Texas College System Builds Private Cloud

A college system in Houston, TX has begun seeing big returns on its three-year long construction of a private cloud infrastructure to expedite delivery of IT services to its 62,000 students and 4,800 employees. The Lone Star College System uses products from VMware, EMC, and HP in a transformed enterprise that replaced an aging infrastructure. A private cloud is a quickly scalable computing system controlled by the organization rather than a service provider.

Lone Star said that it has reduced delivery of new IT services from three to four months down to less than a week, improved uptime dramatically, and that it will save at least $600,000 in future capital expenditures for hardware replacements.

"Our private cloud allows us to meet the needs of the business and add strategic value to the organization," said Vice Chancellor and CIO Shah Ardalan.

The work began in 2008 with consolidation of a disparate infrastructure that included six IT organizations, each with a datacenter. Now two replicating data centers loaded with HP ProLiant BL490c G6 server blades and EMC Clariion CX4 storage arrays deliver services to support the institution, which has 13 physical sites. The environment runs VMware's vSphere platform as the foundation of its cloud infrastructure, vCloud Director for resource management of the virtual machines, and vCenter Site Recovery Manager for automated disaster recovery. Of the 752 servers available in those primary data centers, 646 are virtual.

Reduction of physical servers and increased use of virtualization has enabled the college system to reduce its energy usage in those data centers by two-thirds, according to Link Alander, Lone Star's associate vice chancellor of Technology Services.

Additionally, Alander said, Lone Star has been able to "dynamically swing" IT capacity to specific areas as they require additional capacity, such as registration systems before the semester begins or grading applications as the semester ends. "We are amazingly more agile and have achieved remarkable resource utilization while spending a lot less time on administrative tasks."

"Without EMC and VMware, we couldn't have achieved our transformation to the cloud and deliver IT-as-a-service," he added. "The tight integration of...technologies combined with the expertise and support we get from [their] professional services have been critical to our adoption of cloud."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • two large brackets facing each other with various arrows, circles, and rectangles flowing between them

    1EdTech Partners with DXtera to Support Ed Tech Interoperability

    1EdTech Consortium and DXtera Institute have announced a partnership aimed at improving access to learning data in postsecondary and higher education.

  • Abstract geometric shapes including hexagons, circles, and triangles in blue, silver, and white

    Google Launches Its Most Advanced AI Model Yet

    Google has introduced Gemini 2.5 Pro Experimental, a new artificial intelligence model designed to reason through problems before delivering answers, a shift that marks a major leap in AI capability, according to the company.

  •  laptop on a clean desk with digital padlock icon on the screen

    Study: Data Privacy a Top Concern as Orgs Scale Up AI Agents

    As organizations race to integrate AI agents into their cloud operations and business workflows, they face a crucial reality: while enthusiasm is high, major adoption barriers remain, according to a new Cloudera report. Chief among them is the challenge of safeguarding sensitive data.

  • stylized AI code and a neural network symbol, paired with glitching code and a red warning triangle

    New Anthropic AI Models Demonstrate Coding Prowess, Behavior Risks

    Anthropic has released Claude Opus 4 and Claude Sonnet 4, its most advanced artificial intelligence models to date, boasting a significant leap in autonomous coding capabilities while simultaneously revealing troubling tendencies toward self-preservation that include attempted blackmail.