Knowledge

Hardware virtualization

Source 📝

434:(DR) plan is often considered good practice for a hardware virtualization platform. DR of a virtualization environment can ensure high rate of availability during a wide range of situations that disrupt normal business operations. In situations where continued operations of hardware virtualization platforms is important, a disaster recovery plan can ensure hardware performance and maintenance requirements are met. A hardware virtualization disaster recovery plan involves both hardware and software protection by various methods, including those described below. 300: 1637: 38: 1649: 241:
A virtual machine can easily be relocated from one physical machine to another as needed. For example, a salesperson going to a customer can copy a virtual machine with the demonstration software to their laptop, without the need to transport the physical computer. Likewise, an error inside a virtual
417:
In operating-system-level virtualization, a physical server is virtualized at the operating system level, enabling multiple isolated and secure virtualized servers to run on a single physical server. The "guest" operating system environments share the same running instance of the operating system as
799:
Surprisingly, we find that the first-generation hardware support rarely offers performance advantages over existing software techniques. We ascribe this situation to high VMM/guest transition costs and a rigid programming model that leaves little room for software flexibility in managing either the
234:
A virtual machine (VM) can be more easily controlled and inspected from a remote site than a physical machine, and the configuration of a VM is more flexible. This is very useful in kernel development and for teaching operating system courses, including running legacy operating systems that do not
230:
In addition to reducing equipment and labor costs associated with equipment maintenance, consolidating servers can also have the added benefit of reducing energy consumption and the global footprint in environmental-ecological sectors of technology. For example, a typical server runs at 425 W
222:
consolidation, many small physical servers can be replaced by one larger physical server to decrease the need for more (costly) hardware resources such as CPUs, and hard drives. Although hardware is consolidated in virtual environments, typically OSs are not. Instead, each OS running on a physical
376:
In hardware-assisted virtualization, the hardware provides architectural support that facilitates building a virtual machine monitor and allows guest OSs to be run in isolation. This can be used to assist either full virtualization or paravirtualization. Hardware-assisted virtualization was first
448:
The implementation of this method will require control software and storage capacity for application and data file storage replication typically on the same site. The data is replicated on a different disk partition or separate disk device and can be a scheduled activity for most servers and is
337:
In paravirtualization, the virtual machine does not necessarily simulate hardware, but instead (or in addition) offers a special API that can only be used by modifying the "guest" OS. For this to be possible, the "guest" OS's source code must be available. If the source code is available, it is
188:
software. The guest software is not limited to user applications; many hosts allow the execution of complete operating systems. The guest software executes as if it were running directly on the physical hardware, with several notable caveats. Access to physical system resources (such as the
253:
However, when multiple VMs are concurrently running on the same physical host, each VM may exhibit varying and unstable performance which highly depends on the workload imposed on the system by other VMs. This issue can be addressed by appropriate installation techniques for
149:. Virtualization emulates the hardware environment of its host architecture, allowing multiple OSes to run unmodified and in isolation. At its origins, the software that controlled virtualization was called a "control program", but the terms " 441:
This common method can be used to store data offsite, but data recovery can be a difficult and lengthy process. Tape backup data is only as good as the latest copy stored. Tape backup methods will require a backup device and ongoing storage
208:
Virtualization often exacts performance penalties, both in resources required to run the hypervisor, and as well as in reduced performance on the virtual machine compared to running native on the physical machine.
277:
Duplicating specific environments: A virtual machine could, depending on the virtualization software used, be duplicated and installed on multiple hosts, or restored to a previously backed-up system state.
227:(P2V) transformation. The average utilization of a server in the early 2000s was 5 to 15%, but with the adoption of virtualization this figure started to increase to reduce the number of servers needed. 455:
This method ensures the highest level of disaster recovery protection for a hardware virtualization solution, by providing duplicate hardware and software replication in two distinct geographic areas.
