{"id":24391,"date":"2023-12-18T03:39:58","date_gmt":"2023-12-18T03:39:58","guid":{"rendered":"https:\/\/academicwritersbay.com\/writings\/browse-through-the-chapters-5-8-reading-summarize-the-most-interesting\/"},"modified":"2023-12-18T03:39:58","modified_gmt":"2023-12-18T03:39:58","slug":"browse-through-the-chapters-5-8-reading-summarize-the-most-interesting","status":"publish","type":"post","link":"https:\/\/academicwritersbay.com\/writings\/browse-through-the-chapters-5-8-reading-summarize-the-most-interesting\/","title":{"rendered":"Browse through the chapters 5-8 Reading. Summarize the most interesting"},"content":{"rendered":"<div class='css-tib94n'>\n<div class='css-1lys3v9'>\n<div>\n<p>1. \u00a0Browse through the chapters 5-8 Reading.<\/p>\n<\/p>\n<p>2. \u00a0Summarize the most interesting fact your learned from each Chapter Section. \u00a0Note: \u00a0you should have all 4 facts\/application bullets for full credit on your initial post.\u00a0<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class='css-6a9esh'>\n<div class='css-eql546'>\n<ul class='css-2imjyh'>\n<li class='css-1960nst'>\n<div class='css-1nylpq2'>\n<div class='css-1yqrwo0'>CSY125Week2Lecture2022.pptx<\/div>\n<\/p><\/div>\n<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div>\n<p>Operating Systems Week 2 Lecture<\/p>\n<p>CSY125  <\/p>\n<p>Valley College<\/p>\n<p>Phil Thacker<\/p>\n<p>[email\u00a0protected]<\/p>\n<p>  310.892.3594<\/p>\n<\/p>\n<div>          <\/div>\n<div>\n<div>\n<p>1<\/p>\n<\/p>\n<\/div>\n<div>\n<p>Week 2 Learning Objectives<\/p>\n<\/p>\n<p>Installing Operating Systems<\/p>\n<\/p>\n<p>Devices &#038; Device Drivers<\/p>\n<\/p>\n<p>Storage Technologies<\/p>\n<\/p>\n<p>Virtualization and Cloud Computing Fundamentals<\/p>\n<\/p>\n<\/p><\/div>\n<div>\n<div>\n<p>2<\/p>\n<\/p>\n<\/div>\n<div>\n<p>3 Stages of deploying a new OS<\/p>\n<p>Preparation<\/p>\n<p>Identify OS media &#038; licensing <\/p>\n<p>Verifying hardware and hardware driver compatibility<\/p>\n<p>Determining which elements of OS to be installed<\/p>\n<p>Conducting a test upgrade<\/p>\n<\/p>\n<p>Installation<\/p>\n<p>Backing up the OSs before starting<\/p>\n<p>Running the installation program<\/p>\n<p>Copying OS files to your computer<\/p>\n<p>Configuring devices and drivers<\/p>\n<\/p>\n<p>Post Configuration<\/p>\n<p>Restarting the system and finalizing configuration of devices<\/p>\n<p>Check &#038; download updates\/patches for OS<\/p>\n<p>Training for users and\/or administrators<\/p>\n<\/p>\n<\/p><\/div>\n<div>\n<div>\n<p>Clean installation \u2013 on a computer that either has no OS or on a computer that has an OS that will be overwritten by the installation<\/p>\n<p>Upgrade installation \u2013 on a computer that already has an earlier version of the operating system<\/p>\n<\/p>\n<p>Most OSs have the Plug and Play (PnP) feature that automatically configures internal and external devices as part of the installation<\/p>\n<p>Even with PnP-capable OSs<\/p>\n<p>You may have to configure devices to work optimally with the OS<\/p>\n<\/p>\n<p>Preparing for installation involves <\/p>\n<p>            Making sure the computer meets or exceeds the minimum requirements<\/p>\n<p>The speed and type of CPU<\/p>\n<p>The amount of memory<\/p>\n<p>The amount of free disk space<\/p>\n<p>Ensuring that all equipment is operating correctly<\/p>\n<p>Having all OS installation media available<\/p>\n<p>Understanding the general features of the OS you are installing so you can decide which modules to install or omit<\/p>\n<p>Having device drivers that might not be included with the OS installation files<\/p>\n<p>Having accurate information available about your computer and peripheral devices<\/p>\n<p>Being aware of network environment in which you are installing the OS<\/p>\n<\/p>\n<p>Installing an OS<\/p>\n<p>Where (in which drive, folder, or path) to install the OS and what to name the folder that contains the OS<\/p>\n<p>What type of installation you wish to