Buy linux-fans.com ?

Products related to Virtualization:


  • QNAP  TS-251+-2G  small 2 bay nas storage server supporting HDMI, transcoding, and virtualization
    QNAP TS-251+-2G small 2 bay nas storage server supporting HDMI, transcoding, and virtualization

    Wholesale Price ,Trade Assurance | Alibaba.com

    Price: 399.0 € | Shipping*: 0.00 €
  • Linux Kernel Development
    Linux Kernel Development

    Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding. The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces.It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel.Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques.This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book: An all-new chapter on kernel data structuresDetails on interrupt handlers and bottom halvesExtended coverage of virtual memory and memory allocationTips on debugging the Linux kernelIn-depth coverage of kernel synchronization and lockingUseful insight into submitting kernel patches and working with the Linux kernel community

    Price: 36.99 £ | Shipping*: 0.00 £
  • Radio Access Network Slicing and Virtualization for 5G Vertical Industries
    Radio Access Network Slicing and Virtualization for 5G Vertical Industries

    Learn how radio access network (RAN) slicing allows 5G networks to adapt to a wide range of environments in this masterful resource Radio Access Network Slicing and Virtualization for 5G Vertical Industriesprovides readers with a comprehensive and authoritative examination of crucial topics in the field of radio access network (RAN) slicing.Learn from renowned experts as they detail how this technology supports and applies to various industrial sectors, including manufacturing, entertainment, public safety, public transport, healthcare, financial services, automotive, and energy utilities. Radio Access Network Slicing and Virtualization for 5G Vertical Industries explains how future wireless communication systems must be built to handle high degrees of heterogeneity, including different types of applications, device classes, physical environments, mobility levels, and carrier frequencies.The authors describe how RAN slicing can be utilized to adapt 5G technologies to such wide-ranging circumstances. The book covers a wide range of topics necessary to understand RAN slicing, including: Physical waveforms designMultiple service signals coexistenceRAN slicing and virtualizationApplications to 5G vertical industries in a variety of environments This book is perfect for telecom engineers and industry actors who wish to identify realistic and cost-effective concepts to support specific 5G verticals.It also belongs on the bookshelves of researchers, professors, doctoral, and postgraduate students who want to identify open issues and conduct further research.

    Price: 103.95 £ | Shipping*: 0.00 £
  • Learning eBPF : Programming the Linux Kernel for Enhanced Observability, Networking, and Security
    Learning eBPF : Programming the Linux Kernel for Enhanced Observability, Networking, and Security

    What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves.It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works.Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves. With this book, you will:Learn why eBPF has become so important in the past couple of yearsWrite basic eBPF code, and manipulate eBPF programs and attach them to eventsExplore how eBPF components interact with Linux to dynamically change the operating system's behaviorLearn how tools based on eBPF can instrument applications without changes to the apps or their configurationDiscover how this technology enables new tools for observability, security, and networking

    Price: 44.99 £ | Shipping*: 0.00 £
  • Understanding the Linux Kernel
    Understanding the Linux Kernel

    In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel.The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order.It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks.The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel.Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line.But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices.The book focuses on the following topics: * Memory management, including file buffering, process swapping, and Direct memory Access (DMA) * The Virtual Filesystem layer and the Second and Third Extended Filesystems * Process creation and scheduling * Signals, interrupts, and the essential interfaces to device drivers * Timing * Synchronization within the kernel * Interprocess Communication (IPC) * Program execution Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise.You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments.This book will help you make the most of your Linux system.

