Question

Verbania executives have heard that virtualization is the holy grail of information technology (IT) infrastructures. Conduct...

Verbania executives have heard that virtualization is the holy grail of information technology (IT) infrastructures. Conduct some research on virtualization, and discuss the following:

In your opinion, why is virtualization perceived as the holy grail of IT?
How can virtualization help Verbania?
What are the security considerations?
How does it compare with cloud computing?
Will you recommend virtualization for Verbania?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

opinion, why is virtualization perceived as the holy grail of IT?:-

Even from a project management point-of-view, data virtualization enables quick checks with business users and effective validation points. It means fewer errors and less wasting of time and cost.

Data virtualization is a cultural change. That is to say, it has organizational aspects in addition to technological aspects. So, if I can’t see a single technical reason for not leveraging data virtualization, there may be some organizational circumstances in which we must be careful in proposing and adopting this technology.

I think that data virtualization is perfectly suited to an agile way-of-thinking and implementation approach. Many customers say they are agile, yet they are still looking for a traditional requirements/development/test/deploy cycle because their business users are not ready to work in an agile way.

Customers ask for more analysis and hypothesis testing, but this can be very simply addressed by the logical layer of virtual data.

So, yes, data virtualization really is the Holy Grail. And just like the original Holy Grail from Arthurian literature, all that data virtualization needs now are some brave knights in pursuit of their dreams.

How can virtualization help Verbania?:-

there are many way in which virtualization can help verbania saving you money and time while providing much greater business continuity and ability to recover from disaster

security consideration:-   

1)Securing virtual hard disks

2) Reducing the attack surface for hosts

3)Classifying virtual machines

4)Involving information security personnel throughout the lifecycle

5) Segment traffic for administration and storage

comparison between virtualization and cloud computing:-

virtualization:-virtualization is technology that allows you to create multiple simulated environments or dedicated resources from a single, physical hardware system. Software called a hypervisor  connects directly to that hardware and allows you to split 1 system into separate, distinct, and secure environments known as virtual machines. These virtual machines rely on the hypervisor’s ability to separate the machine’s resources from the hardware and distribute them appropriately

cloud computing:-

cloud computing is a set of principles and approaches to deliver compute, network, and storage infrastructure resources, services, platforms, and applications to users on-demand across any network. These infrastructure resources, services, and applications are sourced from clouds, which are pools of virtual resources orchestrated by management and automation software so they can be accessed by users on-demand through self-service portals supported by automatic scaling and dynamic resource allocation

yes i will recommend virtualization for verbania

Add a comment
Know the answer?
Add Answer to:
Verbania executives have heard that virtualization is the holy grail of information technology (IT) infrastructures. Conduct...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on...

    Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on the organization’s network and infrastructure needs. These differences stem from different cyber security risks. They also present organizations with different choices to define and make in their security policies. 1. What are some best practices organizations can observe when creating and maintaining domain policies? 2. LAN security policies often center on issues concerning connectivity; this includes determining how devices adhere to the network. What...

  • Part 2: Artificial Selection / Genetic Research You will need to conduct your own research to...

    Part 2: Artificial Selection / Genetic Research You will need to conduct your own research to answer these questions. Be mindful of the marking scheme to help guide your answer. 1. Modern domesticated pigs are descendants of the wild boar (Sus scrofa). Through the domestication process, human have artificially selected for certain traits. Identify two of these traits, and briefly explain how they benefit modern society. Be sure to identify the trait, explain why it was artificially selected and how...

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and...

    Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and knowledge important to Apple? Give an example of each type in relation to the iPad. (1 Mark) Explain how Apple achieved business success through the use of information, information technology, and people. (1 Mark) Evaluate how Apple can gain business intelligence through the implementation of a customer relationship management system. (1 Mark) Case Study 1: Apple Merging Technology, Business, and Entertainment This might sound...

  • This assignment is due 2/25 and is worth 50 points Opinion Paper and Comparative Critique: Print...

    This assignment is due 2/25 and is worth 50 points Opinion Paper and Comparative Critique: Print Media and Website Information Objective: This assignment will test your ability to critically analyze popular media nutrition information, according to its content, whether you think the information is valid and/or accurate based on the principles you are learning from the course. This will help you to integrate and apply knowledge from class materials and/or relevant personal experiences. ______________________________________________________________________________________________________ Instructions: Note: This is one assignment...

  • AVIVA Information Technology Strategy Aviva is the fifth-largest insurance group worldwide. It provides savings, investments, and...

    AVIVA Information Technology Strategy Aviva is the fifth-largest insurance group worldwide. It provides savings, investments, and insurance, and has been operating since 1696. The company’s 54,000 employees serve more than 50 million people in 28 countries. In order to integrate the organization at a global level, Aviva needed a platform to be able to communicate with all employees and to allow its employees to be able to share best practices. Aviva wanted to encourage its employees to be innovative and...

  • Research is an integral part of all professional fields. Designing a research study can be a...

    Research is an integral part of all professional fields. Designing a research study can be a complicated task that can be simplified if the appropriate techniques can be identified. This assignment will give you the opportunity to design an experiment, including finding relevant prior research, determining the appropriate sample, data analysis techniques, and discuss the results you hope to see. Working from the topic chosen earlier in the topic selection, you will be designing your own statistical study. In a...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • PLEASE I NEED HELP!!! Case One: UConn’s University Information Technology Services (UITS) Develop...

    PLEASE I NEED HELP!!! Case One: UConn’s University Information Technology Services (UITS) Develops a Five-Year Strategic Plan The University of Connecticut was founded in 1881 under the name Storrs Agricultural School. As the name implies, the school was originally focused solely on agricultural studies. In 1893, the school became part of the national land-grant college program, which provided land and funding to one college in each state whose focus was on teaching practical skills in agriculture, engineering, military arts, and...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT