Sunday, May 17, 2020

Cell Phones And Their Effects On Children - 879 Words

They have come in and taken over our society, they have taken children away from their parents and turned them into drones. These horrible devices are cell phones. The worst part though is when children lose these devices we expect they perhaps will do something healthy or active, but honestly they merely devote themselves to reuniting with their phones. Teenagers won’t sleep until they have it back their hands. I would understand after all, I am one of those teenagers consumed by my phone. Once, I misplaced it, and spent the next two hours of my life focused solely on locating my phone, that is how precious it is to me. It started one afternoon when I was riding my bike with my friends and I had just popped a fresh piece of gum in my mouth. As the fresh mint swirled around in my mouth, I recalled that my mom needed me home by 4:30 pm, so I reached in my pocket to check the time on my phone. I feel around, but nothing is there except for some ancient pocket lint. I slamme d on my breaks and immediately assumed the worse. I lost it in a gutter somewhere, so I retraced my steps to the nearest opening in the gutter. As I bent down to peer into the storm sewer it smelled like someone had thrown up on a dead squirrel. No phone in the gutter, so before long I assumed that one of my friends had stolen it from me. I began yelling and acting like it wasn’t a playful joke anymore, but none of them had it. I biked home like Speedy Gonzalez, and sprinted to my room, tearingShow MoreRelatedThe Effects Of Cell Phones On Children1314 Words   |  6 PagesIn this day of age it is common place to hear of children as young as 6 having cell phones. But what if that were to be changed, what if a minimum age requirement was to be placed on the use of cell phones. There are age requirement placed on many things already such as being able to sit in the front seat of the car, smoking, and drinking. These age requirement are placed on these because of safety reaso n and because people under the age many not be mature enough to handle them. With all of theseRead MoreCell Phones And Its Effect On Children Essay983 Words   |  4 PagesTeenagers are constantly on their cell phone, which leads to extreme overuse of it. In an acknowledgeable book, Ling (2004) described how teenagers use cell phones and the direct effects of having one. Adolescence is a period in someone’s life in which they develop their own identity and self-esteem. So, teenagers are at a very influential time in their life and cell phones take advantage of that. When a teen decides to use a cell phone, they are not acting with their own ideas, but rather the cultureRead MoreThe Effects Of Cell Phones On Children2986 Words   |  12 PagesGive a Child a Cell Phone: The Negative Effects a Cellular Device Has on Children A study conducted in 2004 found that around 45% of the children in the U.S possessed a cell phone and in 2010 those numbers rose to include 75% of the population (Hofferth and Moon 108). As of today, according to Fox 28 News, around 96% of children now don a cell phone, practically doubling the amount of child cell phone users in the year of 2004. With this increased amount of cell phones among children, one must wonderRead MoreThe Effects Of Cell Phones On Children s Declining Interpersonal Skills Essay889 Words   |  4 PagesAnother negative effect caused by cell phones is people’s declining interpersonal skills. In Is Social Media Destroying Teen’s Interpersonal Skills? Experts Say It May, Sekinah Brodie pointed out that though the widespread of cell phones increases the quantity of interpersonal communication, the increase is at the sacrifice of quality. As it is widely acknowledged, interpersonal communication plays a vital role throughout one’s life, bot h in relationships and career, consisting of written, verbalRead MoreHow Cell Phones Can Harm Children921 Words   |  4 PagesHow Cell Phones Can Harm Children As of 2013, cell phones rank number one for causes of car accidents, yet it seems almost impossible to go anywhere without seeing a cell phone in a person’s hand or attached to their ear (â€Å"Two-thirds of Adults Use a Cell Phone†). In the past thirty years, cell phones have started to pop up everywhere and have increased tremendously in popularity since. Worldwide, almost five million cell phones are in use today (â€Å"Cell Phone Use Linked†). Many parents understandRead MoreCell Phones Effect Our Lives977 Words   |  4 PagesHow Cell Phones Effect our Everyday Lives Once upon a time, cell phones did not exist. If you wanted to make a call you had to use a home phone or a pay phone, but cell phones are now common place in our everyday lives. Almost everyone has one, even children in elementary school have cell phones. So how does having such easy access to a cell phone effect our everyday lives? The positive effects of cell phones are easy to see, as cell phones can be convenient and used as a life line in an emergencyRead MoreEffects Of Cell Phones1159 Words   |  5 PagesAre Cell Phones Destroying a Generation? The onset of cell phones has had a great impact in the modern society, and especially the millennials or the teens, and as such it has led to the destruction of a generation. It