应用实施范围总体原则-VMware虚拟化技术详解
应用实施范围总体原则不适合采用虚拟化的应用具有特殊硬件访问要求的应用高性能图形显卡---不适用虚拟化特殊的串/并行加密设备---不适用虚拟化USB设备连接需求---可能不适用,可采用外置USB设备代替,需经过测试即使在高配置的服务器上仍然具有很高负载的应用---可能不适用,需分析当前服务器配置情况可以采用虚拟化的应用除上述不适合采用虚拟化的应用之外的所有应用可根据应用迁移的复杂程度决定虚拟化先后顺序较易实现P2V的应用可先做迁移,如可用Converter工具直接迁移的应用较难或不能做P2V迁移的应用可考虑采用重新安装方式后迁根据管理的需要决定是否做虚拟化转变过程对现有业务的影响程度转变为虚拟化后对现有管理的影响程度部门之间协调的难易程度* Key Points: [Slide purp操作系统e: to relate the challenges on previous slide to important consequences of th操作系统e challenges] tResult of these challenges is: tIncreasing c操作系统ts related to desktop infrastructure tDecreasing manageability tIncreasing security risks tAdditional Notes: tIncreasing c操作系统ts: tOnly about 30% of TCO of PC’s is the c操作系统t of hardware; the remaining 70% is the c操作系统t of deployment, management, and support tBackup, recovery, and remote access require additional spending and continuous updating tA distributed desktop environment complicates management and tasks like backup, leading to these higher c操作系统ts tDecreasing manageability: tContinuous stream of patches and updates that need to be tested against all操作系统images in environment tComplexity of migrating to new PC hardware because new PC hardware often requires new操作系统image or even new操作系统version tGrowing security risks: tCases involving theft of proprietary information were twice as common in 2005 as in previous year (Computer Security Institute survey) tAverage c操作系统t of a security breach was $204,000 per survey respondent (Computer Security Institute survey)
下载地址
用户评论