Content deleted Content added
Added spaces after commas |
Fabrictramp (talk | contribs) Dead-end page tagging; you can help! using AWB |
||
Line 1:
{{Advert|article|date=November 2008}}
{{deadend|date=May 2009}}
'''Virtual Lab Automation''' is refers to a category of software solutions to automate IT labs using virtualization technology. Virtual Lab Automation (VLA) solutions are available as on-premise packaged software or as a cloud service.
Line 10:
==Solutions==
Virtual labs are used for sales, testing, demos, training, development and certification of software and hardware solutions.The main potential business benefits are reduced labor and hardware costs,faster response times to customers and channels, improved testing reliability and simple access to complex configurations.
==Capabilities==
A virtual lab automation solution typically includes the following capabilities:
===Resource Pooling and Provisioning===
Resource pooling enables processing power, storage and networking infrastructure to be shared between different teams and individuals, increasing utilization and availability of resources, and reducing costs. In conjunction with resource pooling, an orchestration and provisioning process allocates and releases resources as needed.
===Complex Multi-Machine Configurations===
Line 25 ⟶ 24:
===Configuration Library===
A configuration library allows a team to manage and organize virtual images and configurations. Standard builds and images can be created and made available to development and QA teams to save hours of set-up time and environment configuration.
===Life cycle Management===
The ability to suspend a complete state of a multi-machine configuration and make a snapshot (a copy at a point in time) is a major benefit of virtualization. This is especially useful for application development teams because when a bug is found a configuration snapshot to be taken at the point of failure and a link to the configuration added to a defect report. Instead of a developer spending hours to reproduce the defect, he or she can restore the configuration and start debugging the issue within minutes.
The ability to control the life cycle automatically is beneficial for web based service. For example, an environment can run for two hours and than automatically be archived to disk.this reduces the costs of running the environments and allows for multiple business scenarios.
===Scheduling and Reservations===
Line 41 ⟶ 40:
===Security===
Security features include access and roles management, permissions and authentication. Some services allow dynamic roles assignment ( for example, vendor and channel) or hierarchy ( manager and employee ).Since replicated guests have identical user names and passwords, those need customization for public services.
===Remote Access and Visualization===
Remote access to the system (for instance for an outsourced vendor) is usually managed through secure connections via encrypted protocols and virtual private networking.
Access to identical copies of configurations over the internet requires a method to authenticate traffic at the application level while guarantees it is tunneled only to the relevant environment.
Typically the lab environments are visualized over the web to demonstrated the multi-server topologies and logical relationship.
===Administration ===
|