is apparent that what researchers call the iGen, people born between the year 1995 and the year 2012, depend greatly on their cell phones and their well-being majorly depends on their cell phones (Twenge 188). Researchers also prove that the iGen value their cell phones more thatRead MoreAre Cell Phones Truly Safe? Essay1154 Words   |  5 PagesIn today’s society, the most popular electronic device is cell phones. From the 1940’s to 2011, cell phones have come a long way, from its capability to help individuals to keep in touch with friends and loved ones from near and far. Now and days we use them to text, im (instant message) a person, browse the internet, take pictures, email, and even transfer data. It’s amazing how far we have gotten with a device as such, fulfilling majority o f our everyday needs. But can it also be putting user’sRead MoreMobile Phone and Cell Phones History772 Words   |  4 PagesA. Attention Getter:   Cell phones are very useful and handy but can also be very dangerous. It can Distract you from your studies, distance you from loved ones and/or endanger themselves. B. Reason to listen:   tonight I’m going to tell you the reason people are on their cell phones so much. D. Credibility Statement: 1. Cell phones are intriguing to me because I myself am very distracted from them. 2. I have done much research on this topic.    E. Preview of Main Points: 1. First, I willRead MoreAffordable Mobile Phones816 Words   |  4 PagesAdvantages of Mobile Phones While advantages of mobile phones are self evident, their disadvantages also need to be given some thought. Here is some information about cell phone usage merits and demerits. There are various advantages of mobile phones. The growth of cell phone usage has increased drastically since the last decade, and it is estimated that mobile phones will cross 5 billion in 2010. With their number increasing at a tremendous rate and with the threat of cell phone addiction , there

Wednesday, May 6, 2020

Enron The Smartest Guy Essay - 799 Words

There are some things money can’t buy, and integrity is one of them. Unfortunately, too many firms and corporations it would seem come to realize this past the point of no return. With Chief Officers in American businesses attaining super-star status and business, even political scandals becoming all too common it is in my belief that as we enter this seemingly shady and ambiguous business environment it is our duty to learn, understand, and extrapolate from these events. In recent American history the first and one of the largest of these scandals to come to mind would be the bankruptcy of Enron Corporation. If we apply and analyze the skills of a negotiator like Founder and Chairman Kenneth Lay, CEO Jeffery Skilling, and CFO Andrew Fastow it becomes clear how and why the actives of Enron were perpetuated for as long as they were. â€Å"This wasn’t about the numbers Enron was publishing, but rather it was about the people. This was a human tragedy† (Gibney). As expressed in the documentary, â€Å"Enron: The Smartest Guy’s in the Room,† the core issue of Enron’s deceit was not the amounts and figures they, their auditors, and their creditors were posting, but rather how these lies were tolerated by so many and how not a single person for so long never spoke out against such blatant lies. To grasp a foundation and background, first the documentary narrates the beginnings of the firm and its people. Of course Enron’s beginnings cannot be told without first discussing its founder,Show MoreRelatedEnron : The Smartest Guys1384 Words   |  6 PagesEnron: The Smartest Guys in the Room Organizational Movie Paper Enron Corporation’s failure in the year of 2001 has become a depiction of unethical corporate behavior for years to come. After having watched Enron: The Smartest Guys in the Room; I found many organizational communications course concepts could be brought to our attention within the documentary. To further our understanding, I will offer my insight as to how class-related concepts connect with the documentary by discussing how EnronRead MoreEnron, the Smartest Guys in the Room.1229 Words   |  5 PagesEnron, the Smartest Guys in the Room. Enron was involved in American’s largest corporate bankruptcy. It is a story about people, and in reality it is a tragedy. Enron made their stock sky rocket through unethical means, and in reality this company kept losing money. The primary value operating among the traders was greed, money, and how to make profits under any circumstance. The traders thought that a good trader is a creative trader and the creative trader can find any arbitrage opportunityRead MoreEnron Smartest Guys On The Room1573 Words   |  7 PagesThe movie ENRON smartest guys in the room is about one of the biggest corporation corruptions in the United States. In 1985, ENRON Corporation, was a company that delivers pipeline for natural gas and electricity, while mergering with Houston Natural Gas and Internorth. ENRON quickly grew into a reputable company that generated enormous profits. In a short period of time ENRON was considered one of the top global trading company for natural gas, commodities, and electricity. According to the statistic;Read MoreEnron : The Smartest Guys Of The Room Essay1549 Words   |  7 PagesIntroduction