268:
Running one or more applications that are not supported by the host OS: A virtual machine running the required guest OS could permit the desired applications to run, without altering the host OS.
338:
sufficient to replace sensitive instructions with calls to VMM APIs (e.g.: "cli" with "vm_handle_cli()"), then re-compile the OS and use the new binaries. This system call to the
907: 274:
Server virtualization: Multiple virtual servers could be run on a single physical server, in order to more fully utilize the hardware resources of the physical server.
501: 471: 223:
server is converted to a distinct OS running inside a virtual machine. Thereby, the large server can "host" many such "guest" virtual machines. This is known as
280:
Creating a protected environment: If a guest OS running on a VM becomes damaged in a way that is not cost-effective to repair, such as may occur when studying
1108: 944: 284:
or installing badly behaved software, the VM may simply be discarded without harm to the host system, and a clean copy used upon rebooting the guest .
255: 205:, or may be limited to a subset of the device's native capabilities, depending on the hardware access policy implemented by the virtualization host. 55: 721:
Smith, L.; Kägi, A.; Martins, F. M.; Neiger, G.; Leung, F. H.; Rodgers, D.; Santoni, A. L.; Bennett, S. M.; Uhlig, R.; Anderson, A. V. (May 2005).
169:
system. The creation and management of virtual machines has also been called "platform virtualization", or "server virtualization", more recently.
900: 812: 697: 884: 422:
is also used to implement the "guest" environments, and applications running in a given "guest" environment view it as a stand-alone system.
403:
In 2006, first-generation 32- and 64-bit x86 hardware support was found to rarely offer performance advantages over software virtualization.
1482: 855: 102: 145:
as complete hardware platforms, certain logical abstractions of their componentry, or only the functionality required to run various
1063: 915: 630: 121: 74: 1675: 675: 371: 81: 754: 307:
In full virtualization, the virtual machine simulates enough hardware to allow an unmodified "guest" OS designed for the same
1622: 521: 59: 782: 937: 351: 88: 1429: 987: 579: 856:"Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take" 70: 1652: 466: 837: 1447: 496: 343: 1641: 1547: 1098: 1083: 930: 526: 992: 604: 419: 412: 271:
Evaluating an alternate operating system: The new OS could be run within a VM, without altering the host OS.
48: 1078: 1038: 661: 481: 476: 190: 1487: 1477: 1251: 1133: 1123: 1048: 1017: 1012: 1007: 982: 355: 320: 238:
A new virtual machine can be provisioned as required without the need for an up-front hardware purchase.
819: 707: 702: 722: 392:
developed additional hardware to support virtualization ran on their platforms. Sun Microsystems (now
1216: 1103: 1002: 997: 977: 967: 894: 95: 1442: 1264: 881: 727: 550: 294: 224: 299: 1399: 486: 393: 332: 219: 1452: 1314: 1309: 1113: 972: 626: 516: 511: 431: 246: 202: 1582: 1241: 1156: 1088: 736: 242:
machine does not harm the host system, so there is no risk of the OS crashing on the laptop.
146: 862: 1577: 1527: 1344: 1334: 953: 888: 506: 308: 194: 162: 17: 813:"The One Essential Guide to Disaster Recovery: How to Ensure IT and Business Continuity" 1462: 1379: 1289: 1093: 1033: 138: 679: 646: 1669: 1437: 1284: 1274: 1259: 1236: 1184: 1141: 1058: 1043: 165:(sometimes called "pseudo machine"), a term which itself dates from the experimental 1607: 1567: 1467: 1457: 1359: 1211: 1201: 1161: 491: 660:
Rajesh Chheda; Dan Shookowsky; Steve Stefanovich; Joe Toscano (14 January 2009).
201:
processor and system-memory. Guests are often restricted from accessing specific
1492: 1299: 1053: 791: 249:
scenarios without concerns with impact of refurbished and faulty energy sources.
