云消费者需要识别的资产就是他们能够控制的资产:操作系统、网络设备以及在虚拟机级部署的应用程序。
The assets the cloud consumer needs to identify are those he can control: the operating systems, network equipment, and deployed applications at the virtual machine level.
克隆虚拟映像的挑战之一是,需要处理操作系统、网络和应用程序特定的自定义内容。
One of the challenges with cloning virtual images is handling operating system, network, and application specific customization.
使用IaaS,您可以在虚拟机级别控制操作系统、网络设备和已部署应用程序。
With IaaS you can control the operating systems, network equipment, and deployed applications at the virtual machine level.
为所有的网络设备,存储,服务器,虚拟化管理器,操作系统和其包含的基础设施服务做一个清单。
Make an inventory of all the networking equipment, storage, servers, hypervisors, operating systems and infrastructure services that it contains.
IaaS基础架构和网络专家:专家控制虚拟机级上的操作系统、网络设备和部署的应用程序。
IaaS infrastructure and network specialist: the specialist controls the operating systems, network equipment, and deployed applications at the virtual machine level.
除了Linux之外,本文还讨论了其他操作系统虚拟化(Windows、Solaris)和其他虚拟化方法(比如网络堆栈虚拟化)。
In addition to Linux, this article also covers other operating system virtualization (Windows, Solaris) and other means of virtualization (such as network stack virtualization).
一个IaaS的基础架构师和网络专家可以控制操作系统、网络设备,以及在虚拟机级别部署的应用程序。
An IaaS infrastructure and network specialist controls the OSs, network equipment, and deployed applications at the virtual machine level.
该模型通过被动IP地址伪装、被动操作系统伪装和被动网络拓扑结构伪装,建立一个由虚拟网和真实网交错的复杂仿真网;
The model establish the complex simulation network through the passive IP address camouflage, the passive operating system camouflage and the passive network topology camouflage base on camouflage.
该模型通过被动IP地址伪装、被动操作系统伪装和被动网络拓扑结构伪装,建立一个由虚拟网和真实网交错的复杂仿真网;
The model establish the complex simulation network through the passive IP address camouflage, the passive operating system camouflage and the passive network topology camouflage base on camouflage.
应用推荐