Enron was a Houston based energy, commodities and services company. When people hear the name Enron they automatically associate their name with one of the biggest accounting and ethical scandals known to date. The documentary, â€Å"Enron: The Smartest Guys in the Room,† provides an in depth examination of Enron and the Enron scandal. The film does a wonderful job of depicting the downfall of Enron and how the corporate culture and ethics were key to Enron’s fall. As the movie suggests, Enron is â€Å"notRead MoreEnron: the Smartest Guys in the Room1989 Words   |  8 Pages it took Enron 16 years to go from about $10 billion of assets to $65 billion of assets, and 24 days to go bankruptcy. Enron is also one of the most celebrated business ethics cases in the century. There are so many things that went wrong within the organization, from all personal (prescriptive and psychological approaches), managerial (group norms, reward system, etc.), and organizational (worl d-class culture) perspectives. This paper will focus on the business ethics issues at Enron that wereRead MoreEnron Case : The Smartest Guys Of The Room1149 Words   |  5 Pages In review of the Enron case, executives higher up exploited their privileges and power, participated in unreliable treatment of external and internal communities. These executives placed their own agendas over the employees and public, and neglected to accept responsibility for ethical downfalls or use appropriate management. As a result, employees followed their unethical behavior (Johnson, 2015). Leaders have great influence in an organization, but policies will not be effectiveRead MoreEnron: The Smartest Guys in the Room Essay1889 Words   |  8 PagesThe thing I liked most about this documentary was the fact that it focused on the guys at the top, the self-proclaimed smartest men in the room, the so-called geniuses who knew the energy business so much better than the rest of the indus try. And what a piece of work these men were. Enron: The Smartest Guys in the Room shows us how basic human nature does not change, whether its in the easy fall into killing as a means to resolve disputes, or in the incessant human obsession to acquire forRead MoreEnron: the Smartest Guys in the Room Essay1834 Words   |  8 Pagesthis paper is consider three possible rationales for why Enron collapsed—that key individuals were flawed, that the organization was flawed, and that some factors larger than the organization (e.g., a trend toward deregulation) led to Enron’s collapse. In viewing â€Å"Enron: The Smartest Guys in the Room† it was clear that all three of these flaws contributed to the demise of Enron, but it was the synergy of their combination that truly let Enron to its ultimate path of destruction. As in any organizationRead MoreEssay on Enron: the Smartest Guys in the Room5209 Words   |  21 Pagesï » ¿Enron: The Smartest Guys in the Room The  Enron scandal, revealed in October 2001, eventually led to the  bankruptcy  of the  Enron Corporation, an American  energy company based in  Houston, Texas, and the de facto dissolution of  Arthur Andersen, which was one of the  five largest  audit  and accountancy  partnerships  in the world. In addition to being the largest bankruptcy reorganization in American history at that time, Enron was attributed as the biggest audit failure. Enron was formed in 1985 by  KennethRead MoreA Film Review of Enron: The Smartest Guys in the Room666 Words   |  3 PagesAbstract This is a review of the movie, Enron: The Smart Guys in the Room. The paper analyses the themes that contributed to the downfall of Enron. It also considers steps that Human Resources would have taken given the chance, in addressing the issues that contributed to the collapse of the Company. Factor That Led To Enrons Downfall According to the documentary Enron: The Smartest Guys in the Room, it seems that one major reasons that led to Enrons down fall was; unethical corporate behavior

Understanding the IT Virtualization Concepts

Question: Describe about the Understanding the IT Virtualization concepts, solutions and patterns in todays Organizations? Answer: Executive Summary The technology keeps on developing, and the need for generating virtual systems for refreshing the behavior of the real environment has become a major role of the IT software providers. For making a virtual environment, IT professionals have to use virtualization through developing a server implementation, investigating the requisition or operating system renovation as well as examining the use of software technology in the development habitat. This study has demonstrated the use of virtualization considering Citrix as the case organization. The study has shown that the importance of IT virtualization is increasing with a great speed where many business territories like Citrix are using virtualization to sprint live arrangement of servers to provide discharge, privacy, reliability and a nominal cost for hardware possession. With the help of server virtualization environments one hardware platform is able to deliver many servers or remote agency. The study has also revealed that different vendors are providing software and hardware virtualization results to the customers. This report enables the user to access either server-based virtualization or desktop-based virtualization. Developing a virtualization environment requires an understanding of the host system and its shortcomings including the need of the guest operating system. The overall study of this report encourage the reader to explore how virtualization can be imple mented in an organization and what are the possible steps for maintaining virtualization solution. 