Affiliation:
1. St. Cloud State University, USA
Abstract
In this current digital era, organizations are increasingly aware of the need to protect their computer infrastructure to maintain continuity of operations. This process involves a number of different concerns including: managing natural disasters, equipment failure, security breaches, poor data management, inadequate design, and complex/impractical design. The purpose of this chapter is to delineate how virtualization of hosts can be used to address the concerns above resulting in improved computer infrastructure that can easily be restored following a natural disaster and which features fault tolerant hosts/components, isolates applications security attacks, is simpler in design, and is easier to manage.
Reference30 articles.
1. Adams, K. (2002). Geographically distributed system for catastrophic recovery. Proceedings of 16th USENIX Conference on System Administration, (pp. 47-64).
2. Ardagna, D., Tanelli, M., Lovera, M., & Zhang, L. (2010). Black-box performance models for virtualized web service applications. Proceeding of the First Joint WOSP/SIPEW International Conference on Performance Engineering, (pp. 153-164).
3. Teaching IP networking fundamentals in resource constrained educational environments.;G.Armitage;Australasian Journal of Educational Technology,2005
4. Complex networks: Structure and dynamics
5. Balaouras, S. (2007). The state of DR preparedness. Forester/Disaster Recovery Journal. Retrieved July 7, 2010, from http://www.drj.com/ index.php? option=com_conten t&task=view&id= 794&Itemid =159& ed= 10
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献