166: 37: 1612: 1597: 1557: 1497: 1414: 1394: 1384: 1364: 1349: 1319: 1304: 1221: 693: 339: 150: 381:
processors in 1980, with the Start Interpretive Execution (SIE) instruction.
1562: 1522: 1502: 1472: 1419: 1374: 1329: 1279: 1231: 1196: 1179: 1174: 245:
Because of this ease of relocation, virtual machines can be readily used in
350:; it is implemented via a DIAG ("diagnose") hardware instruction in IBM's 1532: 1339: 1269: 1206: 1189: 1168: 1073: 397: 378: 311:
to be run in isolation. This approach was pioneered in 1966 with the IBM
142: 740: 1592: 1572: 1542: 1537: 1369: 1354: 1294: 1226: 1146: 1118: 841: 784:
A Comparison of Software and Hardware Techniques for x86 Virtualization
281: 1617: 1587: 1552: 1517: 1512: 1409: 1404: 1324: 1151: 172:
Platform virtualization is performed on a given hardware platform by
908:"Using a hypervisor to reconcile GPL and proprietary embedded code" 1602: 1507: 1389: 922: 385: 316: 312: 298: 161:
The term "virtualization" was coined in the 1960s to refer to a
926: 580:"Virtual Machines: An Introduction to Platform Virtualization" 557: 389: 347: 231:
and VMware estimates a hardware reduction ratio of up to 15:1.
31: 197:) is generally managed at a more restrictive level than the 756:
IBM System/370 Extended Architecture Interpretive Execution
153:" or "virtual machine monitor" became preferred over time. 261:
There are several approaches to platform virtualization.
790:. ASPLOS’06. San Jose, California, USA. Archived from 438:
Tape backup for software data long-term archival needs
180:), which creates a simulated computer environment, a 625:. San Rafael, CA: Morgan & Claypool Publishers. 621:
Bugnion, Edouard; Nieh, Jason; Tsafrir, Dan (2017).
1428: 1250: 1132: 1026: 960: 62:. Unsourced material may be challenged and removed. 662:"Profiling Energy Usage for Efficient Consumption" 762:(First ed.). IBM. January 1984. SA22-7095-0 623:Hardware and software support for virtualization 449:implemented more for database-type applications. 27:Virtualization of computers or operating systems 781:Keith Adams; Ole Agesen (21–25 October 2006). 551:"The Origin of the VM/370 Time-sharing System" 502:Popek and Goldberg virtualization requirements 472:Comparison of platform virtualization software 938: 818:. Vision Solutions, Inc. 2010. Archived from 8: 945: 931: 923: 616: 614: 426:Hardware virtualization disaster recovery 256:temporal isolation among virtual machines 122:Learn how and when to remove this message 800:frequency or cost of these transitions. 538: 303:Logical diagram of full virtualization. 676:"VMware server consolidation overview" 445:Whole-file and application replication 264:Examples of virtualization use cases: 407:Operating-system-level virtualization 7: 1648: 838:"Disaster Recovery Planning Process" 544: 542: 60:adding citations to reliable sources 696:; Ozgur Can Leonard (August 2000). 