usage requirements, but few institutions with the experience, funding, and expertise necessary to actually run a supercomputing facility. This issue was addressed through the deployment of a small number of NSF funded supercomputing centers throughout the nation, on which researchers and educators could request time for their projects. Such an approach gives nationwide access to supercomputing resources to all who need it, while centralizing the management of the resources themselves. By adopting a similar approach in the digital forensics and information assurance domain, where remotely accessible virtualized labs are stationed in a few institutions with the expertise necessary to manage them, but made available to students and educators nationwide, we can ensure that more institutions can gain access to high quality digital forensics lab experiences. 6. Conclusions Virtualization can provide several advantages to digital forensics educators, and can be applied to provide students with high-quality practical experience with digital forensics topics in a manner which makes efficient use of hardware resources and the time of experts who can share the burden of creating meaningful exercises. In addition, the creation of a remotely accessible virtualized laboratory can allow students to have access to resources from across campus, across the nation, or across the planet, at a time and place that fits their requirements and schedules. As the virtualization field continues to evolve, new tools and approaches are likely to expand the current capabilities leading to better opportunities for virtualization to benefit digital forensics curricula. 7. References [1] AccessData Forensic Toolkit. Retrieved June 14, 2009 from [2] ASSERT Website. Retrieved June 12, 2009 from [3] Computer Laboratory Xen Virtual Machine Monitor, Retrieved June 14, 2009 from 6

7 [4] EnCase Forensic Retrieved June 12, 2009 from [5] Evolution of the ASSERT Computer Security Lab Proceedings of the 10 th Colloquium for Information Systems Security Education. Adelphi, MD. June 6-8, 2006 [6] Helix Website. Retrieved June 12, 2009 from [7] Kernel-based Virtual Machine. Retrieved June 10, 2009 from [8] Microsoft Virtualization: Desktop Virtualization. Retrieved June 10, 2009 from op/default.mspx [9] Microsoft Virtualization: Server Virtualization. Retrieved June 10, 2009 from /default.mspx [10] QEMU. Retrieved June 10, 2009 from [11] Symantec Ghost Solution Suite. Retrieved June 10, 2009 from [12] VMware Academic Program Overview. Retrieved June 10, 2009 from [13] VMware Definition of virtualization. Retrieved June 2, 2009 from [14] VMware: Virtualization, Virtual Machine; Virtual Server Consolidation. Retrieved June 10, 2009 from [15] Citrix Systems: Citrix XenServer: Efficient Virtual Server Software. Retrieved June 10, 2009 from entid=

Evolution of the ASSERT Computer Security Lab

Evolution of the ASSERT Computer Security Lab Evolution of the ASSERT Computer Security Lab Brian Hay Kara Nance University of Alaska Fairbanks Agenda n Motivation n Initial Configuration n Virtualization Host Based Images n Virtualization Network

More information

SCO Virtualization Presentation to Customers

SCO Virtualization Presentation to Customers SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows

More information

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among

More information

Installing & Using KVM with Virtual Machine Manager COSC 495

Installing & Using KVM with Virtual Machine Manager COSC 495 Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Parallels Server 4 Bare Metal

Parallels Server 4 Bare Metal Parallels Server 4 Bare Metal Product Summary 1/21/2010 Company Overview Parallels is a worldwide leader in virtualization and automation software that optimizes computing for services providers, businesses

More information

Implementing and Managing Windows Server 2008 Hyper-V

Implementing and Managing Windows Server 2008 Hyper-V Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:

More information

How To Make A Virtual Machine Aware Of A Network On A Physical Server

How To Make A Virtual Machine Aware Of A Network On A Physical Server VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING

APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING Application testing remains a complex endeavor as Development and QA managers need to focus on delivering projects on schedule, controlling costs,

More information

Comparing Free Virtualization Products

Comparing Free Virtualization Products A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this

More information

WHITE PAPER 1 WWW.FUSIONIO.COM

WHITE PAPER 1 WWW.FUSIONIO.COM 1 WWW.FUSIONIO.COM WHITE PAPER WHITE PAPER Executive Summary Fusion iovdi is the first desktop- aware solution to virtual desktop infrastructure. Its software- defined approach uniquely combines the economics

More information

Comparing Virtualization Technologies

Comparing Virtualization Technologies CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