1.0 Introduction Virtualization is a software technique, which allows running numerous operating systems and different applications on the identical server at the same time (Lim et al. 2015). In the field of computing, the act of creating a virtual version of any technology includes virtual operating system, virtual storage gadget, and several resources of computer network (Li et al. 2013)). The implementation of virtualization in different IT services enables to transform the IT scenario. To perform this study, Citrix System has considered as the case organization. It is a multinational software company whose primary motive is to develop mobile workspace technologies, which comprises of virtualization, networking, mobility management, and cloud services (Hodge et al. 2012). In the first section, the evaluation of current virtualization solutions is mentioned which has been adopted by any organization. The later discussion contains potential benefits of virtualization and assessment of the technology requirements for improving the productivity of the chosen group. At the same time, an analysis of the needs for implementing virtualization and designing of a virtualization solution by a preexisting virtualization technique has been discussed. Systematic testing of virtualization environment in the chosen company and identification of the critical environmental factors within the enterprise that have a great impact on its virtualization solution has been discussed. Documentation and analysis of the test results of the test carried out in the previous section and how it impacts on the virtualization solution of the organization chosen. In the last part of the report monitoring the virtualization environment of the selected organization, measures that can be taken by the chosen company to maintain a virtualization have been discussed. Understanding the Commercial Impact and Potential of Virtualization Current Virtualization Solutions in an organization In this, new era of science and technology, application of computer-networking is getting sophisticated which results in demanding network security issues. Notably, virtualization in small enterprises is reducing the time disbursed on daily IT administrative tasks, like managing and summing up of new server tasks at hand, the addition of new employees or enlarging and projecting new applications. These techniques serve the business needs of the small enterprises (Marakas et al. 2014). Some companies like Citrix System, VMware, Oracle, Red Hat, Oracle, Amazon, Google, Virtual Bridges, Parallels, Proxmox etc. are providing the best software solutions are using virtualization (Demestichas et al. 2013). Examples of small and medium sized organizations that are using virtualization solutions are VMware and Proxmox. (Bennett et al. 2012). The virtualization solutions implemented in VMware are VMware vSphere Essentials Plus, VMware vCloud Suite and VMware Horizon Suite. (Tsugawa et al. 2012). The application of VMware vSphere Essentials Plus is to start quickly the virtualization in small organizations and allows gaining the interest of server association and business progression (Lim et al. 2015). VMware vCloud deals with providing the components to convey infrastructure as a supply and rapidly evolve a data center into an easy moving private cloud. VMware Horizon Suite allows IT to convert physical and virtual applications and desktops into consolidate IT services that can be delivered safely to end users on their devices. (Tzanakaki et al. 2013). On the other hand, Proxmox implemented two virtualization solutions that are, Proxmox Mail Gateway and Proxmox virtual environment. A full virtualization management explanation is explained by Proxmox virtual environment, which is based on KVM and storage virtualization. While Proxmox mail gateway is a displayed mail proxy resulting in virus and spam filtering. It protects the mail server contrary to all email threats (Tzanakaki et al. 2013). Examples of two large organizations include Amazon and Google. Virtualization solutions used in Amazon includes paravirtual (PV) and hardware virtual machine (HVM). (Marakas et al. 2014). PV AMIs enables booting with a special boot loader named as PV-GRUB, which outset the boot cycle and then order loads the kernel mentioned in the menu (Li et al. 2013). HVM AMIs replenishes the strength to run an operating system precisely on top of a virtual machine beyond any adjustment (Yemini et al. 2013). On the other hand, Google uses Ganeti, which is a virtualization solution and helps in disk formation, OS installation, migration, creation and shutdown and can be recycled to shift a virtual machine slender by a physical system preemptively (Christensen et al. 2012). Potential benefits of virtualization Proper utilization of virtualization solution enhances the effectiveness of hardware with appropriate