Browse Definitions :
Definition

differencing disk

Contributor(s): Anil Desai

A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system. The purpose of differencing disks is to make it possible to maintain information about changes made so that they can be reversed if necessary.

Differencing disks are based on either a fixed-size or dynamically expanding VHD and can be configured with parent-child relationships to form a hierarchy of VHD types. The disks store all of the changes that would otherwise be written to the parent VHD.  However, it's important to remember that, as a rule, any VHD that serves as a parent must remain read-only.

Differencing disks can increase manageability, especially when multiple VMs share a similar configuration, and can dramatically reduce the amount of disk space required on a Virtual Server host computer. The drawbacks are that differencing disks can be difficult to manage and large hierarchies of disks can potentially lead to performance problems, especially if all of the physical VHD files are located on the same disks or arrays. Within Virtual Server, you can merge a differencing disk with its parent -- an operation that commits all the changes and either updates the base VHD or creates a new VHD file.

This was last updated in April 2013

Continue Reading About differencing disk

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple ...

Close