Cover image for Virtualization: A Manager's Guide

Book description

For anyone in a technology role withing organizations using or contemplating use of virtualization. We will cover all seven layers of technology and then dive in on each layer, what it does, and a sampling of who is playing there. Good coverage of virtualization technology and uses of: access virtualization, application virtualization, delete uses of processing virtualization, network virtualization, storage virtualization, security of virtualized environments, management of virtualized environments, and a few short case studies of virtualized environments.

Table of Contents

  1. Special Upgrade Offer
  2. Preface
    1. About This Book
    2. Conventions Used in This Book
    3. Using Code Examples
    4. Safari® Books Online
    5. How to Contact Us
  3. 1. A Model of Virtualization
    1. Model of Virtualization
    2. What Is Virtualization?
    3. Layers of Virtualization at Work
    4. Goals of Virtualization
  4. 2. Access Virtualization: Providing Universal Access
    1. What Is Access Virtualization?
    2. What Does Access Virtualization Do?
    3. When Is Access Virtualization the Right Choice?
    4. Players in the Access Virtualization World
    5. A Few Examples of Access Virtualization in Use
  5. 3. Application Virtualization: Application Isolation, Delivery and Performance
    1. What Is Application Virtualization?
    2. What Does Application Virtualization Do?
    3. When Is Application Virtualization a Suggested Approach?
    4. Players in the Application Virtualization World
    5. A Few Examples of Application Virtualization in Use
  6. 4. Processing Virtualization: Doing System Tricks
    1. What Is Processing Virtualization?
    2. What Does Processing Virtualization Do?
    3. When Is Processing Virtualization the Preferred Approach?
    4. Players in the Processing Virtualization World
    5. A Few Examples of Processing Virtualization in Use
  7. 5. Network Virtualization: Controlling the View of the Network
    1. What Is Network Virtualization?
    2. What Does Network Virtualization Do?
    3. When Is Network Virtualization Required?
    4. Players in the Network Virtualization World
    5. A Few Examples of Network Virtualization in Use
  8. 6. Storage Virtualization: Where Are Your Files and Applications?
    1. What Is Storage Virtualization?
    2. What Does Storage Virtualization Do?
    3. When Should Storage Virtualization Be Used?
    4. Players in the Storage Virtualization World
    5. A Few Examples of Storage Virtualization in Use
  9. 7. Security for Virtual Environments: Guarding the Treasure
    1. What Is Security for Virtual Environments?
    2. What Does Security for Virtual Environments Do?
    3. When Is Security for Virtual Environments Needed?
    4. Players in the Security for Virtual Environments World
    5. A Few Examples of Security for Virtual Environments in Use
  10. 8. Management for Virtual Environments
    1. What Is Management for Virtual Environments?
    2. What Does Management for Virtual Environments Do?
    3. When Is Management Software for Virtual Environments Needed?
    4. Players in the Management for Virtual Environments World
    5. A Few Examples of Management for Virtual Environments in Use
  11. 9. Using Virtualization: The Right Tool for the Job
    1. Highlighting When Use Cases Are Confused with Technology
    2. Big Data
    3. Clusters
    4. Desktop Virtualization
    5. High-Performance Computing
    6. Server Virtualization
    7. Extreme Transaction Processing
  12. 10. Summary
    1. Virtualization Is a Double-Edged Sword
    2. Where to Go Next
  13. About the Author
  14. Colophon
  15. Special Upgrade Offer
  16. Copyright