care to solve the problem if any. In the todays world of IT enterprises, the application of latest technologies that enables businesses to rise gradually thereby meeting customer needs (Christensen et al. 2012). Virtualization automation approves a virtual figure on an instrument, which is possibly re-imaged on other server when there is a failure in machine (Xavier et al. 2013). Virtualization of systems allows averting system striking caused due to software like device drivers. To get greater reliability, availability, and security VT-d for Directed I/O Architecture imparts methods for controlling the system devices in a better way using the construction of DMA and remapping of interrupt to individual the improved separation of I/O resources (Rost et al. 2015). Virtualization is adopted for collection of ineffective servers that can be exchanged against fewer machines. Moreover, software is tested even when separated in a safe virtual barriers and data centers can skillfully yield to new technologies, shifting work models and unstable corporate superiority using virtualization. Virtualization reduces the VMM complexities, upgrades reliability, allows protection and security, and improves the functionality, efficiency and performance (Tsugawa et al. 2012). The benefits that the selected company named Citrix is obtaining by virtualization include cloud-based storage techniques, XenApp, and XenDesktop (Kerravala et al. 2013. Cloud-based storage method allows Citrix to store the data of the customers in the cloud and enables to mobilize the date of the customers of Citrix, which they already contain (Demestichas et al. 2013). Now the application of XenApp is to transform Windows apps into a shielded mobile services, on the other hand, XenDesktop provides power to complete virtual desktops that are the applications of virtualization used in Citrix (Lim et al. 2015). Current technology requirements for implementing virtualization in a small medium enterprise Virtualization not only enhances the hardware regulation, but it also reduces the time that was taken to install a new server online. However, to implement IT virtualization technology, a small and medium size organization is required to be fulfilled the below mentioned requirements: The technology of virtual machine sprawl has become one of the primary concern facing by many small, medium enterprises that are using desktop and server virtualization (Yang et al. 2013). The ability for creation of virtual machines without the controlling and disciplinary acts of the physical world resulting in devices being provided unnecessarily Email, messaging, databases and storage facilities are the examples of information technology that encounters sprawl issues and are solved by virtual machine sprawl (Sun et al. 2013). The egenera vBlade technology provides support to the processor that can install the intricacy and restore all the trouble created by alteration of the hosts and the OS systems (Rost et al. 2015). It virtualizes and manages resources on a frame comprised of two-socket and four-socket x86 servers including storage and switches (Demestichas et al. 2013). The enterprise that has the unified content platform can debug and modify all the mistakes made by the cloud technology (Bennett et al. 2012). The free products could be handled by setting up the applications and the platforms which actually tries to debug and bring an approach (Uddin et al. 2012). Some of them are: VMware Ready seeks to implement proper management and mechanization that support the system against all features. Embedded OEM tried to evolve the coding stream, which has a business comprises of logging and automation services. ISV Centre focuses on the machines that can handle the physical mobility and manage the different platform levels. VMware Solution Exchange provides more concrete solutions by tracing the applications that are essential to execute the outcome and decide confidence (character). Each organization has some unique requirements, and similar steps are intricate in creating a good technology plan (Peng et al. 2013). Centric Systems can implement these five steps in developing technology plan: Firstly, the accessible technology strategy must be defined to clarify that whether the proposed technology can be used in the business or not (Drutskoy et al. 2013). Secondly, a comprehensive set of necessity has been developed to describe the accessibility requirements of Citrix and thereby assessing the latest technology (Dong et al. 2012). Thirdly, the purchasing of accessible technology is required, and identification of internal technology systems is needed to increase accessibility (Khan et al. 2012). Fourthly, when the accessible technology is available in addition to new technology it can be forwarded to Centrix Systems. This step also includes increasing awareness within employees about the opportunity of affordable technologies, and the employees must be trained to use accessible features (Tsugawa et al. 2012). Lastly, the available technology that has been implemented on Citrix Systems is required to be maintained, and success is evaluated including opportunities for improvement. Be able to design virtualization deployments. Needs analysis for a virtualization deployment in an