Access "Better configuration management strategies for IT pros"
This article is part of the July 2009, Vol. 12 issue of Configuration management keeps control
Years ago the notion of system configuration meant that IT shops made sure they had appropriate hardware characteristics, operating system versions and patch levels. Today’s proliferation of virtual machines (VMs) has dramatically expanded the concept to include every server element, including hardware setups, hypervisor patching, and the makeup of every VM image. In many cases, every machine must share a common, well documented configuration to meet disaster recovery and business continuance needs as well as to demonstrate regulatory compliance. But the sheer number of VMs in a modern data center makes manual configuration almost impossible. So administrators routinely use configuration management tools to exercise fast and accurate control over an increasingly dynamic computing environment. Configuration management is the broad practice of knowing and controlling how systems are set up throughout their lifecycle. Configuration management traditionally starts at the hardware level and tracks system devices through purchase, deployment, maintenance and ... Access >>>
Premium Content for Free.
Better configuration management strategies for IT pros
by Stephen J. Bigelow, WinIT
Pick the best tool to maintain efficient and cost-effective operation in today’s virtual data centers.
Virtualizing desktops: Getting the most out of your server, storage and network
by Brien Posey
Plan ahead with a virtual desktop infrastructure strategy that will yield more bang for the buck.
- Better configuration management strategies for IT pros by Stephen J. Bigelow, WinIT
Securing virtual environments: Three considerations
by Edward L. Haletky, Contributor
If you approach virtual environment security by viewing elements such as a hypervisor and management applications in isolation, you invite breaches and risk. This tip outlines three common risks to virtual environments and how to prevent them.
- Securing virtual environments: Three considerations by Edward L. Haletky, Contributor
More Premium Content Accessible For Free
Virtualization solves a lot of problems, but it also presents new challenges, especially related to storage. Do you need new tools that address ...
Automation isn't new, but as virtualized environments become more complex, admins are seeing a bigger need for features that help them manage their ...
Virtualization creates an abstraction layer between hardware and the operating system and applications, providing great flexibility and ease when it ...