Description

Applications

At its core, virtualization technology allows multiple operating systems to share computer hardware, such as a server.This allows for:

  • Server Consolidation - virtualization allows for consolidating operating systems and applications. Each machine can run multiple virtual servers, thus requiring less hardware.
  • Failover/High availability - standardized configurations or images can be saved to a file so a virtual server can easily be duplicated or restarted on another machine. In the event of physical server failure, the virtual server image can be restarted on a different physical server with little or no impact to the end user.
  • Server Pooling - virtualization enables dynamic allocation of computing capacity across different hardware resources. The virtualization software monitors utilization of each virtual server. Should a virtual server experience an increased load, additional resources from other underutilized physical servers can be allocated to it.

Benefits

  • Cost efficient - reduce your hardware, storage, and maintenance costs. Multiple Virtual Servers can share the same physical server yet remain completely independent of each other
  • Stable -end users will not be impacted by a physical server failure as other physical servers will seamlessly pick up the slack
  • Efficient - computing capacity is dynamically allocated across different hardware resources.
  • Easy deployment - standardized configurations allow Virtual Servers to be easily duplicated which speeds up deployment and scalability
  • Full administrative control - you have administrative control over your own Virtual Server environments while UBC IT takes care of managing the physical hardware.
  • Regular back ups - files are automatically backed up daily
  • Secure - this service comes with a configurable virtual firewall so you can block unauthorized access

Limitations

Virtual Servers are not suitable for every server application. Some current limitations are:

  • Applications requiring any additional hardware such as peripheral cards or USB security keys.
  • Applications that require large amounts of processing power, such as graphics applications.

Technical Requirements

  • a computer with network/internet connectivity
  • a CWL account