perform (Custom or Upgrade)<\/p>\n<p>Information about you, your company, and your computer (computer or workgroup name)<\/p>\n<p>Licensing information verifying your right to install the OS<\/p>\n<p>Which components of the OS you want to install<\/p>\n<\/p>\n<p>Post Install\/Upgrade:<\/p>\n<p>After installation, keep the product key, ID number or activation number in a safe place<\/p>\n<p>The installation consists of some of the following general functions:<\/p>\n<p>Running the installation program<\/p>\n<p>Gathering system information<\/p>\n<p>Determining which elements of OS to be installed<\/p>\n<p>Copying OS files to your computer<\/p>\n<p>Configuring devices and drivers<\/p>\n<p>Restarting the system and finalizing configuration of devices<\/p>\n<\/p>\n<p>3<\/p>\n<\/p>\n<\/div>\n<p>Preparation<\/p>\n<\/p>\n<p>Installation<\/p>\n<\/p>\n<p>Configuration<\/p>\n<\/p>\n<div>\n<p>Preparing to install Client OS<\/p>\n<p>Verify Minimum OS Requirements: CPU, RAM, Storage &#038; Network<\/p>\n<p>Confirm Hardware is properly functioning (e.g. keyboard, mouse)<\/p>\n<p>Installation Media on hand (e.g. DVD or USB drive)<\/p>\n<p>Device Drivers:  You may need to install if you have unusual peripherals<\/p>\n<p>Storage Configuration:  Make sure you install OS on target partitions<\/p>\n<p>Username\/Password:  local admin or superuser credentials are good<\/p>\n<p>Network Environment: IP address connected to LAN for automatic updates or PnP<\/p>\n<\/p>\n<p>Virtual Machine Installs: Use similar checklist after you create the VM on your workstation, but no need to check hardware functionality and most installs are performed from network resources.<\/p>\n<\/p>\n<\/div>\n<div>\n<div>\n<p>Preparing for an Upgrade or Migration<\/p>\n<\/p>\n<p>Deciding to Upgrade or Migrate<\/p>\n<p>Do you or your organization need new functionality that may come with an upgrade?<\/p>\n<p>Objective analysis of the situation may show that an upgrade or migration might not be cost effective<\/p>\n<p>However, you may want to upgrade to newer hardware for warranty, performance, and reliability; your old OS may not support the new hardware features<\/p>\n<p>Experience has also shown that it is best not to upgrade\/migrate shortly after a new OS is released<\/p>\n<\/p>\n<p>A migration may be necessary:<\/p>\n<p>When you find that your current OS version does not support new software or certain devices you want to use<\/p>\n<p>Older OSs don\u2019t have new security features required for safer network and Internet access<\/p>\n<\/p>\n<p>4<\/p>\n<\/p>\n<\/div>\n<div>\n<p>Preparing to install Server OS<\/p>\n<p>WINDOWS SERVER:  <\/p>\n<p>Server Role: determines required services such as DNS, DHCP, Active Directory, etc)<\/p>\n<p>Hardware Requirements: CPU, Disk Subsystem, Memory, Hot-add\/Host-add features<\/p>\n<p>Design: ServerName, IP Addressing scheme, timezone, Domain\/Workgroup setup<\/p>\n<p>WindowServer Edition: Datacenter, Standard, Essentials editions<\/p>\n<\/p>\n<p>LINUX\/UNIX SERVER:  <\/p>\n<p>Similar to Windows: Role, Hardware, Design components<\/p>\n<p>Distribution:  Choose which LINUX kernel and software package to meet Server role<\/p>\n<\/p>\n<p>MacOS SERVER:  <\/p>\n<p>Apple no longer provides MacOS Server Add-on after OSX 10.6 Snow Leopard (2009)<\/p>\n<\/p>\n<\/p><\/div>\n<div>\n<div>\n<p>Preparing for an Upgrade or Migration<\/p>\n<\/p>\n<p>Deciding to Upgrade or Migrate<\/p>\n<p>Do you or your organization need new functionality that may come with an upgrade?