897:, ACM, 2003, by a group of authors 396:) added similar features in their 358:(which was the origin of the term 25: 1064:Distributed file system for cloud 993:Integration platform as a service 906:Zoppis, Bruno (27 August 2007) . 895:Xen and the Art of Virtualization 882:An Introduction to Virtualization 723:"Intel virtualization technology" 1647: 1636: 1635: 605:"What is Server Virtualization?" 452:Hardware and software redundancy 418:the host system. Thus, the same 372:Hardware-assisted virtualization 366:Hardware-assisted virtualization 36: 578:Thomson, Julian (23 May 2018). 47:needs additional citations for 1623:Virtual Private Cloud OnDemand 861:. VMware. 2010. Archived from 522:Virtualization for aggregation 1: 901:Linux Virtualization Software 988:Infrastructure as a service 342:is called a "hypercall" in 1692: 467:Application virtualization 410: 369: 330: 292: 213:Reasons for virtualization 1631: 1448:Abiquo Enterprise Edition 497:Instruction set simulator 193:, display, keyboard, and 71:"Hardware virtualization" 18:Virtualization technology 1084:Native cloud application 647:"Chip Aging Accelerates" 527:Workspace virtualization 235:support modern hardware. 1676:Hardware virtualization 1608:Virtual Machine Manager 1069:Hardware virtualization 887:22 October 2020 at the 420:operating system kernel 413:OS-level virtualization 135:Hardware virtualization 1079:Mobile cloud computing 1049:Cloud storage gateways 1039:Cloud-native computing 482:Dynamic infrastructure 477:Desktop virtualization 319:, predecessors of the 304: 1124:Virtual private cloud 1018:Software as a service 1013:Security as a service 1008:Platform as a service 983:Function as a service 868:on 23 September 2010. 549:Creasy, R.J. (1981). 302: 1104:Serverless computing 1003:Network as a service 998:Backend as a service 978:Desktop as a service 968:Content as a service 918:on 24 December 2013. 710:on 22 November 2019. 584:Performance Software 400:processors in 2005. 56:improve this article 1443:Amazon Web Services 1265:Amazon Web Services 797:on 8 January 2022. 741:10.1109/MC.2005.163 649:. 14 February 2018. 398:UltraSPARC T-Series 295:Full virtualization 289:Full virtualization 225:Physical-to-Virtual 1400:SAP Cloud Platform 1109:Structured storage 844:on 15 August 2012. 703:Dr. Dobb's Journal 698:"Examining VMware" 682:on 8 January 2022. 487:Hardware emulation 394:Oracle Corporation 384:In 2005 and 2006, 377:introduced on the 333:Paravirtualization 327:Paravirtualization 305: 203:peripheral devices 1663: 1662: 1315:Google App Engine 1114:Virtual appliance 973:Data as a service 517:Virtual appliance 512:Thin provisioning 432:disaster recovery 247:disaster recovery 147:operating systems 132: 131: 124: 106: 16:(Redirected from 1683: 1651: 1650: 1639: 1638: 1583:Safe Swiss Cloud 947: 940: 933: 924: 919: 914:. Archived from 870: 869: 867: 860: 852: 846: 845: 840:. Archived from 836:Wold, G (2008). 