background preloader

Hypervisor

Hypervisor
A hypervisor or virtual machine monitor (VMM) is a piece of computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor is running one or more virtual machines is defined as a host machine. Each virtual machine is called a guest machine. The hypervisor presents the guest operating systems with a virtual operating platform and manages the execution of the guest operating systems. Classification[edit] Type-1 and type-2 hypervisors In their 1974 article "Formal Requirements for Virtualizable Third Generation Architectures" Gerald J. Type-1: native or bare-metal hypervisors These hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems. Type-2: hosted hypervisors These hypervisors run on a conventional operating system just as other computer programs do. However, the distinction between these two types is not necessarily clear. Mainframe origins[edit] Unix and Linux servers[edit]

Terminology - Novell Virtualization Platform Please use the Edit tab to make any corrections or helpful additions to this page. If you have questions or suggestions, please use the Discussion tab. Thanks. Block Device - Data storage devices, such as CD-ROM drives or disk drives, that move data in the form of blocks. Partitions and volumes are also considered block devices. Bridged Networking - A type of network connection that lets a virtual machine be identified on an external network as a unique identity that is separate from and unrelated to its host computer. 11 Top Open-source Resources for Cloud Computing digg Open-source software has been on the rise at many businesses during the extended economic downturn, and one of the areas where it is starting to offer companies a lot of flexibility and cost savings is in cloud computing. Cloud deployments can save money, free businesses from vendor lock-ins that could really sting over time, and offer flexible ways to combine public and private applications. The following are 11 top open-source cloud applications, services, educational resources, support options, general items of interest, and more. Eucalyptus. Red Hat’s Cloud. Traffic Server. Cloudera. Puppet. Enomaly. Joyent. Zoho. Globus Nimbus. Reservoir. OpenNebula. It’s good to see open-source tools and resources competing in the cloud computing space.

Convirture and Eucalyptus Systems to partner on open-source, cloud management Later this week, sources tell me that Convirture, maker of open source-based virtualization management software, will announce a very close partnership with Eucalyptus Systems, creators of the eponymous private cloud platform. The agreement will have the two companies working together to integrate ConVirt 2.0 Enterprise with both Eucalyptus' open-source cloud platform and Eucalyptus Enterprise Edition. In addition, the two companies will cooperate on sales, marketing and support activities. ConVirt 2.0 Enterprise is meant to provide Eucalyptus private cloud users with management capabilities that were previously only available on closed-source products. ConVirt software manages virtual and private-cloud environments based on open platforms such as Linux, Xen and KVM. In an as yet unreleased statement, Matt Reid, vice president of sales and marketing at Eucalyptus Systems, says. Convirture seems to work well for its customers.

Home » OpenStack Open Source Cloud Computing Software Running a Web service on Google App Engine App Engine is Google's service for building Web applications in the cloud. The initial version only supported Python, but Java servlet support has recently entered early release. Developers can experiment with a quota of free resources, so naturally I was interested. I downloaded the software development kit (SDK) Version 1.2.1 and got the Google plug-in for Eclipse 3.4.2. Documentation for the Java version has not quite caught up with the quality of the Python documentation, but you'll find what you need with a little digging. The runtime environment for the App Engine is Java 6 with the standard libraries. Resources that are private to the application and are only read, never written, such as jar libraries, class files and configuration files, are stored under the usual "/WEB-INF" directory. Scaling to an increased user-request load is handled automatically by creating new instances of an application and removing them when the load decreases. By default, your The Java Persistance API

Secure Shell Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH client programs, respectively.[1] The protocol specification distinguishes between two major versions that are referred to as SSH-1 and SSH-2. The best-known application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used in a similar fashion for accounts on Windows. Definition[edit] SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary.[1] There are several ways to use SSH; one is to use automatically generated public-private key pairs to simply encrypt a network connection, and then use password authentication to log on. Key management[edit] Usage[edit]

Cloud computing development for beginners When you register, my team of editors will also send you alerts about public, private and hybrid cloud computing as well as other related technologies. Many organizations are turning to Platform as a Service offerings for their cloud needs. Our expert compares and contrasts the major options from Google, Microsoft and Amazon . Curious about how Azure works? Microsoft technical fellow Mark Russinovich offered a detailed overview of the cloud platform's innards . What cloud computing features will excite Java developers the most? With all of the options available to developers interested in creating cloud-based applications, it can be tough to make a choice. In just over a year, Microsoft's deep pockets and commitment to cloud strategies have established Azure as a major player in the development world. Developing Java applications in the cloud requires a different set of skills presents a whole new set of challenges. What's the big deal about Joyent launching a new PaaS offering ?

Amazon Architecture This is a wonderfully informative Amazon update based on Joachim Rohde's discovery of an interview with Amazon's CTO. You'll learn about how Amazon organizes their teams around services, the CAP theorem of building scalable systems, how they deploy software, and a lot more. Many new additions from the ACM Queue article have also been included. Amazon grew from a tiny online bookstore to one of the largest stores on earth. Site: Information Sources Early Amazon by Greg Linden How Linux saved Amazon millions Interview Werner Vogels - Amazon's CTO Asynchronous Architectures - a nice summary of Werner Vogels' talk by Chris Loosley Learning from the Amazon technology platform - A Conversation with Werner VogelsWerner Vogels' Weblog - building scalable and robust distributed systemsPlatform Linux Oracle C++ Perl Mason Java Jboss ServletsThe Stats More than 55 million active customer accounts.

Rational Survivability: The Big Four Cloud Computing Providers: Security Compared (Part I) James Urquhart posted a summary a week or so ago of what he described as the "Big 4" players in Cloud Computing. It was a slightly humorous pass at describing their approaches and offerings: Below is a table that lists these key players, and compares their offerings from the perspective of four core defining aspects of clouds. As this is a comparison of apples to oranges to grapefruit to perhaps pastrami, it is not meant to be a ranking of the participants, nor a judgement of when to choose one over the other. Instead, what I hope to do here is to give a working sysadmin's glimpse into what these four clouds are about, and why they are each unique approaches to enterprise cloud computing in their own right. James provided quite a bit more (serious) detail in the text below his table which I present to you here, tarted up with a column I've added and James left off titled "Security." /Hoff P.S.

Cloud disrupts, creates channel opportunities | The Wisdom of Clouds If you are a value-added reseller or systems integrator today--a member of the so-called "channel"--you are keenly aware of the new reality that cloud computing is bringing to bear. In cloud, your traditional technology suppliers are now interfacing directly with the customer, and the channel's "value add" of customer relationship management, technology delivery, and solutions development is being seriously threatened. Or at least so it seems on the surface. Bittman wrote one of the most concise descriptions of the channel's situation that I have read to date: Two things are becoming increasingly clear to me: the channel will be critical in broader adoption of cloud computing (and private cloud), and the channel is not ready to do this. The days of the VAR as a general contractor for IT systems construction aren't going away, but they are changing significantly. This isn't new news, of course. "We think there's a potential [that our channel will be affected]. I would simply add two more:

Hypervisor: Hardware that allows multiple operating systems to share a single host. The hypervisor sits at the lowest levels of the hardware environment and uses a thin layer of code in software to enable dynamic resource sharing. The hypervisor makes it seem like each operating system has the resources all to itself.

Found in: Hurwitz, J., Nugent, A., Halper, F. & Kaufman, M. (2013) Big Data For Dummies. Hoboken, New Jersey, United States of America: For Dummies. ISBN: 9781118504222. by raviii Jan 1

Related: