A Model of Virtualization
Model of Virtualization
What Is Virtualization?
Layers of Virtualization at Work
Goals of Virtualization
Providing Universal Access
What Is Access Virtualization?
What Does Access Virtualization Do?
When Is Access Virtualization the Right Choice?
Players in the Access Virtualization World
A Few Examples of Access Virtualization in Use
What Does Application Virtualization Do?
When Is Application Virtualization a Suggested Approach?
Players in the Application Virtualization World
A Few Examples of Application Virtualization in Use
Doing System Tricks
What Is Processing Virtualization?
When Is Processing Virtualization the Preferred Approach?
Players in the Processing Virtualization World
A Few Examples of Processing Virtualization in Use
Controlling the View of the Network
What Is Network Virtualization?
What Does Network Virtualization Do?
When Is Network Virtualization Required?
Players in the Network Virtualization World
A Few Examples of Network Virtualization in Use
Where Are Your Files and Applications?
What Is Storage Virtualization?
What Does Storage Virtualization Do?
When Should Storage Virtualization Be Used?
Players in the Storage Virtualization World
A Few Examples of Storage Virtualization in Use
Security for Virtual Environments:
Guarding the Treasure
What Is Security for Virtual Environments?
What Does Security for Virtual Environments Do?
When Is Security for Virtual Environments Needed?
Players in the Security for Virtual Environments World
A Few Examples of Security for Virtual Environments in Use
What Does Management for Virtual Environments Do?
When Is Management Software for Virtual Environments
Players in the Management for Virtual Environments World
A Few Examples of Management for Virtual Environments
The Right Tool for the Job
Highlighting When Use Cases Are Confused with Technology
Extreme Transaction Processing
Virtualization Is a Double-Edged Sword
Where to Go Next