<\/p>\n<p>Objective analysis of the situation may show that an upgrade or migration might not be cost effective<\/p>\n<p>However, you may want to upgrade to newer hardware for warranty, performance, and reliability; your old OS may not support the new hardware features<\/p>\n<p>Experience has also shown that it is best not to upgrade\/migrate shortly after a new OS is released<\/p>\n<\/p>\n<p>A migration may be necessary:<\/p>\n<p>When you find that your current OS version does not support new software or certain devices you want to use<\/p>\n<p>Older OSs don\u2019t have new security features required for safer network and Internet access<\/p>\n<\/p>\n<p>5<\/p>\n<\/p>\n<\/div>\n<div>\n<div>\n<p>Installing Operating Systems<\/p>\n<p>Make a Backup Prior to Migrating to new OS <\/p>\n<p>Close all open windows and save files to DVD, an external drive or other media<\/p>\n<p>Ensure you have the software to restore the backups under the new and old OS<\/p>\n<p>LINUX upgrades overwrite config files such as (email, print, windows &#038; network), backups are important.<\/p>\n<\/p>\n<p>Perform operating system installations or upgrade:<\/p>\n<p>Clean installation \u2013 on a computer that either has no OS or on a computer that has an OS that will be overwritten by the installation<\/p>\n<p>Upgrade installation \u2013 on a computer that already has an earlier version of the operating system<\/p>\n<\/p>\n<p>Post Install\/Upgrade:<\/p>\n<p>Reboot OS:  Confirm functionality<\/p>\n<p>Check for Updates\/Patches:  Apply OS bug fixes, security patches and device drivers<\/p>\n<p>W<\/p>\n<\/p>\n<div>          <\/div>\n<div>\n<div>\n<p>CompTIA Objective 1.2 \u2013 Given a scenario, install Windows PC operating systems using appropriate methods<\/p>\n<\/p>\n<p>Migrating to a New OS<\/p>\n<\/p>\n<p>Even with PnP-capable OSs, You may have to configure devices to work optimally with the OS<\/p>\n<\/p>\n<p>6<\/p>\n<\/p>\n<\/div>\n<div>\n<div>\n<p>Input\/Output Devices<\/p>\n<p>An OS handles input and output device communications through device                                       drivers (software) and hardware usually provided by device manufacturer<\/p>\n<p>Device drivers are often provided with an OS, but the most up-to-date device                                     drivers come directly form each device manufacturer<\/p>\n<\/p>\n<p>I\/O Device Categories<\/p>\n<p>Random-Access:  Allows access to any location of device storage (Disk Drives &#038; RAM)<\/p>\n<p>Sequential-Access: Must access storage from start of register (Serial Ports, tape drives, NICs)<\/p>\n<p>Character-Stream: Device that transfers data one byte at a time (keyboards, mice, serial ports, sound cards)<\/p>\n<p>Block Device: Transfers data in blocks, usually at a fixed size (storage devices, disk drives)<\/p>\n<\/p><\/div>\n<div>\n<div>\n<p>CompTIA Objective 1.12 Install and configure common peripheral devices.<\/p>\n<\/p>\n<p>A bad device driver could not only render your device useless, but it can lock up your system.<\/p>\n<p>7<\/p>\n<\/p>\n<\/div>\n<div>\n<div>\n<p>Driver &#038; Printer Installations<\/p>\n<p>Windows OS<\/p>\n<p>Plug and Play (PnP): usually first option for \u201ccheck updates\u201d<\/p>\n<p>Windows Wizard:  Use when PnP fails<\/p>\n<p>Device Manager:  Use to install, update, or rollback a device driver<\/p>\n<p>Printers:  Use the Add Printer Wizard to walk through printer driver install process<\/p>\n<\/p>\n<p>Linux Driver Installs<\/p>\n<p>Device Special Files: Add file to the \/dev folder using the mknod command<\/p>\n<p>3 Special Files:  Block special files, Character special files, Named pipes (internal communications)<\/p>\n<p>Printers:  printtool (Fedora Linux) is common tool\/module to install Printers<\/p>\n<\/p>\n<p>MacOS Driver Installs<\/p>\n<p>PnP: MacOS comes with drivers for most hardware so simply attach hardware and reboot system<\/p>\n<p>DVD\/Software download: When PnP fails<\/p>\n<p>Printers:  Printer Setup Utility<\/p>\n<\/p><\/div>\n<div>\n<div>\n<p>CompTIA Objective 1.12 Install and configure common peripheral devices.<\/p>\n<\/p>\n<p>A bad device driver could not only render your device useless, but it can lock up your system.