SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
What Is Virtualization And Cloud Computing?
 Virtualization is an emerging IT paradigm that
 separates computing functions and technology
 implementations from physical hardware.

 Cloud computing, for example, is the
 virtualization of computer programs through an
 internet connection rather than installing
 applications on every office computer.




                   www.consonus.com
Why Virtualization?             Cost Structures
Virtualization can have a drastic change on how
business pays for its technology and handles the
associated risk.
 First, by removing the
hardware associated with
IT functions, capital costs
are virtually eliminated.
 Second, the remaining costs
are strictly transferred into
an operating expense with
on-demand or subscription
based cloud computing applications.



                          www.consonus.com
Why Virtualization?       Efficiency
  Businesses that focus on technology can usually
  leverage their expertise to utilize efficient
  computing and IT resources. For the rest of us,
  that advantage is not the case.
  Virtualization firms are specialized companies
  that can pass on cost savings, know-how, best
  practices, and energy efficiency to clients.
  Operating expenses can be lower with cloud
  computing than an in-house system.




                    www.consonus.com
Case Study
Email Archiving and Data Storage
To understand the benefits of virtualization, let us
examine an application of cloud computing.
 Email archiving and personal data management can occupy
90 minutes out of every worker’s day.
 Email archives can easily top 5 TB (that’s roughly 5,000,000
MB) worth of messages, reply-alls, carbon copies, and
attachments.
 Periodic data backup and maintenance can take over 8 hours
and more than double that time for operational recovery.




                        www.consonus.com
Case Study
Email Archiving and Data Storage




                 www.consonus.com
How Email Archiving Becomes Expensive
In the above environment, data is spread across
multiple sources, leading to duplication, inefficient
storage practices, and possible data loss:
The email server houses recent and saved files.
 Data exists on every user’s hard drive in the form of
exchange archive files, or .pst.
 On-site backups, such as removable drives, CDs, or dormant
hard drives, occupy a good portion of saved data.
 Off-site backups for long term data storage can also be far-
flung.




                         www.consonus.com
Optimizing Data Storage
Optimized, cost efficient data storage would look
like this:
 A single location for all archived data on the most cost
effective storage device type.
 Duplicate data removed and related messages merged to
reduce file sizes.
 A single, always-on access point.
 Quick, painless, and automatic periodic updates with new
data that integrates with existing information.




                         www.consonus.com
Optimizing Data Storage




                 www.consonus.com
How Virtualization Achieves Optimal Data
Storage
Virtual data storage operates similar to a bank:
  A client would bring their data to a cloud computing firm
  who would store it.
  The technology company would take that data, optimize it,
  and merge it with the client’s existing data storage.
  When the client needs to get their data, a single internet
  access point delivers the required email or file.
  To streamline the process, periodic data archiving can
  automatically occur to keep the stored information current
  while creating a turn-key operation.




                        www.consonus.com
Instant Results
Combining, sorting, compressing, and removing
duplication within data will provide instant results.
Compared to the first scenario, a unified, low cost
data structure would look like this:
Size: 2 TB
Backup Window: 3.5 hours
Number of Exchange Messages: Reduced by 86%
Size of Files and Messages: Reduced by 80%




                       www.consonus.com
Instant Results




                  www.consonus.com
Improved Data Reliability And Recovery
Data security and reliability have become
important issues in the global economy. Cloud
computing improves upon them both:
 Virtualization removes the liability from a single, physical
server that can be subject to natural disasters, power
failures, and accidental damage.
 IT best practices and standards provide up-to-date data
security powered by the know-how of specialized technology
firms.




                         www.consonus.com
The Bottom Line
Virtualization and Cloud Computing open up new
possibilities and opportunities for businesses to
utilize technology like never before.
 Costs, risks, and barriers to entry can be knocked down for
small and medium sized businesses.
 All companies can benefit from efficient operations along
with improved reliability and security.




                        www.consonus.com
The Bottom Line




                  www.consonus.com
Presented by Consonus
Consonus is an IT Consulting practice, a
multi-million dollar group that provides business
IT consulting in the following areas:
Disaster Recovery and Virtual Business Continuity
Data Protection
Virtualization
IT Managed Services including Security
IT Infrastructure Library
Data Center Services and Optimization




                        www.consonus.com

Más contenido relacionado

Destacado

Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computingDeep Gupta
 
1.Introduction to virtualization
1.Introduction to virtualization1.Introduction to virtualization
1.Introduction to virtualizationHwanju Kim
 
Virtualization & Cloud computing
Virtualization & Cloud computingVirtualization & Cloud computing
Virtualization & Cloud computingAkhil Raj
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud ComputingJosh Folgado
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
Virtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingVirtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingAhmed Mekkawy
 
Cloud computing
Cloud computingCloud computing
Cloud computingJeroen
 
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for YouHansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for YouEnvironmental Initiative
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
 
