InstructionIn a 500- to 750-word essay, research virtualization technologies, including Type I and II architectures, the technical mechanisms by which virtualization is implemented in a variety of environments, and their implications for cyber operations. Examine the following virtualization technologies and resource control principles: 1. Memory management and isolation. 2. Virtual storage allocation. 3. Association of physical hardware with virtual hardware and device emulation. 4. Live migration and failover of physical systems to virtual environment. 5. Benefit of creating virtual snapshots and clones. 6. Interfaces both internal and external for managing, monitoring, and synchronizing virtual environments APA style is required with at least 2 sources.