Virtualization saves time and money by maximizing resources. Virtualization is a process of partitioning the space on a physical machine and creating a file with it. Within that file you create your virtual machine. First you create your virtual server to manage your virtual workstations, and then you create your virtual workstations. You can set up multiple systems to share the same hardware, which is maximizing resources. Virtual machines can and need to go through the same installation and security processes that a logical machine would such as remote installations services, hardening the operating system, running antivirus protection, and patching. Virtual workstations can be accessed via remote desktop. Virtualization is changing the computing landscaping in the following areas:
  • Server consolidation- According to Info-Tech’s research, virtualization can achieve reductions in the number of physical servers by a factor of 5:1, 10:1, or even 20:1. In the It industry the combination of using blades and virtual machines has become very popular, especially with server consolidation. Server consolidation can offer lower total cost of ownership of servers and faster return on investment, more efficient utilization of servers, simplified operations, increased network availability, and easier manageability. Virtual server technology allows IT organizations to run multiple virtual servers on a single physical server. So by enabling consolidation of physical assets, virtualization makes it less complex for the administrators to have to manage day in and day out.
  • Development and Testing - Virtualization is becoming a reoccurring function in modern testing and research development. Researchers, testers, and developers can all have access to the same utilities, programs, OS, files, and data without having to transfer each thing to separate computers. It would also lower the costs of research and development since all of the computers won't need the applications used in the testing. Virtualization also opens the door to secure back-up capability, giving the researchers more support from losing all of their data in case of an emergency or unseen circumstances.
  • Business Continuity (Disaster Preparedness) - Business continuity is the ability of a business to maintain operation, even through disasters and any disruptive events. A very handy way to safeguard your digital information is by using redundant hardware and software. Redundant hardware includes simply purchasing more than one hard drive for you computers, to have all the information backed up right with you, rather than on just one hard drive. That approach is know as Redundant Array of Inexpensive Disks (RAID). Redundant software can also protect a business. Software-based RAID is used primarily on low-rate servers. As of now harware-based RAID is the more frequently used, because software-based RAID can slow down the CPU, and hence affect productivity. However, thanks to the new dual-core processors, software-based RAID is making a comback. Thanks to the coupling of processors, software-based RAID can run in the background, and affects the CPU at a fraction of single-core processor computers.
  • Desktop Manageability & Security - Virtual Desktop Manager is a connection administrator that manages user access to their virtual desktops. Once access is granted, an individual can gain access from anywhere in the world by the web or a special Windows client-based component supplied within the original virtual server package. This removes the need for an individual that travels regularly to have a disc containing what they may need which in turn removes the possibility of losing sensative information that may be stored on that disc.

red hat centOS

Web Resources:

puTTY - terminal emulator application which can act as a client for the SSH, telnet, and raw TCP computing protocols.
SSH - Secure Shell (SSH) is a network protocol that allows data to be exchanged over a secure channel between two computers. Encryption provides confidentiality and integrity of data. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary. SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling. - Wikipedia
TCP - Transmission Control Protocol (TCP) is the transport protocol that manages the individual conversations between web servers and web clients. - Wikipedia

"Virtual Desktop Infrastructure." VMWare. 2008. 10 Feb. 2008 <>.

"Virtualization." Wikipedia. Oct. 2007. 11 Feb. 2008 <>.

Woodie, Alex. "VMware Revs Desktop Virtualization Offerings." IT Jungle. 06 Feb. 2008. 8 Feb. 2008 <>.

Sixto Ortiz Jr. "Virtualization Leads to Consolidation." 11 Feb. 2008

"Server Management Consulting and Support" 11 Feb. 2008