Oracle Crm On Demand Release 17 Life Sciences Edition
Oracle Crm On Demand Release 17 Life Sciences EditionOracle Crm On Demand Release 17 Life Sciences Edition
Oracle Crm On Demand Release 17 Life Sciences EditionShane_Boyd
 

Destacado (16)

Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
1.Introduction to virtualization
1.Introduction to virtualization1.Introduction to virtualization
1.Introduction to virtualization
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Virtualization & Cloud computing
Virtualization & Cloud computingVirtualization & Cloud computing
Virtualization & Cloud computing
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud Computing
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Virtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingVirtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud Compting
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for YouHansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Oracle Crm On Demand Release 17 Life Sciences Edition
Oracle Crm On Demand Release 17 Life Sciences EditionOracle Crm On Demand Release 17 Life Sciences Edition
Oracle Crm On Demand Release 17 Life Sciences Edition
 
Wk7 assgnsykesr
Wk7 assgnsykesrWk7 assgnsykesr
Wk7 assgnsykesr
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 

Último

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Último (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

What Is Virtualization And Cloud Computing?

  • 1. What Is Virtualization And Cloud Computing? Virtualization is an emerging IT paradigm that separates computing functions and technology implementations from physical hardware. Cloud computing, for example, is the virtualization of computer programs through an internet connection rather than installing applications on every office computer. www.consonus.com
  • 2. Why Virtualization? Cost Structures Virtualization can have a drastic change on how business pays for its technology and handles the associated risk. First, by removing the hardware associated with IT functions, capital costs are virtually eliminated. Second, the remaining costs are strictly transferred into an operating expense with on-demand or subscription based cloud computing applications. www.consonus.com
  • 3. Why Virtualization? Efficiency Businesses that focus on technology can usually leverage their expertise to utilize efficient computing and IT resources. For the rest of us, that advantage is not the case. Virtualization firms are specialized companies that can pass on cost savings, know-how, best practices, and energy efficiency to clients. Operating expenses can be lower with cloud computing than an in-house system. www.consonus.com
  • 4. Case Study Email Archiving and Data Storage To understand the benefits of virtualization, let us examine an application of cloud computing. Email archiving and personal data management can occupy 90 minutes out of every worker’s day. Email archives can easily top 5 TB (that’s roughly 5,000,000 MB) worth of messages, reply-alls, carbon copies, and attachments. Periodic data backup and maintenance can take over 8 hours and more than double that time for operational recovery. www.consonus.com
  • 5. Case Study Email Archiving and Data Storage www.consonus.com
  • 6. How Email Archiving Becomes Expensive In the above environment, data is spread across multiple sources, leading to duplication, inefficient storage practices, and possible data loss: The email server houses recent and saved files. Data exists on every user’s hard drive in the form of exchange archive files, or .pst. On-site backups, such as removable drives, CDs, or dormant hard drives, occupy a good portion of saved data. Off-site backups for long term data storage can also be far- flung. www.consonus.com
  • 7. Optimizing Data Storage Optimized, cost efficient data storage would look like this: A single location for all archived data on the most cost effective storage device type. Duplicate data removed and related messages merged to reduce file sizes. A single, always-on access point. Quick, painless, and automatic periodic updates with new data that integrates with existing information. www.consonus.com
  • 8. Optimizing Data Storage www.consonus.com
  • 9. How Virtualization Achieves Optimal Data Storage Virtual data storage operates similar to a bank: A client would bring their data to a cloud computing firm who would store it. The technology company would take that data, optimize it, and merge it with the client’s existing data storage. When the client needs to get their data, a single internet access point delivers the required email or file. To streamline the process, periodic data archiving can automatically occur to keep the stored information current while creating a turn-key operation. www.consonus.com
  • 10. Instant Results Combining, sorting, compressing, and removing duplication within data will provide instant results. Compared to the first scenario, a unified, low cost data structure would look like this: Size: 2 TB Backup Window: 3.5 hours Number of Exchange Messages: Reduced by 86% Size of Files and Messages: Reduced by 80% www.consonus.com
  • 11. Instant Results www.consonus.com
  • 12. Improved Data Reliability And Recovery Data security and reliability have become important issues in the global economy. Cloud computing improves upon them both: Virtualization removes the liability from a single, physical server that can be subject to natural disasters, power failures, and accidental damage. IT best practices and standards provide up-to-date data security powered by the know-how of specialized technology firms. www.consonus.com
  • 13. The Bottom Line Virtualization and Cloud Computing open up new possibilities and opportunities for businesses to utilize technology like never before. Costs, risks, and barriers to entry can be knocked down for small and medium sized businesses. All companies can benefit from efficient operations along with improved reliability and security. www.consonus.com
  • 14. The Bottom Line www.consonus.com
  • 15. Presented by Consonus Consonus is an IT Consulting practice, a multi-million dollar group that provides business IT consulting in the following areas: Disaster Recovery and Virtual Business Continuity Data Protection Virtualization IT Managed Services including Security IT Infrastructure Library Data Center Services and Optimization www.consonus.com