organization Citrix Systems provides application and desktop virtualization, enabling to have a complete, flexible result that supplies Windows applications and desktops to all users on available devices while securing necessary information in the data center (Khan et al. 2012). Using virtualization in Citrix reduces VMM complexities, it enhances reliability, protection and certainty, improves the functional operations, and improves the performances (Kerravala et al. 2013). Streamlined implementation and lifecycle management reduce desktop and application management costs. Implementing virtualization process leads to delivery of apps and desktops on demand, without working for hours to prepare traditional hardware and thereby build focus on business initiatives (Drutskoy et al. 2013). Design of a virtualization solution for a given virtualization implementation in an organization Virtualization is a hardware / software solution that enables multiple operating systems to work on a single hardware system. In an organization like Citrix, the following designing methodologies can be implemented to get best IT solutions: Storage virtualization can be used in Citrix Solutions that can ensure the best performance involved with storage I/O real and virtual servers (Uddin et al. 2012). Network access virtualization facilitates production of any application containing high network activity, which will be influenced without committed NICs or a robust network virtualization solution (Sun et al. 2015). Memory and CPU virtualization is required in Citrix not over to commit virtual storage in a single operating system (Dong et al. 2012). To neglect the critical situations created by harmoniously active virtual machines may not outreach the actual memory (Hodge et al. 2012). Be able to implement virtualization deployments Steps taken to maintain virtualization solution Citrix System applies IT virtualization rostrum, and different steps are need to be followed to get a proper performance of the virtualization techniques. The steps that need to be taken by Citrix System to maintain virtualization solutions are: Step 1: Choosing of a proper virtualization solution Before implementing virtualization solution in Citrix, the appropriate virtualization solution is needed to be adopted. In general, two methods are available which can organize centralized thin-client background for customers including virtual desktop infrastructure (VDI) and remote access terminal services. Citrix system has an option to use XenApp as remote access terminal services (Jain et al. 2013). Step 2: Assessment of the network before implementation of virtualization In this step, the Citrix System need to investigate the network and must check whether satisfactory bandwidth is available or not. Moreover, enough bandwidth is required to be maintained to guide the peak load of all virtual desktop users (Lim et al. 2015). Step 3: Development of a desktop virtualization server scheme In this step, Citrix System needs to use server supervising tools to accumulate and dispatch data about the systems resource implementation (Xavier et al. 2013). If there is a failure in the server, then all the virtual desktops will breakdown and to avoid such circumstances the virtual desktops need to spread across multiple servers (Yemini et al. 2013). Step 4: Up gradation of storage to support desktop virtualization In this step, desktop virtualization settles every PC's data on servers. Hence, the data center SAN requires enough additional storage to host all the virtual desktops (Bennett et al. 2012). Citrix need to estimate their customers repository requirements and combine this extra storage with current SAN environments before implementing desktop virtualization (Peng et al. 2013). Step 5: Requirement of protocol interoperability and graphics acceleration hardware Citrix system may use Microsofts Remote Desktop Protocol (RDP) and the Independent Computing Architecture (ICA) to exchange the client-server data (Tzanakaki et al. 2013). The company must also be aware of whether their customers desktop endpoints are suited with the virtualization protocols or not (Kerravala et al. 2013). Latest rules are designed to implement graphics acceleration hardware and virtualization software named CAD is used which can still strive software-based protocols (Christensen et al. 2012). Step 6: Implementation of desktop virtualization in phases For maintaining desktop virtualization, Citrix system needs to prepare a mockup application in laboratory using apparatus that is relevant to their customers and also refreshing workloads to construct for real deployments (Yang et al. 2013). Step 7: Aggressiveness with endpoint security Citrix System needs to perform due assiduity when implementing desktop virtualization to firm each endpoint attacking. Effective endpoint security allows virtualization less acceptable that customers will alter their local operating systems or create other changes to the endpoint (Tsugawa et al. 2012). Systematic testing of virtual environment and its usefulness in Citrix System Virtualization is IT field provides many desktop virtualization solutions. Several virtualization techniques are available in Citrix, which includes server, desktop virtualization