Provide a 8 pages analysis while answering the following question: How the Present Day Data Centers Are Turning to Virtual Data Centers. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. Virtual machines have gained popularity in the computer environment. To join the bandwagon, Microsoft offers a Hyper –V program. The program works in Windows Server 2008 R2 and Windows Server 20008 infrastructure environment. Hyper-V enhances the software infrastructure and management tools needed to craft and administer the virtual server system. Hyper-V contains dynamic memory. The virtual environment augments and improves the use of the physical machine environment
Singh Amit theorized the move to virtualization enhances data network processing today
First, virtual machines can combine the data processing of many less maximized servers to a lesser number of machines, including only one server consolidating machine. Consequently, users can reduce avoidable costs. Second, virtual machines increase the effectiveness and efficiency of legacy processes. Virtual machines help in the individuals’ or companies’ strive to achieve goals and plans. The same processes may not work on newly installed hardware or newly bought operating systems. Likewise, the use of the newly installed hardware or newly bought operating systems will not maximize server use, unlike the virtual machines
Further, virtual machines offer enhanced security that includes isolated sandboxes to access and process trust-lacking programs or websites
One can implement address obfuscation to implement on the fly environments that are downloaded from the internet sites, increasing the danger of accessing trust-lacking websites. Such websites may steal information from the downloading computer and wreak havoc on the computers’ processing time and processing output quality. Virtual machines popularity is based on the concept of creating secured computing environments
Furthermore, virtual machines offer hardware illusions and configure the users’ hardware, which is absent.