Analysis of Risks for Virtualization Technology

Article Preview

Abstract:

In IT field, the application of the virtualization technology has expanded the capacity of computer hardware, simplified the software configuration process, and simulated the parallel operation of multiple CPUs. Such technology can achieve multiple operating systems running one platform at the same time, and improve the work efficiency of the computer. In the application of the virtualization technology, there are various conditions to cause risks, such as security, high resource utilization, disunited virtualization technology standards, expectation for cost reduction, changes in management mode and application migration, etc. For the risk existing in the application of the technology, the author puts forward the specific countermeasures, benefiting the abatement or elimination of risk of virtualization technology application, thus to ensure the purpose of applying such technology. This paper mainly analyzes the target the risk of virtualization technology application and puts forward the specific measures for reducing the risk of the virtualization technology application, in order to facilitate the practical application and development of the virtualization technology.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

374-377

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Wang Song. Exploration of Application and Development Trend of Virtualization technology [J]. Electronic Commerce of China, 2013 (10): 32.

Google Scholar

[2] Li Fei. Research and Application of Virtualization Technology in Grid Informatization [J]. Electronic World, 2013 (18): 53.

Google Scholar

[3] Zhang Yi and Sun Zhigang. Virtualization Technology of Trusted Network-orientated Research [J]. Journal of Computers, 2009, 32 (03): 417-423.

Google Scholar

[4] Yu Minghui. Research on Risk Analysis and Countermeasure of Virtualization Technology Application [J]. Information Security and Technology, 2010 (08): 77-80.

Google Scholar