Small Business Virtualization Roadmap - Slide 12

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16
Next Step Four: Execution-12 Next

Step Four: Execution

CDW experts share technical execution best practices:

  • Build in limits for VM sprawl. Too many VMs can hinder efficiency as well.
  • Be consistent in technology purchases. While the server virtualization hypervisor and related products are not brand-specific, it‘s a smart move to be consistent in hardware brands and components.
  • Allocate VMs running a variety of applications to a given host. This will amplify the network and application optimization measures in place.
  • Avoid single points of failure. SANs should be linked to back one another up; redundant network interface cards (NICs) will keep a host connected should one card fail.
  • Keep abreast of security developments for the virtualized world. More research is being focused on security at the hypervisor level of virtualization and thereby the improved protection of virtual machines.
  • Virtualization is a means to an end, not an end in itself. The decision on whether to virtualize comes down to the resources demanded by an application.

How can small businesses know if virtualization is a fit? To answer this question, CDW surveyed nearly 300 small business Information Technology (IT) professionals through Spiceworks, a social network for IT, interviewing those that have and have not virtualized for their perceptions of and experiences with server virtualization.

The resulting Small Business Virtualization Roadmap examines the opportunities and challenges related to server virtualization.

More Slideshows:


Seven Ways to Identify a Secure IT Environment A security checklist for IT pros.

The Secret Rules of Business Success (or Failure) Rules that define the differences between a company that is doing well and one that is failing.

Top 10 Reads for IT Executives The top reads at Books24x7 are indicative of current business and IT trends.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.