833: 827: 826: 824: 817: 809: 803: 802: 796: 789: 778: 772: 771: 769: 767: 761: 751: 745: 744: 718: 712: 711: 706:. Archived from 690: 684: 683: 678:. Archived from 672: 666: 665: 657: 651: 650: 643: 637: 636: 618: 609: 608: 601: 595: 594: 592: 590: 575: 569: 568: 566: 564: 555: 546: 127: 120: 116: 113: 107: 105: 64: 40: 32: 21: 1691: 1690: 1686: 1685: 1684: 1682: 1681: 1680: 1666: 1665: 1664: 1659: 1627: 1578:Rackspace Cloud 1528:Microsoft Azure 1424: 1345:Microsoft Azure 1246: 1128: 1022: 961:Business models 956: 954:Cloud computing 951: 905: 891:, by Amit Singh 889:Wayback Machine 878: 873: 865: 858: 854: 853: 849: 835: 834: 830: 825:on 16 May 2011. 822: 815: 811: 810: 806: 794: 787: 780: 779: 775: 765: 763: 759: 753: 752: 748: 720: 719: 715: 692: 691: 687: 674: 673: 669: 659: 658: 654: 645: 644: 640: 633: 620: 619: 612: 603: 602: 598: 588: 586: 577: 576: 572: 562: 560: 553: 548: 547: 540: 536: 531: 507:Physicalization 462: 428: 415: 409: 374: 368: 335: 329: 309:instruction set 297: 291: 218:In the case of 215: 182:virtual machine 178:control program 163:virtual machine 159: 128: 117: 111: 108: 65: 63: 53: 41: 28: 23: 22: 15: 12: 11: 5: 1689: 1687: 1679: 1678: 1668: 1667: 1661: 1660: 1658: 1657: 1645: 1632: 1629: 1628: 1626: 1625: 1620: 1615: 1610: 1605: 1600: 1595: 1590: 1585: 1580: 1575: 1570: 1565: 1560: 1555: 1550: 1545: 1540: 1535: 1530: 1525: 1520: 1515: 1510: 1505: 1500: 1495: 1490: 1485: 1480: 1475: 1470: 1465: 1460: 1455: 1450: 1445: 1440: 1434: 1432: 1430:Infrastructure 1426: 1425: 1423: 1422: 1417: 1412: 1407: 1402: 1397: 1392: 1387: 1382: 1380:PythonAnywhere 1377: 1372: 1367: 1362: 1357: 1352: 1347: 1342: 1337: 1332: 1327: 1322: 1317: 1312: 1307: 1302: 1297: 1292: 1290:Cocaine (PaaS) 1287: 1282: 1277: 1272: 1267: 1262: 1256: 1254: 1248: 1247: 1245: 1244: 1239: 1234: 1229: 1224: 1219: 1214: 1209: 1204: 1199: 1194: 1193: 1192: 1187: 1177: 1172: 1166: 1165: 1164: 1159: 1149: 1144: 1138: 1136: 1130: 1129: 1127: 1126: 1121: 1116: 1111: 1106: 1101: 1096: 1094:Personal cloud 1091: 1086: 1081: 1076: 1071: 1066: 1061: 1056: 1051: 1046: 1041: 1036: 1034:Cloud database 1030: 1028: 1024: 1023: 1021: 1020: 1015: 1010: 1005: 1000: 995: 990: 985: 980: 975: 970: 964: 962: 958: 957: 952: 950: 949: 942: 935: 927: 921: 920: 903: 898: 892: 877: 876:External links 874: 872: 871: 847: 828: 804: 773: 746: 713: 685: 667: 652: 638: 631: 610: 596: 570: 537: 535: 532: 530: 529: 524: 519: 514: 509: 504: 499: 494: 489: 484: 479: 474: 469: 463: 461: 458: 457: 456: 453: 450: 446: 443: 439: 427: 424: 411:Main article: 408: 405: 370:Main article: 367: 364: 331:Main article: 328: 325: 293:Main article: 290: 287: 286: 285: 278: 275: 272: 269: 251: 250: 243: 239: 236: 232: 228: 214: 211: 191:network access 184:(VM), for its 158: 155: 139:virtualization 130: 129: 44: 42: 35: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1688: 1677: 1674: 1673: 1671: 1656: 1655: 1646: 1644: 1643: 1634: 1633: 1630: 1624: 1621: 1619: 1616: 1614: 1611: 1609: 1606: 1604: 1601: 1599: 1596: 1594: 1591: 1589: 