<\/p>\n<p>8<\/p>\n<\/p>\n<\/div>\n<div>\n<div>\n<p>Using &#038; Configuring Storage Devices<\/p>\n<p>Most uses of computer storage: <\/p>\n<p>Operating system files User applications User documents  Shared file systems<\/p>\n<p>Virtual memory   Log files   Virtual machines Database storage<\/p>\n<\/p>\n<p>Four categories of storage access methods:<\/p>\n<p>Local storage \u2013 HDD v SSD \u2013 Direct connectivity computer system board<\/p>\n<p>Direct-attached storage (DAS) \u2013 Device connected via external bus interface<\/p>\n<p>Network-attached storage (NAS) \u2013 Stand-alone appliance on the Network<\/p>\n<p>Storage area network (SAN) \u2013 Large Storage array with high-speed network<\/p>\n<\/p>\n<p>Cloud storage<\/p>\n<p>Some or all of an organization\u2019s data is stored on servers located offsite and maintained by a storage hosting company<\/p>\n<p>Customers can manage storage by assigning permissions for user access<\/p>\n<p>Details of managing and backing up storage on local servers are offloaded to a third party<\/p>\n<\/p>\n<p>Figure 7-1  A storage area network<\/p>\n<\/p>\n<\/div>\n<div>\n<div>\n<p>CompTIA Obj 1.5 Install and configure storage devices and use appropriate media.<\/p>\n<\/p>\n<p>Local storage \u2013 storage media with a direct, exclusive connection to the computer\u2019s system board through a disk controller<\/p>\n<p>Almost always inside the computer\u2019s case<\/p>\n<p>Usually refers to HDDs or SDDs instead of CD\/DVDs   (Hard Disk Drive v Solid State Drive)<\/p>\n<p>Provides rapid and exclusive access <\/p>\n<p> Disadvantage: only the system where it\u2019s installed has direct access to the storage medium<\/p>\n<\/p>\n<p>Direct-attached storage (DAS) \u2013 similar to local storage but can also refer to one or more HDDs in an enclosure with its own power supply<\/p>\n<p> A DAS device with its own enclosure and power supply can usually be configured as a disk array<\/p>\n<p> Such as a RAID configuration<\/p>\n<p> Some DAS have multiple interfaces so that more than one computer can access the storage medium simultaneously<\/p>\n<\/p>\n<p>Network-attached storage (NAS) \u2013 has an enclosure, power supply, slots for multiple HDDs, a network interface, and a built-in OS tailored for managing shared storage<\/p>\n<p> Sometimes referred to as a storage appliance<\/p>\n<p>          NAS is typically dedicated to file sharing<\/p>\n<p> NAS shares files through standard network protocols such as:  Server Message Block(SMB), Network File System (NFS), and File Transfer Protocol (FTP)<\/p>\n<\/p>\n<p>Storage area network (SAN) \u2013 uses high-speed networking technologies to give servers fast access to large amounts of shared disk storage<\/p>\n<p> Most common network technologies used in SANs are Fibre Channel and iSCSI<\/p>\n<p> SANS use the concept of logical unit number (LUN) to identify a unit of storage<\/p>\n<p> LUN is a logical reference point to a unit of storage that could refer to an entire array of disks, a single disk, or just part of a disk<\/p>\n<\/p>\n<p>Cloud Storage:  Examples: Dropbox, Microsoft OneDrive and Google Drive<\/p>\n<\/p>\n<p>9<\/p>\n<\/p>\n<\/div>\n<div>\n<p>Tape Storage \u2013<\/p>\n<p>Often used for Disaster Recovery or Business Continuity Purposes with offsite storage<\/p>\n<p>Tape backup systems are a traditional choice for backing up large amounts of data<\/p>\n<p>With disk drives growing into terabytes, tape drive technology is continuing to evolve in order to keep up<\/p>\n<\/p>\n<div>\n<div>          <\/div>\n<div>\n<div>\n<p>Tapes and Tape Drives<\/p>\n<\/p>\n<p>Use magnetic storage and record data in sequential order<\/p>\n<p>Disadvantage \u2013 to find a file near the end of the tape, drive must first go through all of the data recorded prior to that file<\/p>\n<p>Most popular for long-term storage<\/p>\n<p>With disk drives growing into terabytes, tape drive technology is continuing to evolve in order to keep up<\/p>\n<\/p>\n<p>DAT Drives \u2013 4mm Digital Audio Tape for archival up to 10 years<\/p>\n<p>Uses digital data storage (DDS) format<\/p>\n<p>Current standard is DDS-5 \u2013 storage capacity of 36 GB (72 GB compressed)<\/p>\n<p>Still used for audio