Knowledge

Boot image

Source 📝

25: 164:
in particular). This is possible because unlike other hard drive images (which may contain any data, et al.), pure boot images contain no mission-critical data. By definition a pure boot image contains no data that cannot be reproduced from configurations or off-the-shelf executables. In particular
242:
Upgrading new machine specifications at low additional cost ensures that they will remain useful long past their normal life. Extending the life of desktop machines will reduce the incursion of off-spec machines later in the life-cycle, improving standardization, reducing support costs, minimizing
148:
usually includes the operating system, utilities and diagnostics, as well as boot and data recovery information. It also includes those "applications" used organization-wide. A specialized image for a particular type of user or department is called typically a
153:. Building such an image can take days or weeks, and involve complex decisions about licensing and permissions - including which passwords to store in the boot image and which to require users to type in - and requires experts in 176:
keep a backup copy of the boot image, for quick re-imaging (often called re-installation) in the event of a problem, thus avoiding the need to diagnose a specific problem with a specific machine.
208:
for instance lets users "convert physical machines to virtual machines - for free" as part of that company's suite of products to make images easier to back up and manage. Equivalents exist for
196:
to install identical copies of an operating system on many identical machines: The boot image is created as a virtual machine and then exported, or created on one disk and then copied via a
313:
A cascading strategy involves re-imaging older, off-spec machines to thin client boot images so that they may continue in use for some less demanding or more access-controlled applications.
165:
end-user data is not part of a boot image, although some operating systems require that a copy of user preferences or configuration files be kept within the boot image itself, e.g.
280:. In a large organization with many compatible machines, rapid recovery by replacing with a backup boot image may only take a few minutes, with considerable cost savings. 290:
with a single boot image in a manner that is ubiquitous and cost effective, meeting the needs of all staff regardless of disability, with available technology services.
273: 229: 391: 310:
Many organizations use thin clients for applications which require high security, involve unreliable users or repurpose older machines for continued use.
160:
However, once built, the boot image can be simply copied onto devices, patched within reasonable limits, and remains disposable in case of any problems (
235:
One goal of boot image control is to minimize the number of boot images used by an organization to reduce support costs. It includes at least:
283:
Data backup and recovery procedures ensure data is stored in the right place so that it can be recovered promptly in crisis situations.
220:
By keeping the boot image entirely separate and disposable, and mandating boot image control, organizations seek to keep their
276:
tools and procedures for failed desktop units. These would use backup copies of a boot image created with utilities such as
250:
Organizing the network so that boot images can be efficiently supported, independent of data. Data must not be dependent on
89: 239:
Specifying the machine hardware to minimize unneeded machine diversity and minimize the resultant number of boot images.
61: 108: 270:
and help desk functions employ standardized tests to identify the source of problems: boot, software, or hardware.
68: 46: 75: 386: 42: 57: 287: 221: 205: 225: 150: 35: 130: 261:
on each new machine confirms that it is fit for use in a standardized boot image environment.
299:
Facilitating worker transfer by changing boots or authorizations instead of moving machines.
432: 154: 264:
Boot image installation to ensure that only supportable standardized boot images are used.
192:
for direct installation to "bare metal", i.e. a disk. This is the standard technique for
8: 82: 258: 197: 166: 427: 244: 169: 330: 402: 267: 201: 185: 161: 421: 352: 381: 277: 173: 397: 353:"VMware vCenter Converter, Convert Physical Machines to Virtual Machines" 303: 293: 251: 134: 376: 126: 129:(a computer file containing the complete contents and structure of a 306:
for off-spec machines to eliminate the need for special boot images.
24: 138: 412: 407: 209: 193: 392:
Protected Area Run Time Interface Extension Services
49:. Unsourced material may be challenged and removed. 228:component) low. Often such organizations look at 419: 188:infrastructure can directly import and export a 254:. Use networks to store data on secure servers. 296:and secure off-site system access procedures. 109:Learn how and when to remove this message 420: 179: 137:it allows the associated hardware to 47:adding citations to reliable sources 18: 13: 14: 444: 133:). When it is transferred onto a 23: 200:infrastructure that also makes 34:needs additional citations for 345: 323: 1: 316: 7: 387:El Torito (CD-ROM standard) 370: 10: 449: 288:services for the disabled 222:total cost of operations 215: 206:VMware vCenter Converter 274:Desktop system recovery 226:total cost of ownership 151:departmental boot image 212:and other VM systems. 155:software integration 43:improve this article 230:uptime as a service 331:"Bootable CD/ DVD" 259:acceptance testing 198:boot image control 180:As virtual machine 172:. Utilities like 16:Type of disk image 167:Microsoft Windows 119: 118: 111: 93: 440: 364: 363: 361: 360: 349: 343: 342: 340: 338: 327: 114: 107: 103: 100: 94: 92: 51: 27: 19: 448: 447: 443: 442: 441: 439: 438: 437: 418: 417: 373: 368: 367: 358: 356: 351: 350: 346: 336: 334: 329: 328: 324: 319: 268:Troubleshooting 224:(including its 218: 202:virtual machine 186:virtual machine 182: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 446: 436: 435: 430: 416: 415: 410: 405: 400: 395: 389: 384: 379: 372: 369: 366: 365: 344: 321: 320: 318: 315: 308: 307: 300: 297: 291: 284: 281: 271: 265: 262: 255: 248: 240: 217: 214: 181: 178: 131:storage medium 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 445: 434: 431: 429: 426: 425: 423: 414: 411: 409: 406: 404: 401: 399: 396: 393: 390: 388: 385: 383: 380: 378: 375: 374: 354: 348: 332: 326: 322: 314: 311: 305: 301: 298: 295: 292: 289: 285: 282: 279: 275: 272: 269: 266: 263: 260: 256: 253: 249: 246: 241: 238: 237: 236: 233: 231: 227: 223: 213: 211: 207: 204:copies. The 203: 199: 195: 191: 187: 177: 175: 171: 168: 163: 158: 156: 152: 147: 142: 140: 136: 132: 128: 125:is a type of 124: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 382:Disk cloning 357:. Retrieved 355:. Vmware.com 347: 335:. Retrieved 325: 312: 309: 304:thin clients 278:Norton Ghost 252:boot devices 234: 219: 189: 183: 174:Norton Ghost 159: 145: 143: 122: 120: 105: 96: 86: 79: 72: 65: 58:"Boot image" 53: 41:Please help 36:verification 33: 433:Disk images 398:Floppy Disk 333:. Isobuster 294:Remote work 286:Installing 135:boot device 422:Categories 403:Hard Drive 377:Disk image 359:2012-08-05 317:References 190:boot image 146:boot image 127:disk image 123:boot image 69:newspapers 394:(PARTIES) 257:Hardware 99:July 2011 371:See also 170:registry 428:Booting 337:20 June 245:e-waste 162:viruses 157:to do. 83:scholar 413:Bootup 302:Using 85:  78:  71:  64:  56:  216:Goals 184:Some 90:JSTOR 76:books 339:2012 194:OEMs 144:The 139:boot 62:news 408:SSD 210:Xen 141:. 45:by 424:: 232:. 121:A 362:. 341:. 247:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Boot image"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
disk image
storage medium
boot device
boot
departmental boot image
software integration
viruses
Microsoft Windows
registry
Norton Ghost
virtual machine
OEMs
boot image control
virtual machine
VMware vCenter Converter
Xen
total cost of operations
total cost of ownership
uptime as a service

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.