application, networking, cloud computing techniques and software as a service (Rost et al. 2015). The applications provided by Citrix solution includes: Request for mobilizing apps and desktops- XenApp- It is a virtualization solution, which allows accessing to Windows applications and desktops independent of the machine (Hodge et al. 2012). XenDesktop- It is a virtualization solution which conveys Windows apps and desktops as a source of safe mobile services (Demestichas et al. 2013). With the help of XenDesktop, IT mobilizes the business, and the centralizing control minimizes the costs for intelligent belongings (Christensen et al. 2012). Application for managing enterprise mobility XenMobile- It is a virtualization solution, which conveys mobile device management (MDM), enterprise-grade productivity apps and mobile application management (MAM) (Khan et al. 2012). Application for optimizing and securing networks NetScaler- It is a web application distribution controller that creates applications run five times greater. CloudBridge- It is a common platform that enhances and associates applications, optimizes bandwidth usage beyond third party applications (Sun et al. 2015). Application for building cloud infrastructure XenServer- It is an open source virtualization environment that allows in managing server, cloud and desktop practical framework (Tzanakaki et al. 2013). Documentation and Analysis of the test results Citrix System is required to plan in an organized manner to obtain experimental findings in the virtualization solution as provided by them. IT needs to focus on data management, accessing of applications and data, managing of enterprise mobility, mobilizing of desktops and applications, optimization and security of networks, and need to build cloud infrastructure (Dong et al. 2012). The different techniques of virtualization solution enable the customers of Citrix to obtain a useful output. For accessing data Citrix receiver is used which allows access to applications, desktops and data quickly (Khan et al. 2012). For managing the enterprise mobility XenMobile, Worx Mobile Apps, and GoToAssist is used which helps in maintaining and securing apps, devices, and data (Kerravala et al. 2013).To mobilize apps and desktops XenApp, XenDesktop and XenClient are used. For optimizing and securing networks NetScaler and CloudBridge are used which allows the data center network to amend the del ivery of all web applications and CloudBridge advances user involvement and productivity by enabling rapid, safe remote access. To build the cloud infrastructure, Citrix is using CloudPlatform, CloudPortal Business Manager, and XenServer as their virtualization solutions (Khan et al. 2012). Be able to manage virtualization environments Monitoring the virtualization environment in Citrix Citrix provides the flexibility that carry out some complexity in the administration of virtualized infrastructure. It provides its single share of complications though virtualization is advantageous to IT operations (Hodge et al. 2012). Citrix is a cloud computing company that allows mobile workstyles. Its offers virtualization solutions for different requirements including: Citrix Receiver to access the data and applications. XenMobile, Worx Mobile Apps, and GoToAssist to manage the enterprise mobility. XenApp, XenDesktop and XenClient to mobilize the applications and desktops. NetScaler and CloudBridge used to optimize and to secure the networks. CloudPlatform, CloudPortal Business Manager and XenServer used to build the cloud infrastructure (Jain et al. 2013). Measures taken by Citrix to maintain a virtualization environment Scalability: Citrix system deals with the capability of the network it is applying for various applications. It supports the regular workloads. There are different hardware and software used as resources. Allocation of an additional capacity virtual machine is also used (Lim et al. 2015). Consolidation: To maintain the physical environment based on IT infrastructure, Citrix system need appropriate hardware, software, supply, storage device, RAM, etc. Every day the company is developing different products related to an application (Peng et al. 2013). Agility: The unparallel level of flaccidity and acuteness to the data center happens in virtualization. Citrix uses discrete components of software, which can develop various servers. Distribution of the hardware and software resources is done to get a fixed performance (Yemini et al. 2013). Reliability: When Citrix system uses costly hardware and software then failure may occur, error by human or potential failure. Whenever it is required the organization migrates a software object to physical hardware (Bennett et al. 2012). Critical review and analysis of overall impact of virtualization and impact on a business due to virtualization: In any business, the use of virtualization is much more essential. The business organizations are implementing virtualization for getting the following benefits: Lessen the operating expenses. Provide better reply by IT to appeal for new services. Increase SLAs on IT services (Xavier et al. 2013). Replenish business continuity. Improve the service given to the customers. If any business organization does not implement virtualization then the following consequences may occur: The cost of the application equipment will be increasing gradually. Minimize the business value of data centers. Lack efficiency in the work structure. Reduce the functionality and performance. 