- Boot image
A boot image is a type of
disk image (a computer file containing the complete contents and structure of aComputer storage media ). When it is transferred onto aboot device it allows the associated hardware to boot.This usually includes the operating system, utilities and diagnostics, as well as boot and data recovery information. It also includes those "applications" used organization-wide. A specialized image for a particular type of user or department is called typically a
departmental boot image . Building such an image can take days or weeks, and involve complex decisions about licensing and permissions - including which passwords to store in the boot image and which to require users to type in - and requires experts insoftware integration to do.However, once built, the boot image can be simply copied onto devices, patched within reasonable limits, and remains disposable in case of any problems (viruses in particular). This is possible because:
Unlike other hard drive images (which may contain any data at all), pure boot images contain no mission-critical data. By definition a pure boot image contains no data that cannot be reproduced from configurations or off-the-shelf executables. In particular end-user data is not part of a boot image, although some operating systems require that a copy of user preferences or configuration files be kept within the boot image itself, e.g.
Microsoft Windows registry. Utilities likeNorton Ghost keep a backup copy of the boot image, for quick re-imaging (often called re-installation) in case of problems, to avoid diagnosing specific problems with the image itself.By keeping the boot image entirely separate and disposable, and mandating
boot image control , organizations seek to keep theirtotal cost of operations (including itstotal cost of ownership component) low. Often such organizations look atuptime as a service .One goal of boot image control is to minimize the number of boot images used by an organization to reduce support costs. It includes at least:
* Specifying the machine hardware to minimize unneeded machine diversity and minimize the resultant number of boot images.
* Upgrading new machine specifications at low additional cost ensures that they will remain useful long past their normal life. Extending the life of desktop machines will reduce the incursion of off-spec machines later in the life-cycle, improving standardization, reducing support costs, minimizing e-waste.
* Organizing the network so that boot images can be efficiently supported, independent of data. Data must not be dependent onboot device s. Use networks to store data on secure servers.
*hardware acceptance testing on each new machine confirms that it is fit for use in a standardized boot image environment.
* Boot image installation to ensure that only supportable standardized boot images are used.
*Troubleshooting and help desk functions employ standardized tests to identify the source of problems: boot, software, or hardware.
*Desktop system recovery tools and procedures for failed desktop units. These would use backup copies of a boot image created with utilities such asNorton Ghost . In a large organization with many compatible machines, rapid recovery by replacing with a backup boot image may only take a few minutes, with considerable cost savings.
* Data backup and recovery procedures ensure data is stored in the right place so that it can be recovered promptly in crisis situations.
* Installingservices for the disabled with a single boot image in a manner that is ubiquitous and cost effective, meeting the needs of all staff regardless of disability, with available technology services.
*Telework and secure off-site system access procedures.
* Facilitating worker transfer by changing boots or authorizations instead of moving machines.
* Usingthin client s for off-spec machines to eliminate the need for special boot images.Many organizations use thin clients for applications which require high security, involve unreliable users or repurpose older machines for continued use:
A cascading strategy involves re-imaging older, off-spec machines to thin client boot images so that they may continue in use for some less demanding or more access-controlled applications.
ee also
*
Disk image
*Disk cloning
Wikimedia Foundation. 2010.