    Price: 55.99 £ | Shipping*: 0.00 £
  • Linux System Programming
    Linux System Programming

    Write software that draws directly on services offered by the Linux kernel and core system libraries.With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider's guide to writing smarter, faster code.Love clearly distinguishes between POSIX standard functions and special services offered only by Linux. With a new chapter on multithreading, this updated and expanded edition provides an in-depth look at Linux from both a theoretical and applied perspective over a wide range of programming topics, including: A Linux kernel, C library, and C compiler overview Basic I/O operations, such as reading from and writing to files Advanced I/O interfaces, memory mappings, and optimization techniques The family of system calls for basic process management Advanced process management, including real-time processes Thread concepts, multithreaded programming, and Pthreads File and directory management Interfaces for allocating memory and optimizing memory access Basic and advanced signal interfaces, and their role on the system Clock management, including POSIX clocks and high-resolution timers

    Price: 55.99 £ | Shipping*: 0.00 £
  • VMware Certified Professional Data Center Virtualization on vSphere 6.7 Study Guide : Exam 2V0-21.19
    VMware Certified Professional Data Center Virtualization on vSphere 6.7 Study Guide : Exam 2V0-21.19

    Master vSphere 6 virtualization with hands-on practice and bonus preview exams VCP6-DCV: VMware Certified Professional-Data Center Virtualization on vSphere 6 Study Guide is your ultimate guide to preparing for exam 2VO-621.This Study Guide provides 100% coverage of all exam objectives and offers a unique set of study tools including assessment tests, objective map, real-world scenarios, hands-on exercises, and much more so you can be confident come exam day.You will also receive access to the superior Sybex interactive online learning environment that provides additional study tools including electronic flashcards and bonus practice exams.More than just a study guide, this book bridges the gap between exam prep and real-world on the job skills by focusing on the key information VMware professionals need to do the job.You'll master the vCenter Server and ESXi from planning and installation through upgrade and security, and develop an in-depth understanding of vSphere networking and storage, vApp deployment, service level establishment, troubleshooting, monitoring implementation, and so much more.Study 100% of exam 2V0-621 objectivesPractice your skills with hands-on exercisesGain professional insight from real-world scenariosTest your understanding with review questions, practice tests, and more Virtualization is the number-one IT priority for organizations across public and private sectors, and VMware is the dominant force in the virtualization space.The VCP6-DCV certification gives you a highly marketable credential in terms of employment, but first you must pass this challenging exam.VCP6-DCV gives you the power of Sybex exam prep and the skills you need to excel at the job.

    Price: 47.50 £ | Shipping*: 0.00 £
  • The Linux Programming Interface
    The Linux Programming Interface

    The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interface the interface employed by nearly every application that runs on a Linux or UNIX system.In this authoritative work, Linux programming expert Michael Kerrisk provides detailed descriptions of the system calls and library functions that you need in order to master the craft of system programming, and accompanies his explanations with clear, complete example programs.You'll find descriptions of over 500 system calls and library functions, and more than 200 example programs, 88 tables, and 115 diagrams.You'll learn how to: Read and write files efficiently Use signals, clocks, and timers Create processes and execute programs Write secure programs Write multithreaded programs using POSIX threads Build and use shared libraries Perform interprocess communication using pipes, message queues, shared memory, and semaphores Write network applications with the sockets API While The Linux Programming Interface covers a wealth of Linux-specific features, including epoll, inotify, and the /proc file system, its emphasis on UNIX standards (POSIX.1-2001/SUSv3 and POSIX.1-2008/SUSv4) makes it equally valuable to programmers working on other UNIX platforms.The Linux Programming Interface is the most comprehensive single-volume work on the Linux and UNIX programming interface, and a book that's destined to become a new classic.The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interface the interface employed by nearly every application that runs on a Linux or UNIX system.In this authoritative work, Linux programming expert Michael Kerrisk provides detailed descriptions of the system calls and library functions that you need in order to master the craft of system programming, and accompanies his explanations with clear, complete example programs.You'll find descriptions of over 500 system calls and library functions, and more than 200 example programs, 88 tables, and 115 diagrams.You'll learn how to: Read and write files efficiently Use signals, clocks, and timers Create processes and execute programs Write secure programs Write multithreaded programs using POSIX threads Build and use shared libraries Perform interprocess communication using pipes, message queues, shared memory, and semaphores Write network applications with the sockets API While The Linux Programming Interface covers a wealth of Linux-specific features, including epoll, inotify, and the /proc file system, its emphasis on UNIX standards (POSIX.1-2001/SUSv3 and POSIX.1-2008/SUSv4) makes it equally valuable to programmers working on other UNIX platforms.The Linux Programming Interface is the most comprehensive single-volume work on the Linux and UNIX programming interface, and a book that's destined to become a new classic.