recordings, but use for data storage is mostly replaced by other technologies<\/p>\n<\/p>\n<p>DLT Drives \u2013 Half-inch wide Digital Linear Tape<\/p>\n<p>Record data in tracks <\/p>\n<p>Offers a high-speed search capability <\/p>\n<p>Used in many automated tape backup systems<\/p>\n<\/p>\n<p>SDLT Drives \u2013 Super digital linear tape<\/p>\n<p>Use both magnetic and optical recording methods<\/p>\n<p>Laser technology can more accurately write data to the tape and allows for greater density of information<\/p>\n<p> DLT\/SDLT have an archival life of up to 30 years<\/p>\n<\/p>\n<p>AIT Drives \u2013 Advanced intelligent tape (AIT)<\/p>\n<p>Used mainly in midrange servers<\/p>\n<p>Tapes have an erasable memory chip inside the cartridge that stores information normally written at the beginning of the tape<\/p>\n<p>Can fast forward and pinpoint information faster<\/p>\n<p> S-AIT Drives \u2013 Super advanced intelligent tape Has a capacity of 500 GB\/1.3 TB (native\/compressed)<\/p>\n<p> Both of these drives can sustain up to 30,000 tape passes and have an archival life of 30 years<\/p>\n<\/p>\n<p>LTO Drives \u2013 Linear tape open<\/p>\n<p>Most widely accepted in high-end servers (because of high-speed performance)<\/p>\n<p>Standards are open to the public and are nonproprietary<\/p>\n<p>Fast data transfer speed up to 240 MBps  (noncompressed data) and 120 MBps (compressed data)<\/p>\n<p>Can sustain up to 260 tape passes and have an archival life of 15-30 years<\/p>\n<\/p>\n<p>10<\/p>\n<\/p>\n<\/div>\n<div>\n<p>Ch 8 Virtualization &#038; Cloud Computing<\/p>\n<p>Virtualization \u2013  Process that creates a software environment to emulate a computer\u2019s hardware and BIOS, allowing multiple OSs to run on the same physical computer at the same time<\/p>\n<p>Common Terms:<\/p>\n<p>Virtual Machine (VM) \u2013 virtual environment that emulates a physical computer<\/p>\n<p>Virtual Disk \u2013 consists of files on host computer that represents VM hard drvie<\/p>\n<\/p>\n<p>HyperVisor \u2013 software that enables multiple VMs to share physical hardware resource:<\/p>\n<p>Type 1 -Bare-metal virtualization products are targeted mainly for production virtualization in data centers using products such as Citrix XenServer or VMware vSphere.<\/p>\n<p>Type 2 -Hosted virtualization products are installed on a desktop OS and include VMware Workstation, Virtual PC, and VirtualBox<\/p>\n<\/p>\n<div>          <\/div>\n<div>\n<div>\n<p>CompTIA Objective 2.2 \u2013 Given a scenario, setup and use client-side virtualization <\/p>\n<\/p>\n<p>Hosted Virtualization<\/p>\n<\/p>\n<p>Has an advantage of supporting a wider variety of guest OSs because there are few incompatibility problems between the guest OS and hardware<\/p>\n<p>Easy and straightforward to use<\/p>\n<p>Just install the software on your computer and begin creating virtual machines<\/p>\n<p>Only hardware requirement is enough memory to support the host and guest OSs, adequate CPU power, and enough space to store the virtual disk <\/p>\n<p>Well known hosted virtualization products:<\/p>\n<p>VMware Workstation Pro<\/p>\n<p>VMware Workstation Player<\/p>\n<p>Microsoft Virtual PC<\/p>\n<p>VirtualBox<\/p>\n<\/p>\n<p>Bare-Metal Virtualization Applications<\/p>\n<p>Consolidate servers<\/p>\n<p>Retire old or unreliable hardware: converting physical machines to VMs<\/p>\n<p>Make optimal use of multicore, high-performance servers<\/p>\n<p>Maintain application separation<\/p>\n<p>Reclaim rack or floor space<\/p>\n<p>Reduce cooling and power requirements<\/p>\n<\/p>\n<p>Bare-Metal Virtualization Products<\/p>\n<p>Citrix XenServer \u2013 Uses Linux as a management OS on the host<\/p>\n<p>A XenServer host computer requires a 64-bit CPU with virtualization extensions to run Windows guest OSs<\/p>\n<p>VMware vSphere \u2013 includes VMware ESX Server, which is installed directly on the physical server without a management OS<\/p>\n<p>Most configuration tasks are performed