IT Governance, Risk, and Compliance

Mar 8 2011   8:41PM GMT

Managing the Growth and Impact of Virtual Machines and Memory – Part VIII



Posted by: Robert Davis
Tags:
Availability
Demand Paging
Demand Segmentation
Hypervisor
IT Configuration
IT Service Delivery
Multiprocessing
Multiprogramming
Operating System
OS
Virtual Machine
Virtual Machine Monitor
Virtual Memory
VM
VMM

Given the proliferation of available hardware and software products that enable capitalizing on benefits associated with IT virtualization, when IT employees fail to perform effective configuration management; potential threats to the IT architecture are significantly increased. Besides managing the common risks associated with utilizing virtual memory and system virtual machines, additional procedures are necessary due to the inherent control weakness in program conversion to binary code for deployed process virtual machines. In particular, since process virtual machines are typically implemented using a program interpreter that relies on just-in-time source code compilation, programs are more susceptible to task modification. Thus, IT virtualization technology must be controlled to prevent service disruptions to end users and financial losses to the entity.

View Part I of the Managing the Growth and Impact of Virtual Machines and Memory series here

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: