Tracing back to the history of virtual computing in the early
1960’s IBM had a wide
range of systems; each generation of which was substantially different from the
previous. This made it difficult for customers to keep up with the changes and
requirements of each new system. Also, computers could only do one thing at a
time. If you had two tasks to accomplish, you had to run the processes in
batches. This Batch processing requirement wasn’t too big of a deal to IBM
since most of their users were in the Scientific Community and up until this
time Batch processing seemed to have met the customers’ needs.
These hit me at my latest times but I think o got it right?
Today, students and even office staff can reserve and log in to the Virtual
Computing Lab anytime, anywhere from their own PCs or laptops. What's more,
this remote-access system lets users choose the software they need, including
industrial strength computer-assisted design (CAD) and engineering programs
that take more memory than they have on their own systems.
Virtual computing makes one computer act and perform like
many computers. Through virtual computing providers, users can download and use
more than one operating system and perform a multitude of functions at the same
time through a single mouse click and receive all the benefits of additional
programs and hardware without having to purchase or install them on their own
computer. Executives can check their company e-mail on the road, students can
take classes from home and managers can keep up with documents stored on
internal servers from anywhere in the world. These is an amazing technology
that if emblazed in the current memory intensive company and even institutional
levels, with proper implementations technology will have saves a notch.
While there are many reasons for using virtual computing
services, some people have gotten creative in their reasoning. Because all
applications run remotely, some users log in to the Internet to do all their
surfing through a virtual computer. This enables them to access files without
worrying about hidden pages sabotaging their system. The added benefit is
that they can surf and electronically communicate without worrying about
infected files
No comments:
Post a Comment