Few note virtualization's 'stealthy creep'

Oct 10, 2005

Virtualization, a concept that replaces the old model of a computer as a single “box” running only its own operating system and storing only its own data in its own format, is likely to revolutionize the IT industry.

There’s a plot afoot, and it’s not the latest detective show on prime time. It’s what’s known as virtualization.

“The disruptive force of virtualization is likely to revolutionize the IT industry in the next three to four years. But few are really noticing its stealthy creep,” says Dr. Jurij Paraszczak, Chief Technology Officer of the IBM Venture Capital group and Director of Technology for the IBM Research Emerging Business Group.

Virtualization is a broad concept, which may explain why it’s less noted than it deserves. Perhaps the simplest definition is that virtualization replaces the old concept of a computer as a single “box” running only its own operating system and storing only its own data in its own format. In place of the old model, virtualization allows a single computer to play different roles for different users. It also encompasses software that allows disparate operating systems and hardware to work together and file systems that allow access to information regardless of its form or origin. It even means virtual “computers” that are actually a collection of machines, some of which are called upon only when needed, on demand.

“Without a doubt virtualization is occurring across the entire IT stack — from the chips through the hardware subsystems, the operating system and applications,” says Dr. Paraszczak.

In the real world, that translates to giving the Australian Open an infrastructure that can scale up to handle more than 80 times its regular traffic during the tennis tournament and then scale down once the matches are over. Or it can mean providing Locus Pharmaceuticals in Pennsylvania access to IBM Deep Computing Capacity on demand. The company can use supercomputing power whenever it’s needed and pay only for the resources it uses.

“The combination of increased speed and access to computing power has expanded our project capacity by a factor of four, allowing us to consider even more critical disease targets,” says Jeff Wiseman, a Locus vice president.

“Integrated virtualization will dramatically change the control points in the system architecture and allow enterprises to focus on business features rather than the underlying infrastructure,” says Dr. Paraszczak.

Source: IBM

Explore further: Adult dating website hack exposes personal data

Related Stories

Ether compounds could work like DNA on oily worlds

May 12, 2015

In the search for life beyond Earth, scientists have justifiably focused on water because all biology as we know it requires this fluid. A wild card, however, is whether alternative liquids can also suffice ...

US penalizes developer of virtual currency XRP

May 06, 2015

San Francisco company Ripple Labs agreed to pay a $700,000 penalty for running a market for XRP, the world's second largest virtual currency after Bitcoin, outside US financial regulations.

Recommended for you

Adult dating website hack exposes personal data

15 minutes ago

A data breach at a website billed as "the world's largest sex and swinger" community may expose personal and sexual information on millions of users worldwide, a report said Friday.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.