CTO Roundtable: Virtualization Part I
نویسندگان
چکیده
منابع مشابه
Embedded Systems Security - Part 4: I/O virtualization
Editor's Note: Embedded Systems Security aims for a comprehensive, systems view of security: hardware, platform software (such as operating systems and hypervisors), software development process, data protection protocols (both networking and storage), and cryptography. In this excerpt, the authors offer an in-depth look at the role of the operating system in secure embedded systems. In part 1,...
متن کاملI) System Virtualization
Question 1.�� System Virtualization A hot new topic in operating systems is system virtualization. While IBM has been offering its VM system for mainframes for many years, virtualization technologies are now migrating to PC architectures, including PowerPCand i86-based chips. A second trend is the development of multi-core machines, where a single chip essentially implements a small-scale multi...
متن کاملOn I/O virtualization management
The quick adoption of virtualization technology in general and the advent of the Cloud business model entail new requirements on the structure and the configuration of back-end I/O systems. Several approaches to virtualization of I/O links are being introduced, which aim at implementing a more flexible I/O channel configuration without compromising performance. While previously the management o...
متن کاملPower-Aware I/O Virtualization
Power consumption is one of the key concerns in modern computers within which I/O consumes a significant portion of power, from portable devices to servers. This concern has led to the development of various hardware and software techniques to improve the energy efficiency of I/O subsystems in the native platform. However, virtualization poses new challenges, preventing those techniques from ac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Queue
سال: 2009
ISSN: 1542-7730,1542-7749
DOI: 10.1145/1508211.1508219