Virtualization and cloud computing will help companies accomplish more by breaking the physical bonds of an IT infrastructure and its users, executives from Cisco and Novell proclaimed this week during their keynote addresses at Interop New York. But caveats such as heightened security threats must be overcome in order to fully benefit from this new computing paradigm, they warned.
Computerworld feature Virtualization 101: What is virtualization?
Virtualization is a "chameleon concept" with one common denominator: breaking the bond with physical reality "so you can do more," said Marie Hattar, vice president of network systems and security solutions at Cisco. "It's one asset to many; or many assets to one," she said.
Virtualization allows the dynamic partitioning of resources on the fly, Hattar said. Using Cisco as an example, the company increased the utilization of its storage arrays from 20 percent to 68 percent through virtualization, she said.
That translated into an annual savings of US$40 million for every year that Cisco could delay construction of a new data center, Hattar said.
"It's so exciting because the benefits are so significant," she crowed. As resources are added to the virtualized pool, the value of virtualization increases exponentially, she claimed.
The more a company virtualizes, the farther it ventures into cloud computing, with a hosted infrastructure, abstracted services with APIs, and application services delivered through a Web browser, Hattar added.
But she quickly described sobering scenarios that could hold back widespread adoption of virtualization and cloud computing.
One issue is siloed IT operations in which separate departments oversee specific areas of infrastructure -- systems, servers, storage, applications and network.
"For virtualization to work, those walls have to come down," Hattar said. "It depends on shared resources."
Another is a lack of standards for interconnecting clouds -- the equivalent of extranets for clouds. But perhaps the most critical issue is the new and numerous security holes opened up by virtualization and cloud computing.