
{"id":166,"date":"2007-05-01T22:59:23","date_gmt":"2007-05-02T01:59:23","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=166"},"modified":"2007-05-01T22:59:23","modified_gmt":"2007-05-02T01:59:23","slug":"un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/","title":{"rendered":"Un caso pr\u00c3\u00a1ctico de virtualizaci\u00c3\u00b3n de un entorno real de producci\u00c3\u00b3n"},"content":{"rendered":"<p>A ra\u00c3\u00adz de un post anterior en este blog, el amigo J.L. Medina <a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2007\/03\/16\/recuperacion-ante-desastres-con-vmware-infraestructure-3\/#comment-37322\">nos ha invitado<\/a> a visitar <a href=\"http:\/\/bevirtual.blogspot.com\/2007\/01\/caso-prctico-virtualizacin-de-entorno.html\">un excelente art\u00c3\u00adculo<\/a> que ha publicado en su blog dedicado a la virtualizaci\u00c3\u00b3n, al que la llamado <a href=\"http:\/\/bevirtual.blogspot.com\/\">Be Virtual, My Firend<\/a>.<\/p>\n<p>En este blog, J.L. habla de infraestructuras virtualizadas, principalmente con VMware, lo cual no me extra\u00c3\u00b1a, pero sin excluir otros posibles productos, que haberlos los hay, y muy buenos adem\u00c3\u00a1s.<\/p>\n<p>En el art\u00c3\u00adculo <a href=\"http:\/\/bevirtual.blogspot.com\/2007\/01\/caso-prctico-virtualizacin-de-entorno.html\">Caso Pr\u00c3\u00a1ctico: Virtualizaci\u00c3\u00b3n de entorno de Producci\u00c3\u00b3n &#8211; Infraestructura Virtual<\/a>, podemos encontrar un extenso desarrollo sobre los principios para virtualizar un entorno de producci\u00c3\u00b3n. Es un caso real, donde se ha virtualizado un total de 31 servidores. Servidores f\u00c3\u00adsicos, memoria, sus limitaciones, procesadores, conectividad de red, almacenamiento, backup y recuperaci\u00c3\u00b3n \u00e2\u20ac\u00a6 un art\u00c3\u00adculo complet\u00c3\u00adsimo y muy revelador que sin duda har\u00c3\u00a1 las delicias de los amigos de lo virtual <img decoding=\"async\" class=\"wp-smiley\" alt=\":)\" src=\"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_smile.gif\" \/><\/p>\n<p>Despu\u00c3\u00a9s de leer este tipo de art\u00c3\u00adculos, uno se sigue preguntando c\u00c3\u00b3mo es posible que la gente siga invirtiendo en hardware y rellenando armarios rack de un modo innecesario.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.sahw.com\/wp\/\">http:\/\/www.sahw.com\/wp\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A ra\u00c3\u00adz de un post anterior en este blog, el amigo J.L. Medina nos ha invitado a visitar un excelente art\u00c3\u00adculo que ha publicado en su blog dedicado a la virtualizaci\u00c3\u00b3n, al que la llamado Be Virtual, My Firend. En este blog, J.L. habla de infraestructuras virtualizadas, principalmente con VMware, lo cual no me extra\u00c3\u00b1a, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3,1],"tags":[],"class_list":["post-166","post","type-post","status-publish","format-standard","hentry","category-articulos","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Un caso pr\u00c3\u00a1ctico de virtualizaci\u00c3\u00b3n de un entorno real de producci\u00c3\u00b3n<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Un caso pr\u00c3\u00a1ctico de virtualizaci\u00c3\u00b3n de un entorno real de producci\u00c3\u00b3n\",\"datePublished\":\"2007-05-02T01:59:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/\"},\"wordCount\":207,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_smile.gif\",\"articleSection\":[\"Art\u00c3\u00adculos\",\"Profesional\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Un caso pr\u00c3\u00a1ctico de virtualizaci\u00c3\u00b3n de un entorno real de producci\u00c3\u00b3n\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_smile.gif\",\"datePublished\":\"2007-05-02T01:59:23+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#primaryimage\",\"url\":\"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_smile.gif\",\"contentUrl\":\"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_smile.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Un caso pr\u00c3\u00a1ctico de virtualizaci\u00c3\u00b3n de un entorno real de producci\u00c3\u00b3n","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Un caso pr\u00c3\u00a1ctico de virtualizaci\u00c3\u00b3n de un entorno real de producci\u00c3\u00b3n","datePublished":"2007-05-02T01:59:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/"},"wordCount":207,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#primaryimage"},"thumbnailUrl":"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_smile.gif","articleSection":["Art\u00c3\u00adculos","Profesional"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/","url":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Un caso pr\u00c3\u00a1ctico de virtualizaci\u00c3\u00b3n de un entorno real de producci\u00c3\u00b3n","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#primaryimage"},"thumbnailUrl":"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_smile.gif","datePublished":"2007-05-02T01:59:23+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/un-caso-practico-de-virtualizacion-de-un-entorno-real-de-produccion\/#primaryimage","url":"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_smile.gif","contentUrl":"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_smile.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=166"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/166\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}