5.0 Conclusion: Virtualization solution is the most important aspect in IT sectors. Citrix system is an American software organization using virtualization or a potential combination of hardware and software to implement Windows application, desktop virtualization, and networking, cloud computing. It operates an integrated software service that tests the virtualization environment and identifies the critical factors and its solution. For high productivity in IT companies, virtualization solutions play the crucial role. References Bennett, S.M., Anderson, A.V., Neiger, G., Rodgers, D., Huntley, B.E. and Smith, L.O., Intel Corporation, 2012.Injecting virtualization events in a layered virtualization architecture. U.S. Patent 8,151,264. Christensen, C. and Wessel, M., 2012. Surviving disruption.Harvard Business Review,90(12), pp.56-65. Demestichas, P., Georgakopoulos, A., Karvounas, D., Tsagkaris, K., Stavroulaki, V., Lu, J., Xiong, C. and Yao, J., 2013. 5G on the horizon: key challenges for the radio-access network.Vehicular Technology Magazine, IEEE,8(3), pp.47-53. Dong, Y., Yang, X., Li, J., Liao, G., Tian, K. and Guan, H., 2012. High performance network virtualization with SR-IOV.Journal of Parallel and Distributed Computing,72(11), pp.1471-1480. Drutskoy, D., Keller, E. and Rexford, J., 2013. Scalable network virtualization in software-defined networks.Internet Computing, IEEE,17(2), pp.20-27. Hodge, P., 2012. Virtualizing Your Process Control Computers.Chemical Engineering Progress,108(1), p.22. Jain, R. and Paul, S., 2013. Network virtualization and software defined networking for cloud computing: a survey.Communications Magazine, IEEE,51(11), pp.24-31. Kerravala, Z., 2013. The Software-Defined Data Center is Key to IT-as-a-Service.Cell,301, pp.775-7447. Khan, A., Zugenmaier, A., Jurca, D. and Kellerer, W., 2012. Network virtualization: a hypervisor for the Internet?.Communications Magazine, IEEE,50(1), pp.136-143. Li, X., Bai, G., Liang, Z. and Yin, H., 2013, July. A software environment for confining malicious android applications via resource virtualization. InEngineering of Complex Computer Systems (ICECCS), 2013 18th International Conference on(pp. 208-211). IEEE. Lim, J., Song, S., Lee, S., Doo, S. and Yoon, H., 2015. The Design of a New Virtualization-Based Server Cluster System Targeting for Ubiquitous IT Systems. InUbiquitous Computing Application and Wireless Sensor(pp. 361-375). Springer Netherlands. Marakas, G.M. and O'Brien, J.A., 2014. Introduction to Information Systems.info: Singapore: McGraw Hill, 2014. Peng, S., Nejabati, R. and Simeonidou, D., 2013. Role of optical network virtualization in cloud computing [invited].Optical Communications and Networking, IEEE/OSA Journal of,5(10), pp.A162-A170. Rost, P., Berberana, I., Maeder, A., Paul, H., Suryaprakash, V., Valenti, M., Dekorsy, A. and Fettweis, G., 2015. Benefits and Challenges of Virtualization in 5g radio aCCess networks.Communications Magazine, IEEE,53(12), pp.75-82. Sinha, S., 2015, September. DynaSAN: Multipathing integration, load balancing failover over storage virtualization. InReliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on(pp. 1-5). IEEE. Sun, S., Kadoch, M., Gong, L. and Rong, B., 2015. Integrating network function virtualization with SDR and SDN for 4G/5G networks.Network, IEEE,29(3), pp.54-59. Tsugawa, M., Figueiredo, R., Fortes, J., Hirofuchi, T., Nakada, H. and Takano, R., 2012, June. On the use of virtualization technologies to support uninterrupted IT services: A case study with lessons learned from the Great East Japan Earthquake. InCommunications (ICC), 2012 IEEE International Conference on(pp. 6324-6328). IEEE. Tzanakaki, A., Anastasopoulos, M.P., Zervas, G.S., Rofoee, B.R., Nejabati, R. and Simeonidou, D., 2013. Virtualization of heterogeneous wireless-optical network and IT infrastructures in support of cloud and mobile cloud services.Communications Magazine, IEEE,51(8), pp.155-161. Uddin, M. and Rahman, A.A., 2012. Energy efficiency and low carbon enabler green IT framework for data centers considering green metrics.Renewable and Sustainable Energy Reviews,16(6), pp.4078-4094. Uddin, M., Talha, M., Rahman, A.A., Shah, A. and Ahmed, J., 2012. Green Information Technology (IT) framework for energy efficient data centers using virtualization.International Journal of Physical Sciences,7(13), pp.2052-2065. Xavier, M.G., Neves, M.V., Rossi, F.D., Ferreto, T.C., Lange, T. and De Rose, C.A., 2013, February. Performance evaluation of container-based virtualization for high performance computing environments. InParallel, Distributed and Network-Based Processing (PDP), 2013 21st Euromicro International Conference on(pp. 233-240). IEEE. Yang, M., Li, Y., Jin, D., Su, L., Ma, S. and Zeng, L., 2013, August. OpenRAN: a software-defined ran architecture via virtualization. InACM SIGCOMM computer communication review(Vol. 43, No. 4, pp. 549-550). ACM. Yemini, Y., Kliger, S., Florissi, D., Benjamin, S. and Rabover, Y., VMTurbo, Inc., 2013.Managing resources in virtualization systems. U.S. Patent 8,396,807.