Replicating and Sharing Computer Security Laboratory Environments

Replicating and Sharing Computer Security Laboratory Environments Replicating and Sharing Computer Security Laboratory Environments Kara Nance & Brian Hay Ronald Dodge James Wrubel Steve Burd & Alex Seazzu University of Alaska Fairbanks U.S. Military Academy Carnegie

More information

Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC

Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,

More information

Virtualization. Michael Tsai 2015/06/08

Virtualization. Michael Tsai 2015/06/08 Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Software Store Option Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration

More information

Virtualization Technologies. Embrace the new world of healthcare

Virtualization Technologies. Embrace the new world of healthcare Virtualization Technologies Embrace the new world of healthcare Overview Introduction and Virtualization Basics Core Virtualization Technologies Enterprise Server Virtualization Solutions End User and

More information

PC Blade Virtualization Configuration Guide

PC Blade Virtualization Configuration Guide PC Blade Virtualization Configuration Guide The combination of ClearCube PC Blades and management software with industry-standard virtualization technology gives IT managers a new way to more efficiently

More information

nanohub.org An Overview of Virtualization Techniques

nanohub.org An Overview of Virtualization Techniques An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource

More information

Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH

Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware

More information

Expert Reference Series of White Papers. VMware vsphere Essentials

Expert Reference Series of White Papers. VMware vsphere Essentials Expert Reference Series of White Papers VMware vsphere Essentials 1-800-COURSES www.globalknowledge.com VMware vsphere Essentials Raj Tolani, Global Knowledge Instructor Introduction Every VMware class

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

RED HAT ENTERPRISE VIRTUALIZATION

RED HAT ENTERPRISE VIRTUALIZATION Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April

More information

Table of Contents. Server Virtualization Peer Review 01-03-2007 cameron 1-24-2007: modified, cameron

Table of Contents. Server Virtualization Peer Review 01-03-2007 cameron 1-24-2007: modified, cameron Table of Contents Objective...2 Definitions...2 Objective discussion...2 Comparison criteria...3 Criteria weights...4 Product scores...4 Criteria comparison discussion...5 References...7 Cost Estimate,

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

Virtualization: Know your options on Ubuntu. Nick Barcet. Ubuntu Server Product Manager nick.barcet@canonical.com

Virtualization: Know your options on Ubuntu. Nick Barcet. Ubuntu Server Product Manager nick.barcet@canonical.com Virtualization: Know your options on Ubuntu Nick Barcet Ubuntu Server Product Manager nick.barcet@canonical.com Agenda Defi nitions Host virtualization tools Desktop virtualization tools Ubuntu as a guest

More information

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on

More information

Red Hat Enterprise Linux as a

Red Hat Enterprise Linux as a Red Hat Enterprise Linux as a file server You re familiar with Red Hat products that provide general-purpose environments for server-based software applications or desktop/workstation users. But did you

More information

Evaluating the Balabit Shell Control Box

Evaluating the Balabit Shell Control Box Evaluating the Balabit Shell Control Box November 17, 2015 Copyright 1996-2015 Balabit SA Table of Contents 1. Evaluating Balabit Shell Control Box in a virtual environment... 3 1.1. Limitations... 3 1.2.

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution

More information

Servervirualisierung mit Citrix XenServer

Servervirualisierung mit Citrix XenServer Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86

More information

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,

More information

Simplifying Server Workload Migrations

Simplifying Server Workload Migrations Simplifying Server Workload Migrations This document describes the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

The XenServer Product Family:

The XenServer Product Family: The XenServer Product Family: A XenSource TM White Paper Virtualization Choice for Every Server: The Next Generation of Server Virtualization The business case for virtualization is based on an industry-wide

More information

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends

More information

The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers

The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers New levels of integration and capabilities provide the foundation for building more successful businesses with this new infrastructure

More information

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept. Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,

More information

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing

More information

Implementing Cisco Data Center Unified Computing (DCUCI)

Implementing Cisco Data Center Unified Computing (DCUCI) Certification CCNP Data Center Implementing Cisco Data Center Unified Computing (DCUCI) 5 days Implementing Cisco Data Center Unified Computing (DCUCI) is designed to serve the needs of engineers who implement

More information

Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications

Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications Comparison of Technologies for Software ization PETR SUBA, JOSEF HORALEK, MARTIN HATAS Faculty of Informatics and Management, University of Hradec Králové, Rokitanského 62, 500 03 Hradec Kralove Czech