    Price: 94.99 £ | Shipping*: 0.00 £

Similar search terms for Virtualization:


  • Which virtualization?

    There are several types of virtualization, including server virtualization, desktop virtualization, network virtualization, and storage virtualization. Each type serves a different purpose and has its own set of benefits. Server virtualization allows multiple virtual servers to run on a single physical server, increasing efficiency and reducing costs. Desktop virtualization enables users to access their desktop environment from any device. Network virtualization abstracts network resources to create a virtual network that can be customized and managed independently. Storage virtualization pools physical storage from multiple devices into a single virtual storage unit for easier management and scalability.

  • How do I activate virtualization on Linux Ubuntu?

    To activate virtualization on Linux Ubuntu, you can follow these steps: 1. First, you need to check if your CPU supports virtualization by running the following command in the terminal: `egrep -c '(vmx|svm)' /proc/cpuinfo`. If the output is greater than 0, it means your CPU supports virtualization. 2. Next, you need to install the CPU checker tool by running the command: `sudo apt-get install cpu-checker`. 3. Then, you can enable virtualization in the BIOS settings of your computer. Reboot your computer and enter the BIOS settings by pressing the appropriate key (usually F2, F10, or Del) during the boot process. Look for an option related to virtualization and enable it. 4. Finally, you can verify that virtualization is enabled by running the command: `kvm-ok`. If the output is "INFO: /dev/kvm exists" and "KVM acceleration can be used", it

  • Where is virtualization used?

    Virtualization is used in various industries and settings, including data centers, cloud computing environments, software development, and testing environments. It is also commonly used in server consolidation, allowing multiple virtual servers to run on a single physical server, reducing hardware costs and improving resource utilization. Additionally, virtualization is used in disaster recovery solutions, enabling organizations to quickly recover and restore systems in case of a failure.

  • What is hardware virtualization?

    Hardware virtualization is the process of creating a virtual version of a physical computer system. This is achieved by using a hypervisor, which is a software that allows multiple operating systems to run on a single physical machine. Hardware virtualization enables the efficient use of physical resources by allowing multiple virtual machines to run on a single physical server, leading to cost savings and improved flexibility in managing IT infrastructure. It also provides isolation between virtual machines, allowing them to run independent of each other.

  • What is UAC virtualization?

    UAC virtualization, also known as User Account Control virtualization, is a feature in Windows operating systems that allows legacy applications to run in a limited user environment without requiring administrative privileges. When a legacy application attempts to write to a protected system location, UAC virtualization redirects the write operation to a virtualized location within the user's profile, allowing the application to function without compromising system security. This helps to maintain system integrity and security while still allowing older applications to run on newer versions of Windows.

  • What is CPU virtualization?

    CPU virtualization is the process of creating multiple virtual instances of a physical CPU, allowing multiple operating systems and applications to run simultaneously on a single physical machine. This technology enables better utilization of hardware resources, improved flexibility, and cost savings by reducing the need for multiple physical servers. CPU virtualization is a key component of cloud computing and is commonly used in data centers to optimize server performance and resource allocation.

  • Is virtualization with Bluestacks dangerous?

    Virtualization with Bluestacks is not inherently dangerous. Bluestacks is a legitimate Android emulator that allows users to run Android apps on their computers. However, as with any software, there may be potential security risks associated with virtualization, such as the possibility of malware or other security vulnerabilities. It is important for users to download Bluestacks from a reputable source and to keep their virtualization software and operating system up to date with the latest security patches to minimize any potential risks.

  • How does UAC virtualization work?

    UAC virtualization works by redirecting file and registry operations from a protected location to a virtualized location. When an application tries to write to a protected location, UAC virtualization intercepts the request and redirects it to a virtual store specific to that application. This allows the application to run as if it has administrative privileges without actually having them, thus preventing potential security risks.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.