25:
164:
in particular). This is possible because unlike other hard drive images (which may contain any data, et al.), pure boot images contain no mission-critical data. By definition a pure boot image contains no data that cannot be reproduced from configurations or off-the-shelf executables. In particular
242:
Upgrading new machine specifications at low additional cost ensures that they will remain useful long past their normal life. Extending the life of desktop machines will reduce the incursion of off-spec machines later in the life-cycle, improving standardization, reducing support costs, minimizing
148:
usually includes the operating system, utilities and diagnostics, as well as boot and data recovery information. It also includes those "applications" used organization-wide. A specialized image for a particular type of user or department is called typically a
153:. Building such an image can take days or weeks, and involve complex decisions about licensing and permissions - including which passwords to store in the boot image and which to require users to type in - and requires experts in
176:
keep a backup copy of the boot image, for quick re-imaging (often called re-installation) in the event of a problem, thus avoiding the need to diagnose a specific problem with a specific machine.
208:
for instance lets users "convert physical machines to virtual machines - for free" as part of that company's suite of products to make images easier to back up and manage. Equivalents exist for
196:
to install identical copies of an operating system on many identical machines: The boot image is created as a virtual machine and then exported, or created on one disk and then copied via a
313:
A cascading strategy involves re-imaging older, off-spec machines to thin client boot images so that they may continue in use for some less demanding or more access-controlled applications.
165:
end-user data is not part of a boot image, although some operating systems require that a copy of user preferences or configuration files be kept within the boot image itself, e.g.
280:. In a large organization with many compatible machines, rapid recovery by replacing with a backup boot image may only take a few minutes, with considerable cost savings.
290:
with a single boot image in a manner that is ubiquitous and cost effective, meeting the needs of all staff regardless of disability, with available technology services.
273:
229:
391:
310:
Many organizations use thin clients for applications which require high security, involve unreliable users or repurpose older machines for continued use.
160:
However, once built, the boot image can be simply copied onto devices, patched within reasonable limits, and remains disposable in case of any problems (
235:
One goal of boot image control is to minimize the number of boot images used by an organization to reduce support costs. It includes at least:
283:
Data backup and recovery procedures ensure data is stored in the right place so that it can be recovered promptly in crisis situations.
220:
By keeping the boot image entirely separate and disposable, and mandating boot image control, organizations seek to keep their
276:
tools and procedures for failed desktop units. These would use backup copies of a boot image created with utilities such as
250:
Organizing the network so that boot images can be efficiently supported, independent of data. Data must not be dependent on
89:
239:
Specifying the machine hardware to minimize unneeded machine diversity and minimize the resultant number of boot images.
61:
108:
270:
and help desk functions employ standardized tests to identify the source of problems: boot, software, or hardware.
68:
46:
75:
386:
42:
57:
287:
221:
205:
225:
150:
35:
130:
261:
on each new machine confirms that it is fit for use in a standardized boot image environment.
299:
Facilitating worker transfer by changing boots or authorizations instead of moving machines.
432:
154:
264:
Boot image installation to ensure that only supportable standardized boot images are used.
192:
for direct installation to "bare metal", i.e. a disk. This is the standard technique for
8:
82:
258:
197:
166:
427:
244:
169:
330:
402:
267:
201:
185:
161:
421:
352:
381:
277:
173:
397:
353:"VMware vCenter Converter, Convert Physical Machines to Virtual Machines"
303:
293:
251:
134:
376:
126:
129:(a computer file containing the complete contents and structure of a
306:
for off-spec machines to eliminate the need for special boot images.
24:
138:
412:
407:
209:
193:
392:
Protected Area Run Time
Interface Extension Services
49:. Unsourced material may be challenged and removed.
228:component) low. Often such organizations look at
419:
188:infrastructure can directly import and export a
254:. Use networks to store data on secure servers.
296:and secure off-site system access procedures.
109:Learn how and when to remove this message
420:
179:
137:it allows the associated hardware to
47:adding citations to reliable sources
18:
13:
14:
444:
133:). When it is transferred onto a
23:
200:infrastructure that also makes
34:needs additional citations for
345:
323:
1:
316:
7:
387:El Torito (CD-ROM standard)
370:
10:
449:
288:services for the disabled
222:total cost of operations
215:
206:VMware vCenter Converter
274:Desktop system recovery
226:total cost of ownership
151:departmental boot image
212:and other VM systems.
155:software integration
43:improve this article
230:uptime as a service
331:"Bootable CD/ DVD"
259:acceptance testing
198:boot image control
180:As virtual machine
172:. Utilities like
16:Type of disk image
167:Microsoft Windows
119:
118:
111:
93:
440:
364:
363:
361:
360:
349:
343:
342:
340:
338:
327:
114:
107:
103:
100:
94:
92:
51:
27:
19:
448:
447:
443:
442:
441:
439:
438:
437:
418:
417:
373:
368:
367:
358:
356:
351:
350:
346:
336:
334:
329:
328:
324:
319:
268:Troubleshooting
224:(including its
218:
202:virtual machine
186:virtual machine
182:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
446:
436:
435:
430:
416:
415:
410:
405:
400:
395:
389:
384:
379:
372:
369:
366:
365:
344:
321:
320:
318:
315:
308:
307:
300:
297:
291:
284:
281:
271:
265:
262:
255:
248:
240:
217:
214:
181:
178:
131:storage medium
117:
116:
31:
29:
22:
15:
9:
6:
4:
3:
2:
445:
434:
431:
429:
426:
425:
423:
414:
411:
409:
406:
404:
401:
399:
396:
393:
390:
388:
385:
383:
380:
378:
375:
374:
354:
348:
332:
326:
322:
314:
311:
305:
301:
298:
295:
292:
289:
285:
282:
279:
275:
272:
269:
266:
263:
260:
256:
253:
249:
246:
241:
238:
237:
236:
233:
231:
227:
223:
213:
211:
207:
204:copies. The
203:
199:
195:
191:
187:
177:
175:
171:
168:
163:
158:
156:
152:
147:
142:
140:
136:
132:
128:
125:is a type of
124:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
382:Disk cloning
357:. Retrieved
355:. Vmware.com
347:
335:. Retrieved
325:
312:
309:
304:thin clients
278:Norton Ghost
252:boot devices
234:
219:
189:
183:
174:Norton Ghost
159:
145:
143:
122:
120:
105:
96:
86:
79:
72:
65:
58:"Boot image"
53:
41:Please help
36:verification
33:
433:Disk images
398:Floppy Disk
333:. Isobuster
294:Remote work
286:Installing
135:boot device
422:Categories
403:Hard Drive
377:Disk image
359:2012-08-05
317:References
190:boot image
146:boot image
127:disk image
123:boot image
69:newspapers
394:(PARTIES)
257:Hardware
99:July 2011
371:See also
170:registry
428:Booting
337:20 June
245:e-waste
162:viruses
157:to do.
83:scholar
413:Bootup
302:Using
85:
78:
71:
64:
56:
216:Goals
184:Some
90:JSTOR
76:books
339:2012
194:OEMs
144:The
139:boot
62:news
408:SSD
210:Xen
141:.
45:by
424::
232:.
121:A
362:.
341:.
247:.
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.