More information

Section 1.0 Co-location and Virtual Machines

Section 1.0 Co-location and Virtual Machines ITS Co-location and Virtual Machine Customer Questionnaire This form is for both Co-locations and Virtual Machines. If you are requesting a Virtual Machine, answer sections 1 and 3 of this questionnaire

More information

Intro to Virtualization

Intro to Virtualization Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor

More information

LICENSING MANAGEMENT SERIES. A Guide to Assessing Windows Server Licensing

LICENSING MANAGEMENT SERIES. A Guide to Assessing Windows Server Licensing LICENSING MANAGEMENT SERIES A Guide to Assessing Windows Server Licensing July 2010 This document provides customers of Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, and Windows Server

More information

Virtualization and Disaster Recovery

Virtualization and Disaster Recovery Virtualization and Disaster Recovery Ray Trygstad Director of Information Technology, Associate Director, Information Technology & Management Degrees Illinois Institute of Technology NetSecure 09 March

More information

Virtualization and Cloud Management Using Capacity Planning

Virtualization and Cloud Management Using Capacity Planning Research Report Virtualization and Cloud Management Using Capacity Planning Introduction The term virtualization refers to the creation of virtual machines, virtual networks and virtual disks (logical

More information

Virtualization 101 ASPE RESOURCE SERIES. Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor

Virtualization 101 ASPE RESOURCE SERIES. Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor ASPE RESOURCE SERIES Virtualization 101 Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor Real Skills. Real Results. Real IT. in partnership with Virtualization 101

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

TechTarget Windows Media

TechTarget Windows Media TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net E-Guide Hyper-V: What you need to know before

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

Outgoing VDI Gateways:

Outgoing VDI Gateways: ` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

Issues in Information Systems Volume 16, Issue I, pp. 219-225, 2015

Issues in Information Systems Volume 16, Issue I, pp. 219-225, 2015 MOVING TOWARD A SERVER-BASED VIRTUAL MACHINE HOSTING ENVIRONMENT IN SUPPORT OF UNIVERSITY INFORMATION TECHNOLOGY PROGRAMMING COURSES George Stefanek, PhD, Purdue University North Central, stefanek@pnc.edu

More information

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

Distributed systems Techs 4. Virtualization. October 26, 2009

Distributed systems Techs 4. Virtualization. October 26, 2009 Distributed systems Techs 4. Virtualization October 26, 2009 Current interest in virtualization is one of the hottest topics in information technology today. Possible due to the increasing speed and capabilities

More information

VIRTUALIZATION IS IT RIGHT FOR YOU? Author: David Burford LAD ENTERPRIZES, INC. www.ladenterprizes.com 610-429-3122. August 2008

VIRTUALIZATION IS IT RIGHT FOR YOU? Author: David Burford LAD ENTERPRIZES, INC. www.ladenterprizes.com 610-429-3122. August 2008 VIRTUALIZATION IS IT RIGHT FOR YOU? LAD ENTERPRIZES, INC. www.ladenterprizes.com 610-429-3122 August 2008 Author: David Burford Virtualization I S I T R I G H T F O R Y O U? R ecently the technical vendor

More information

Redefining Microsoft SQL Server Data Management. PAS Specification

Redefining Microsoft SQL Server Data Management. PAS Specification Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing

More information

Virtualization. Types of Interfaces

Virtualization. Types of Interfaces Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity

More information

Selecting the Right NAS File Server

Selecting the Right NAS File Server Selecting the Right NAS File Server As the network administrator for a workgroup LAN, consider this scenario: once again, one of your network file servers is running out of storage space. You send out

More information

In order to upload a VM you need to have a VM image in one of the following formats:

In order to upload a VM you need to have a VM image in one of the following formats: What is VM Upload? 1. VM Upload allows you to import your own VM and add it to your environment running on CloudShare. This provides a convenient way to upload VMs and appliances which were already built.

