09.02.2013 Views

C4 Marine Brig. Gen. Kevin J. Nally - KMI Media Group

C4 Marine Brig. Gen. Kevin J. Nally - KMI Media Group

C4 Marine Brig. Gen. Kevin J. Nally - KMI Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

used to provide multiple “virtual”<br />

servers.<br />

• Efficient use of hardware—in many<br />

cases, hardware is of excess capacity,<br />

causing organizations to have<br />

wasted resources.<br />

• Backup/recovery of the operating<br />

environment is very much simplified—in<br />

most cases, the “guest”<br />

operating systems are simply one or<br />

two files, which can be copied to a<br />

backup media, without logical complications<br />

of copying out multiple<br />

volumes.<br />

• In addition to production deployment,<br />

virtual machines are also<br />

ideal for research and development<br />

and prototyping. Thus, organizations<br />

can create prototypes<br />

and demonstration environment,<br />

before settling for a high cost data<br />

Mature Technology<br />

Regarded as a novelty just a few years<br />

ago, virtualization has become a mature<br />

technology that will be the standard architecture<br />

for IT departments for the foreseeable<br />

future. The many concrete benefits<br />

of virtualizing an infrastructure make this<br />

paradigm shift inevitable, including reduced<br />

administration, better security, greater efficiency,<br />

more uptime, less power and cooling,<br />

and lower costs.<br />

“Virtualization” is a broad term that<br />

includes different types of solutions. Each<br />

provides the benefits of virtualization, but is<br />

better suited to a particular type of customer<br />

circumstances. CDS recognizes four major<br />

subgenres of virtualization:<br />

center and refine such a prototype,<br />

until decisions are made on<br />

the actual architecture of the data<br />

center.<br />

key ProvIders of<br />

vIrtualIzatIon<br />

Virtualization vendors are of different<br />

types; some are specific to operating systems<br />

such as Linux, Windows or Mac OS. Many<br />

are also many types of virtualizations, such<br />

as full virtualization, hardware assisted virtualization,<br />

operating system-level virtualization<br />

and so on.<br />

Key providers include Oracle/Sun, whose<br />

VirtualBox is a family of powerful x86 virtualization<br />

products for enterprise as well<br />

as home use. Not only is VirtualBox an<br />

extremely feature rich, high performance<br />

product for enterprise customers, it is also<br />

By Charles Rarick, Vice President of Sales and Technology<br />

CDS<br />

• Desktop virtualization, which transparently<br />

provides users a familiar<br />

work environment while centralizing<br />

their applications and data.<br />

• Server virtualization, which unties<br />

operating systems from the underlying<br />

hardware, enhancing flexibility<br />

and utilization<br />

• Storage virtualization, which simplifies<br />

data handling and improves<br />

34 | MIT 15.1<br />

the only professional solution that is freely<br />

available as open source software under the<br />

terms of the GNU <strong>Gen</strong>eral Public License.<br />

Among other providers are VMWare, Rightscale,<br />

eNormany, Gigaspaces and Citrix.<br />

some of the drawBaCks<br />

of vIrtualIzatIon<br />

Some key areas of caution include security<br />

of the environment. Since the machines<br />

can be easily cloned, there is some concern<br />

in the industry about data falling into unauthorized<br />

hands. There are several solutions<br />

to mitigate such as risk, including Oracle’s<br />

Transparent Data Encryption, where the<br />

keys can be stored separately from the virtual<br />

machine’s data files. Other concerns include<br />

misuse of licenses. But with proper license<br />

management enforcement within the organization,<br />

this concern can be overcome.<br />

Virtualization will be the standard architecture for IT<br />

departments for the foreseeable future.<br />

back end data protection and performance.<br />

• Cloud computing, which has<br />

become an abstraction related to<br />

remote access, utility computing,<br />

virtualization and SaaS/IaaS/PaaS.<br />

The objective is that the user does<br />

not necessarily know (or care)<br />

where his/her apps, data, or processing<br />

are, but only that they can<br />

be accessed through a variety of<br />

devices.<br />

Each of these types of virtualization can<br />

be implemented in several different ways,<br />

and combined to maximize the benefits of<br />

the virtualized infrastructure. In missioncritical<br />

environments a fully integrated<br />

platform is essential to ensure high availability,<br />

ease of migration and to future proof<br />

secure solutions.<br />

CDS’ proven approach is called Mission<br />

Application Virtualization Environment<br />

(MAVEN). MAVEN is a preconfigured virtual<br />

environment that automatically detects<br />

hardware failures and transfers critical applications<br />

to other physical servers, restarting<br />

them in 60 seconds or less. Administrators<br />

can upgrade applications and operating systems<br />

centrally, rather than attempting to<br />

manage patches and versions across hundreds<br />

of workstations.<br />

Migration from existing applications to<br />

the virtual MAVEN environment requires<br />

little or no modification. MAVEN also supports<br />

any application, such as Microsoft<br />

Exchange and SQL, COMPOSE, and Oracle<br />

Cross Domain Security Express. MAVEN is<br />

in active deployment at U.S. Coast Guard<br />

Headquarters CG-26, with further deployments<br />

planned at other military sites.<br />

A major benefit of this approach is the ability<br />

to take commodity server hardware from<br />

many IT providers, thus avoiding forklift<br />

upgrades.<br />

With the advent of the cloud-computing<br />

trend, organizations look toward a new<br />

range of possibilities for streamlining data<br />

center operations, as well as new concerns<br />

and threats. With the right expertise cloud<br />

computing offers managed expenses and<br />

administration, or in combination “private<br />

clouds” can also improve productivity while<br />

maintaining security and control. O<br />

www.MIT-kmi.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!