Access "Inside the capacity management process: Resource supply and demand"
This article is part of the February 2011, Vol. 31 issue of How to make the transition from physical to virtual and back
In a virtual infrastructure, having a strong capacity management process in place is critical to maintaining solid server resource allocation. When you begin using virtualization, capacity planning charts the course for resource balancing. Capacity management is the continual process of maintaining optimal virtual machine (VM) capacity. More on capacity management and planning How cloud computing will change capacity management Virtualization capacity planning strategy guide Virtualization capacity planning explained CA Technologies to acquire Hyperformix for automated capacity planning Why a capacity planning strategy is essential for virtualization Many IT professionals also associate the capacity management process with performance management, which makes sense. The goal of performance management is to identify parts of an infrastructure where performance isn’t up to snuff and to tweak resource levels to keep VMs operating at peak levels. Although the capacity management process uses the same metrics as those used for performance management process, ... Access >>>
Premium Content for Free.
Considerations for V2V and V2P workload migrations
by Stephen J. Bigelow, Senior Technology Editor
Although there are few situations in which V2V or V2P migrations are necessary, administrators needing to make these moves must be prepared to handle unique challenges.
Inside the capacity management process: Resource supply and demand
by Greg Shields, Contributor
Keep your servers up to snuff by ensuring that resources have been optimally allocated. Understanding resource supply and demand is the key to a strong capacity management process.
- Considerations for V2V and V2P workload migrations by Stephen J. Bigelow, Senior Technology Editor
Virtual security: New attack vectors, new ballgame
by Eric Siebert, Contributor
With physical security, you don't have to consider breaches of virtual machines, utilities or virtual disk files. But virtualization creates new security risks and vulnerabilities.
- Virtual security: New attack vectors, new ballgame by Eric Siebert, Contributor
More Premium Content Accessible For Free
The benefits of server virtualization have been widely accepted, but companies may still have reservations about virtualizing applications that ...
After briefly considering public cloud computing, many companies are opting for private models instead. This expert IT handbook provides an in-depth ...
In the latest edition of Virtual Data Center, get your toughest Desktop as a Service (DaaS) questions answered by experts. Learn how desktop ...