What are the limits of traditional desktop virtualization? BLACK BOX

Size: px
Start display at page:

Download "What are the limits of traditional desktop virtualization? BLACK BOX"

Transcription

1 What are the limits of traditional desktop virtualization? BLACK BOX The benefits of using VirtuaCore technology as part of a strategy to reduce costs. VirtuaCore Opti-WAN blackbox.com Opti-Net

2 Table of Contents Introduction... 3 Desktop Virtualization Explained... 4 How Is It Done?... 4 Security Issues... 5 The Technology of VirtuaCore... 5 High-Performance Communication... 5 Device Sharing... 5 Security Policies... 5 Trusted Computing Base... 5 Small Trusted Computing Base... 6 The Future: Many Cores... 6 Building Value Computer Sharing and VirtuaCore Control Kernel Technology... 6 VirtuaCore Applied in Real-World Applications... 7 How It Works... 7 Why It s An Ideal Solution for Schools... 8 About Box Network Services... 9 We re here to help! If you have any questions about your application, our products, or this white paper, contact Box Tech Support at or go to blackbox.com and click on Talk to Box. You ll be live with one of our technical experts in less than 30 seconds blackbox.com Page 2

3 Introduction Personal computer (PC) replacement and/or cost reduction strategies that use thin client/server-based computing solutions have been a hot topic for enterprises for quite some time. Technologies that drive these solutions include Citrix, Microsoft Terminal Services, and other terminal-based inventions. Although they have the ability to greatly reduce acquisition and operating costs, thin client/server-based computing does not have the same capabilities as a standard PC and usually requires the support of a complex data center. True computer sharing, as defined in this paper, will become an important and very different strategy in this area of enterprise solutions and even, as it will be shown, important to the non-enterprise. Computer sharing, as defined herein, is not a thin client, nor is it a clever server, nor is it fast user switching. These technologies lack the ability to provide smooth 32-bit video, are unable to launch applications that aren t designed to be launched with multiple and concurrent users, pirate software, and require more technology to manage. So by being inherently limited, these technologies cannot be true replacements for PCs. On the other hand, computer sharing like that of Box s VirtuaCore, which uses a containerized operating system for simultaneous use by multiple concurrent users, does provide all the benefits an actual PC but without a dedicated PC or any other thin hardware. Accomplishing this, computer sharing using VirtuaCore containerized system technology defines a new method of desktop virtualization spawned from a PC, unlike traditional desktop virtualization that originated with a server. It is, therefore, critical for customers evaluating the various technologies to understand the power and limitations of traditional desktop virtualization in this space and to accurately evaluate what technology is suitable for their applications. There are inherent differences between the server based style of desktop virtualization or traditional desktop virtualization (like VMware or Xen ) and desktop virtualization as it applies to computer sharing or computer sharing systems. The limitations of traditional virtualization approaches will be discussed, specifically as it applies to computer sharing systems and why they are not suitable as an add-on for these computer sharing systems. These limitations relate to the highly-integrated nature of computer sharing systems and their particular reliability and security requirements. An explanation of how to use a control kernel as a specific approach to new desktop virtualization will also be discussed, as well as why this approach is the only suitable solution for computer sharing systems. It will detail how a control kernel, especially what s used in Box s VirtuaCore, overcomes the limitations of plain virtualization. Finally, we ll move beyond the technical subject matter to discuss how VirtuaCore technology can be applied in real-world applications. Specifically, we ll it has been developed as a desktop virtualization solution for K 12 educators looking to cut PC hardware and maintenance costs blackbox.com Page 3