1586: 1584: 1581: 1579: 1576: 1574: 1571: 1569: 1566: 1564: 1561: 1559: 1556: 1554: 1551: 1549: 1546: 1544: 1541: 1539: 1536: 1534: 1531: 1529: 1526: 1524: 1521: 1519: 1516: 1514: 1511: 1509: 1506: 1504: 1501: 1499: 1496: 1494: 1491: 1489: 1486: 1484: 1481: 1479: 1476: 1474: 1471: 1469: 1466: 1464: 1461: 1459: 1456: 1454: 1451: 1449: 1446: 1444: 1441: 1439: 1438:Alibaba Cloud 1436: 1435: 1433: 1431: 1427: 1421: 1418: 1416: 1413: 1411: 1408: 1406: 1403: 1401: 1398: 1396: 1393: 1391: 1388: 1386: 1383: 1381: 1378: 1376: 1373: 1371: 1368: 1366: 1363: 1361: 1358: 1356: 1353: 1351: 1348: 1346: 1343: 1341: 1338: 1336: 1333: 1331: 1328: 1326: 1323: 1321: 1318: 1316: 1313: 1311: 1308: 1306: 1303: 1301: 1298: 1296: 1293: 1291: 1288: 1286: 1285:Cloud Foundry 1283: 1281: 1278: 1276: 1273: 1271: 1268: 1266: 1263: 1261: 1260:Alibaba Cloud 1258: 1257: 1255: 1253: 1249: 1243: 1240: 1238: 1235: 1233: 1230: 1228: 1225: 1223: 1220: 1218: 1215: 1213: 1210: 1208: 1205: 1203: 1200: 1198: 1195: 1191: 1188: 1186: 1183: 1182: 1181: 1178: 1176: 1173: 1170: 1167: 1163: 1160: 1158: 1155: 1154: 1153: 1150: 1148: 1145: 1143: 1140: 1139: 1137: 1135: 1131: 1125: 1122: 1120: 1117: 1115: 1112: 1110: 1107: 1105: 1102: 1100: 1097: 1095: 1092: 1090: 1087: 1085: 1082: 1080: 1077: 1075: 1072: 1070: 1067: 1065: 1062: 1060: 1059:Dew computing 1057: 1055: 1052: 1050: 1047: 1045: 1044:Cloud storage 1042: 1040: 1037: 1035: 1032: 1031: 1029: 1025: 1019: 1016: 1014: 1011: 1009: 1006: 1004: 1001: 999: 996: 994: 991: 989: 986: 984: 981: 979: 976: 974: 971: 969: 966: 965: 963: 959: 955: 948: 943: 941: 936: 934: 929: 928: 925: 917: 913: 909: 904: 902: 899: 896: 893: 890: 886: 883: 880: 879: 875: 864: 857: 851: 848: 843: 839: 832: 829: 821: 814: 808: 805: 801: 793: 786: 785: 777: 774: 758: 757: 750: 747: 742: 738: 734: 730: 729: 724: 717: 714: 709: 705: 704: 699: 695: 689: 686: 681: 677: 671: 668: 663: 656: 653: 648: 642: 639: 634: 632:9781627056939 628: 624: 617: 615: 611: 606: 600: 597: 585: 581: 574: 571: 559: 552: 545: 543: 539: 533: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 503: 500: 498: 495: 493: 490: 488: 485: 483: 480: 478: 475: 473: 470: 468: 465: 464: 459: 454: 451: 447: 444: 440: 437: 436: 435: 433: 425: 423: 421: 414: 406: 404: 401: 399: 395: 391: 387: 382: 380: 373: 365: 363: 361: 357: 353: 349: 345: 341: 334: 326: 324: 322: 318: 314: 310: 301: 296: 288: 283: 279: 276: 273: 270: 267: 266: 265: 262: 259: 257: 248: 244: 240: 237: 233: 229: 226: 221: 217: 216: 212: 210: 206: 204: 200: 196: 192: 187: 183: 179: 175: 170: 168: 164: 156: 154: 152: 148: 144: 140: 136: 126: 123: 115: 104: 101: 97: 94: 90: 87: 83: 80: 76: 73: –  72: 68: 67:Find sources: 61: 57: 51: 50: 45:This article 43: 39: 34: 33: 30: 19: 1653: 1640: 1568:Oracle Cloud 1488:Google Cloud 1468:DigitalOcean 1458:Citrix Cloud 1360:Oracle Cloud 1212:Proton Drive 1202:Oracle Cloud 1134:Applications 1068: 1054:Data centers 1027:Technologies 916:the original 912:Linux Gizmos 911: 863:the original 850: 842:the original 831: 820:the original 807: 798: 792:the original 783: 776: 764:. Retrieved 755: 749: 735:(5): 48–56. 