from a remote client OS using vSphere Client<\/p>\n<\/p>\n<p>Cloud Computing<\/p>\n<p>Benefits:<\/p>\n<p>Reduced physical plant costs<\/p>\n<p>Reduced upfront costs<\/p>\n<p>Reduced personnel costs<\/p>\n<\/p>\n<p>Three main categories of cloud computing: <\/p>\n<p>SaaS \u2013 also called \u201chosted applications\u201d or \u201con-demand applications\u201d<\/p>\n<p> Most well-known example is Google Apps and Microsoft Office 365<\/p>\n<p> Usually offered as a subscription based on the number of users<\/p>\n<p> Customers can take advantage of new software editions much faster<\/p>\n<p> Available anywhere the customer has a connection to the Internet<\/p>\n<\/p>\n<p>PaaS \u2013 also called \u201chosted platform\u201d and is similar to SaaS, but customer develops applications with the service provider\u2019s tool and infrastructure<\/p>\n<p>Customer develops and owns the application and then delivers it to a third party<\/p>\n<p>The most common PaaS products are:<\/p>\n<p>Salesforce.com\u2019s Apex<\/p>\n<p>Azure for Windows<\/p>\n<p>Google\u2019s AppEngine for Python and Java<\/p>\n<p>WaveMaker for Ajax<\/p>\n<p>Engine Yard for Ruby on Rails<\/p>\n<\/p>\n<p>IaaS \u2013 also called \u201chosted infrastructure\u201d, it allows a company to use storage or entire virtual servers<\/p>\n<p> If a customer needs another 100 GB of storage space they can pay for the space without worrying about how that space is actually provided<\/p>\n<p> If a customer needs another server they pay for the amount of processing and storage the additional server actually requires <\/p>\n<p> Customers rent the resources they are using<\/p>\n<\/p>\n<p>Private Cloud Versus Public Cloud<\/p>\n<\/p>\n<p>Private cloud services <\/p>\n<p>When a company delivers cloud services to their own employees through the use of virtualization technologies<\/p>\n<p>Deployed from the company\u2019s own data center<\/p>\n<p>Examples of virtualization technologies:<\/p>\n<p>VMware and Microsoft Hyper-V<\/p>\n<p>Public cloud services<\/p>\n<p>Cloud services delivered by a third-party provider<\/p>\n<\/p>\n<p>11<\/p>\n<\/p>\n<\/div>\n<div>\n<p>Ch 8 Virtualization &#038; Cloud Computing<\/p>\n<p>Cloud computing is a computing model in which data, applications, and processing power are managed by servers on the Internet<\/p>\n<p>Benefit:  Lower physical plant costs, upfront deployment costs and ongoing personnel costs<\/p>\n<\/p>\n<p>Three main categories of cloud computing: <\/p>\n<p>Software as a Service (SaaS) \u2013 hosted or on-demand applications<\/p>\n<p>Platform as a Service (PaaS) \u2013 hosted platform allows development on provider\u2019s tools\/resources<\/p>\n<p>Infrastructure as a Service (IaaS) \u2013 hosted infrastructure (storage, desktops, etc)<\/p>\n<\/p>\n<p>Private v Public Cloud<\/p>\n<p>Private:  Cloud services internal to a company through use of virtualization technologies that is NOT available to public domains.<\/p>\n<p>Public:  Cloud service provided by a third-party vendor and readily accessed via Internet connectivity.<\/p>\n<\/p><\/div>\n<div>\n<div>\n<p>COMPTIA Objective 2.3 \u2013 Identify basic Cloud Concepts<\/p>\n<\/p>\n<p>Cloud Computing<\/p>\n<p>Benefits:<\/p>\n<p>Reduced physical plant costs<\/p>\n<p>Reduced upfront costs<\/p>\n<p>Reduced personnel costs<\/p>\n<\/p>\n<p>Three main categories of cloud computing: <\/p>\n<p>SaaS \u2013 also called \u201chosted applications\u201d or \u201con-demand applications\u201d<\/p>\n<p> Most well-known example is Google Apps and Microsoft Office 365<\/p>\n<p> Usually offered as a subscription based on the number of users<\/p>\n<p> Customers can take advantage of new software editions much faster<\/p>\n<p> Available anywhere the customer has a connection to the Internet<\/p>\n<\/p>\n<p>PaaS \u2013 also called \u201chosted platform\u201d and is similar to SaaS, but customer develops applications with the service provider\u2019s tool and infrastructure<\/p>\n<p>Customer develops