4 Desktop Virtualization Explained A virtual machine (VM) typically used in traditional virtualization provides an environment allowing an operating system to run as an application on another piece of software. To the VM, this base software appears as if it is a piece of hardware; this is known as emulation. On the other hand, a control kernel can run as if on bare hardware. In the control kernel environment, such a VM is an efficient, isolated duplicate of the real machine. The control kernel presents an interface that looks like real hardware to the guest operating system. The control kernel has several important characteristics: 1. The control kernel provides an environment that uses as much of the original machine as possible. It is essentially identical with the original machine. 2. Overhead to run the virtual machine is very low. Programs run in this environment show very little decrease in apparent speed. 3. The control kernel is in complete control of system resources. All three of these characteristics are important. The first characteristic ensures that most of the components of the real machine are the same as the components of the VM. This enables the same driver code to work for the control kernel and the VM, and is directly related to the second characteristic. Good efficiency ensures the desktop virtualization is usable from the customer s point of view. The ability of the control kernel to control the system resources completely prevents any software from breaking out of the VM. How Is It Done? First, it is important not to use emulation, like that provided by QEMU, bochs, or Virtual PC. Because resources are already shared across multiple seats, any further resource inefficiency will adversely affect the user experience by slowing applications. To be efficient, the vast majority of instructions must be directly executed by the hardware; every interpretation replaces one virtual machine instruction with many instructions, requiring the virtual hardware to be identical to the physical hardware on which the VM is hosted. These instructions, which access physical resources, are intercepted by the VM monitor. Examples of acceptable differences in the instructions include: Different memory-management units The virtual machine may be an older version of the same basic architecture of the host PC and used to run legacy code The virtual machine may be a not yet implemented newer version of the host PC architecture. As long as the differences are small and the different instructions are not constantly used, the desktop virtualization can be almost as efficient as if the hardware was the same. Any other differences in the directions are not acceptable. The VM executes most instructions directly. In some cases, this may cause an exception, which invokes the control kernel interpreting the instruction. Because the virtual machine s code is now executing in a non-privileged execution mode on the processor, pure desktop virtualization is achieved. Almost all contemporary systems allowed sensitive instructions that were not privileged to run on the physical, rather than the virtual, machine, causing kernel traps and context errors, not exceptions. This has been addressed by all major processor manufacturers. They have added virtualization extensions that enable the processor to be run in a manner that forces all sensitive instructions to cause exceptions. Unfortunately, this doesn t allow multiple operating systems to run natively they must be controlled by a virtual machine monitor. Ultimately, the fewer exceptions occurring, the better the environment. Exceptions are expensive and will completely drain the pipeline, delaying processing. Some processors have exception costs that run into the hundreds of CPU cycles. The two classes of instructions that must be handled by the VM are control-sensitive and behavior-sensitive instructions. Controlsensitive instructions control the machine, and, therefore, interfere with the control kernel s control over resources. Behavior-sensitive instructions read the state of the machine, indicating the status of resources, and do not change the resources or their allocations, which enables the instructions to understand what is real and what is virtual. It is important that code running in the VM does not execute sensitive instructions. The control kernel is what ensures that doesn t happen blackbox.com Page 4

5 Security Issues Desktop virtualization is used as a method of enhancing security. A virtual machine is, by definition, a subsystem, and as such, it cannot interfere with other subsystems. Desktop virtualization protects critical subsystems, such as the control kernel stack, from a compromised application not procured from a trusted source. CPU core affinities can be set and allow each VM to have its own CPU core, but this threat is relevant even if the application OS runs on its own processor core. If the operating system is compromised by a buffer or stack overflow, any software running on top of it can be compromised. Other subsystems can be protected by this VM in a properly built control kernel. The Technology of VirtuaCore. Historically, many aspects of computer sharing virtualization have proven to be difficult and seemingly impossible to solve, including high-performance communication, device sharing, security policies, dealing with a trusted computing base, and ensuring the trusted computing base remains small. The technology used by Box s VirtuaCore overcomes all of these issues. It is based on the kernel and usermode policy module, making it the total trusted computing base. As code progresses, more is possible. The inherent efficiency of the VirtuaCore code base makes it possible to use mathematical algorithms to enhance the speed and efficiency of the code. High-Performance Communication Tight cooperation requires highly efficient communication between the VM and the host PC. This concept differs from the virtual machine model, in which each VM is considered a system of its own communicating with other systems via file systems or networks. The communication required between components of a computer sharing system uses shared memory and low-latency signaling, demands that simply do not fit the virtual machine model. This communication requirement has many aspects. The first requirement is the bulk data transfer between subsystems, such as a media file downloaded via the communications subsystem and displayed by a media player. It is important for overall performance, as well as energy conservation, that such data is not copied unnecessarily. This is normally achieved by depositing it in a shared buffer (securely) between subsystems. Although this is not currently supported by the virtual-machine model, VirtuaCore technology provides a method within the concurrent computer sharing model to allow sophisticated communication. Device Sharing Integrating multiple virtual machines requires the sharing of physical devices, which must be accessed in a controlled manner by different VMs and their associated subsystems. A desktop virtualization approach supports running device drivers in their native (guest) OS, but this means a device is owned by a particular guest and not accessible by others, and the guest is trusted to drive the particular device. Security Policies Even though virtualization helps to separate different guest operating systems, it does not address security requirements by itself. And even though subsystems must communicate effectively, virtualization must be disabled where it is not needed. If it is not disabled, there could be a leakage of critical information. Specifically, it is absolutely necessary to deliver well-defined security policies defining which communication is allowed across components. Trusted Computing Base Many computer sharing systems contain highly security-critical components caused from multiple guest VMs running on the same real machine. Each VM must be particularly well-protected from security compromises. Because almost all software contains bugs, it is important to reduce the security exposure as much as possible by minimizing the amount of code upon which the VMs operate. Due to its extreme importance, VirtuaCore s mechanism is highly optimized for minimal latency and maximum efficiency. The control kernel provides the right mechanisms for efficiently supporting desktop virtualization and it serves as the virtual machine manager, catching desktop virtualization traps. Unlike other virtualization approaches, VirtuaCore s control kernel forwards the exception to a user-mode desktop virtualization component, recompiling the code for future use or forcing it to run in Ring blackbox.com Page 5