732: 726: 716: 708:the original 701: 688: 680:the original 670: 655: 641: 622: 599: 587:. Retrieved 583: 573: 561:. Retrieved 492:Hyperjacking 429: 416: 402: 383: 375: 359: 336: 306: 263: 260: 252: 207: 198: 195:disk storage 185: 181: 177: 176:software (a 173: 171: 160: 134: 133: 118: 109: 99: 92: 85: 78: 66: 54:Please help 49:verification 46: 29: 1493:GreenButton 1300:Engine Yard 563:26 February 167:IBM M44/44X 1613:Wakame-vdc 1598:libguestfs 1558:OpenNebula 1498:GreenQloud 1478:Eucalyptus 1453:CloudStack 1415:vCloud Air 1385:RightScale 1365:OutSystems 1350:MindSphere 1320:GreenQloud 1222:Salesforce 1185:Office 365 1089:Networking 766:27 October 694:Jason Nieh 534:References 360:hypervisor 340:hypervisor 151:hypervisor 112:April 2010 82:newspapers 1563:OpenStack 1523:Lunacloud 1503:IBM Cloud 1473:EMC Atmos 1420:WaveMaker 1395:Force.com 1375:OpenShift 1330:IBM Cloud 1310:GE Predix 1280:CloudBolt 1252:Platforms 1232:PlateSpin 1217:Rackspace 1197:Nextcloud 1180:Microsoft 1175:IBM Cloud 1157:Workspace 442:material. 143:computers 1670:Category 1642:Category 1533:Mirantis 1340:Jelastic 1270:AppScale 1207:Owncloud 1190:OneDrive 1171:(closed) 1169:HP Cloud 1119:Web APIs 1099:Security 1074:Internet 885:Archived 728:Computer 460:See also 379:IBM 308X 323:family. 1654:Commons 1593:libvirt 1573:OrionVM 1543:Nimbula 1538:Netlify 1483:Fujitsu 1370:openQRM 1355:Netlify 1335:Inktank 1295:Creatio 1237:Workday 1227:Seafile 1147:Dropbox 282:malware 157:Concept 137:is the 96:scholar 1618:Vercel 1588:Zadara 1553:OpenIO 1548:Nimbus 1518:Linode 1513:Joyent 1410:Vercel 1405:Splunk 1325:Heroku 1305:Helion 1152:Google 629:  589:8 July 354:under 344:TRANGO 220:server 98:  91:  84:  77:  69:  1603:OVirt 1508:iland 1390:Scalr 1162:Drive 866:(PDF) 859:(PDF) 823:(PDF) 816:(PDF) 795:(PDF) 788:(PDF) 760:(PDF) 554:(PDF) 386:Intel 317:CP-67 313:CP-40 186:guest 103:JSTOR 89:books 1463:Deft 1242:Zoho 768:2022 627:ISBN 591:2023 565:2013 388:and 362:).. 346:and 315:and 199:host 174:host 75:news 1275:Box 1142:Box 737:doi 558:IBM 390:AMD 352:CMS 348:Xen 141:of 58:by 1672:: 910:. 733:38 731:. 725:. 700:. 613:^ 582:. 556:. 541:^ 430:A 356:VM 321:VM 258:. 946:e 939:t 932:v 770:. 743:. 739:: 664:. 635:. 607:. 593:. 567:. 125:) 119:( 114:) 110:( 100:· 93:· 86:· 79:· 52:. 20:)

Index

Virtualization technology

verification
improve this article
adding citations to reliable sources
"Hardware virtualization"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
virtualization
computers
operating systems
hypervisor
virtual machine
IBM M44/44X
network access
disk storage
peripheral devices
server
Physical-to-Virtual
disaster recovery
temporal isolation among virtual machines
malware
Full virtualization

instruction set
CP-40

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.