More information

Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction

Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction There are tectonic changes to storage technology that the IT industry hasn t seen for many years. Storage has been

More information

vnas Series All-in-one NAS with virtualization platform 2014.01.03

vnas Series All-in-one NAS with virtualization platform 2014.01.03 vnas Series All-in-one NAS with virtualization platform 2014.01.03 2 Imaging NAS Virtualization Station VMware ESX 3 Install Virtualization Station on a specialized Turbo NAS VM vnas Use vnas series to

More information

Protecting your Data in a New Generation Virtual and Physical Environment

Protecting your Data in a New Generation Virtual and Physical Environment Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

Virtualization & Cloud Computing (2W-VnCC)

Virtualization & Cloud Computing (2W-VnCC) Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Update 2 Installation Guide Applies to the following editions: Advanced Server Server for Windows Virtual Edition Server for Linux Advanced Server SBS Edition Workstation

More information

Solution Overview. Business Continuity with ReadyNAS

Solution Overview. Business Continuity with ReadyNAS Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage

More information

Business Continuity Management BCM. Welcome to the Matrix The Future of Server Virtualization

Business Continuity Management BCM. Welcome to the Matrix The Future of Server Virtualization Business Continuity Management BCM Welcome to the Matrix The Future of Server Virtualization Topics Introduction Overview of Virtualization VMWare Functionality Virtualization DR Strategies Virtualization

More information

Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor

Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor Virtualization Objectives Definitions Why Problems Versions Virtualization vs Cloud Creating a New Virtual Machine Working with a Virtual Machine Virtual Machine Settings Virtual Machine Snapshots Definitions

More information

HP Data Protector software. Assuring Business Continuity in Virtualised Environments

HP Data Protector software. Assuring Business Continuity in Virtualised Environments HP Data Protector software Assuring Business Continuity in Virtualised Environments Would not it be great if your virtual server environment actually translated to a better reality? One where you could

More information

Xen Virtualization: Xen (source) and XenServer

Xen Virtualization: Xen (source) and XenServer Xen Virtualization: Xen (source) and XenServer An introduction to free and commercial methods of creating virtual servers by Mark Sallee, Sys Admin, NCAR " Why Virtualization? Scenario: imagine that you

More information

Expert tips for realizing maximum private cloud benefits

Expert tips for realizing maximum private cloud benefits E-Guide Expert tips for realizing maximum private cloud benefits Today s enterprises either already have a private cloud, plan to build one or at least have considered in-house cloud as an option. But

More information

Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize

Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize Server and Storage Virtualization. Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at:

More information

Overview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6

Overview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6 July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...

More information

Sage 100 Standard ERP Version 2013 Supported Platform Matrix Created as of November 21, 2013

Sage 100 Standard ERP Version 2013 Supported Platform Matrix Created as of November 21, 2013 Sage 100 Standard ERP Version 2013 The information in this document applies to Sage 100 Standard ERP Version 2013 1. Detailed product update information and support policies can be found on the Sage Online

More information

Migrating to ESXi: How To

Migrating to ESXi: How To ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Best Practices for VMware ESX Server 2

Best Practices for VMware ESX Server 2 Best Practices for VMware ESX Server 2 2 Summary VMware ESX Server can be deployed in many ways. In this document, we recommend specific deployment guidelines. Following these guidelines will maximize

More information

More Efficient Virtualization Management: Templates

More Efficient Virtualization Management: Templates White Paper More Efficient Virtualization Management: Templates Learn more at www.swsoft.com/virtuozzo Published: November 2006 Revised: November 2006 Table of Contents Table of Contents... 2 OS, Middleware

More information

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the

More information

2) Xen Hypervisor 3) UEC

2) Xen Hypervisor 3) UEC 5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools

More information

Professional Xen Visualization

Professional Xen Visualization Professional Xen Visualization William von Hagen WILEY Wiley Publishing, Inc. Acknowledgments Introduction ix xix Chapter 1: Overview of Virtualization : 1 What Is Virtualization? 2 Application Virtualization

More information

Course 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager

Course 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager Course 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Microsoft System Center Virtual

More information

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

Virtualised MikroTik

Virtualised MikroTik Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand

More information

Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments

Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments Table of Contents Introduction.......................................3 Benefits of VDI.....................................4

More information

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center VMware Virtual Infrastucture From the Virtualized to the Automated Data Center Senior System Engineer VMware Inc. ngalante@vmware.com Agenda Vision VMware Enables Datacenter Automation VMware Solutions

More information

Balancing CPU, Storage

Balancing CPU, Storage TechTarget Data Center Media E-Guide Server Virtualization: Balancing CPU, Storage and Networking Demands Virtualization initiatives often become a balancing act for data center administrators, who are

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

Efficient Load Balancing using VM Migration by QEMU-KVM

Efficient Load Balancing using VM Migration by QEMU-KVM International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele

More information