and owns the application and then delivers it to a third party<\/p>\n<p>The most common PaaS products are:<\/p>\n<p>Salesforce.com\u2019s Apex<\/p>\n<p>Azure for Windows<\/p>\n<p>Google\u2019s AppEngine for Python and Java<\/p>\n<p>WaveMaker for Ajax<\/p>\n<p>Engine Yard for Ruby on Rails<\/p>\n<\/p>\n<p>IaaS \u2013 also called \u201chosted infrastructure\u201d, it allows a company to use storage or entire virtual servers<\/p>\n<p> If a customer needs another 100 GB of storage space they can pay for the space without worrying about how that space is actually provided<\/p>\n<p> If a customer needs another server they pay for the amount of processing and storage the additional server actually requires <\/p>\n<p> Customers rent the resources they are using<\/p>\n<\/p>\n<p>Private Cloud Versus Public Cloud<\/p>\n<\/p>\n<p>Private cloud services <\/p>\n<p>When a company delivers cloud services to their own employees through the use of virtualization technologies<\/p>\n<p>Deployed from the company\u2019s own data center<\/p>\n<p>Examples of virtualization technologies:<\/p>\n<p>VMware and Microsoft Hyper-V<\/p>\n<p>Public cloud services<\/p>\n<p>Cloud services delivered by a third-party provider<\/p>\n<\/p>\n<p>12<\/p>\n<\/p>\n<\/div>\n<div>\n<p>Week 2:  Summary<\/p>\n<p>Review of Objectives:<\/p>\n<p>Configuring operating Systems &#038; Hardware<\/p>\n<p>Process Management<\/p>\n<p>Hardware I\/O Options <\/p>\n<p>Storage Technologies<\/p>\n<p>Virtualization and Cloud Overview<\/p>\n<\/p>\n<p>Reading:  Chapter 5-8, Lecture &#038; PowerPoint Slides<\/p>\n<p>Ch5:  193-204, 228-231<\/p>\n<p>Ch6:  243-264<\/p>\n<p>Ch7:  275-303<\/p>\n<p>Ch8:  315-320, 326-330, 340-349<\/p>\n<\/p>\n<p>Instructor Contact:  Phil Thacker, [email\u00a0protected] or 310.892.3594<\/p>\n<\/p>\n<div>          <\/div>\n<div>\n<div>\n<p>13<\/p>\n<\/p>\n<\/div>\n<div>\n<h2>image1.jpeg<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image2.jpg<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image3.jpg<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image4.png<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image5.jpeg<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image6.jpeg<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image7.png<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image8.png<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image9.png<\/h2>\n<\/p>\n<\/div>\n<div>        <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>1. \u00a0Browse through the chapters 5-8 Reading. 2. \u00a0Summarize the most interesting fact your learned from each Chapter Section. \u00a0Note: \u00a0you should have all 4 facts\/application bullets for full credit on your initial post.\u00a0 CSY125Week2Lecture2022.pptx Operating Systems Week 2 Lecture CSY125 Valley College Phil Thacker [email\u00a0protected] 310.892.3594 1 Week 2 Learning Objectives Installing Operating Systems &#8230; <a title=\"Browse through the chapters 5-8 Reading. Summarize the most interesting\" class=\"read-more\" href=\"https:\/\/academicwritersbay.com\/writings\/browse-through-the-chapters-5-8-reading-summarize-the-most-interesting\/\" aria-label=\"Read more about Browse through the chapters 5-8 Reading. Summarize the most interesting\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-24391","post","type-post","status-publish","format-standard","hentry","category-essaywr"],"_links":{"self":[{"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/posts\/24391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/comments?post=24391"}],"version-history":[{"count":0,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/posts\/24391\/revisions"}],"wp:attachment":[{"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/media?parent=24391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/categories?post=24391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/tags?post=24391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}