6 Small Trusted Computing Base Virtually all of the VirtuaCore code is built outside of the operating system core. When Linux is used, the kernel itself can be made very small and efficient around 16,000 lines enforcing a strict separation of policies and mechanisms. It also ensures high security and helps to prevent denial of service attacks as well as minimizes the amount of code to be trusted. In contrast to plain virtualization approaches designed to be always used with a guest OS underneath any other software, the amount of trusted user-mode code can be kept much smaller. The Future: Many Cores. Many questions exist when contemplating the future of computer sharing systems: How are computer sharing systems and desktop virtualization going to impact control kernel technology? Will control kernel technology become more or less relevant and what is needed to keep it relevant? Is this technology heading in the right direction? One thing that is a certainty is that PCs are becoming much more powerful through the addition of more cores to the CPU. The problem with multiple cores in competing technology is the inability of the application software to use these cores effectively. Multi-core chips are already common in high-end computing systems and manycores (chips containing 16 or more CPUs) are only a few years away. While legacy operating systems will find it increasingly hard to scale to such chips, the VirtuaCore control kernel technology automatically utilizes these cores and partitions the chip into subdomains containing a small or moderate number of processors handled by a single guest OS. In addition, testing has shown that a PC equipped with VirtuaCore desktop computer sharing technology and an Intel Quad Core processor has enough excess capacity to host many stations while still maintaining normal performance. The results are quite a contrast to other product solutions such as thin clients and blade PCs that significantly limit performance and are also tied to complicated servers. The VirtuaCore solution is a standalone hardware-savings solution that does not need the help of other thin devices or servers. Building Value Computer Sharing and VirtuaCore Control Kernel Technology. In an environment of almost bare metal desktop virtualization, the guest OS is the lowest layer of software on which everything else is built. Everything depends on it. It is absolutely essential that computer sharing system developers understand how control kernel technology will meet the challenges of the future. When considering desktop virtualization technology, this understanding doubles in importance. Technology requires control kernel technology to adapt to future challenges. VirtuaCore s technology is unique in several related respects: The underlying open-source technology has a long track record of research, development, and testing unmatched by competing products. Testing has demonstrated how this code base can be scaled to quad-core processors and beyond. The components are evolving and a new, lightweight component technology aimed specifically at computer sharing systems has been developed. These components are the basis for delivering a modern software-engineering framework, along with the control kernel, that will support even higher performance, excellent fault tolerance, and security. It is important that results are tested, verified, and ushered (when finished) through triple redundant tollgate procedures using basic operation and installation verification testing, unit testing, regression testing, and failover testing. Verification is also enabled by the efficient and disciplined design of the VirtuaCore control kernel. Most testing is performed for code running on bare metal. It is difficult to test code running on a virtual machine, even if most of the VM is running on bare metal. This is being addressed by examining the methods of running complete timing analyses on the underlying code, which would give the ability to guarantee speeds approaching real-time. As development progresses, the current code base will ultimately be replaced with a security enhanced kernel, such as SELinux, and a smooth upgrade path to this advanced technology will be provided blackbox.com Page 6

7 VirtuaCore Applied in Real-World Applications. How It Works. The VirtuaCore solution from Box works as a computer add-on and will have both hardware and software components. Hardware components consist of a multi-head video card and a connection hub. The VirtuaCore video card is installed into the PCI express slot of a computer, whereby multiple display monitors are then connected. Then, a separate VirtuaCore hub connects via a USB cable to link multiple keyboards, mice, and audio. The software that drives VirtuaCore consists of an open sourced Linux based kernel and other proprietary software that actually containerizes multiple operating systems (OS) and keeps them separate and dedicated for each user. If four users are set up, four versions of Vista, for instance, will need to be installed. The wall between the containers is so effective that each OS thinks that it is the only OS on the system and works exactly as expected. Because the operating systems are running concurrently, there are no delays, buffering, booting, or tiling of windows required. The coordination for all inputs and outputs is controlled by the VirtuaCore technology, but all other functions are controlled by the hosted OS, as normal. This means that Vista or Mac OS X works the same on the VirtuaCore desktop as it does on any other desktop. In addition, with VirtuaCore, video is transferred via a standard video connection (as opposed to a thin client), which means resolution and speed are maintained. This is not a clever Remote Desktop Protocol (RDP) or Citrix workaround, but a true CPU sharing technology that lets all connected terminals behave like they have dedicated computers. Workstation 4-port USB Hub VirtuaCore (VC004A) The VirtuaCore Computer Sharing system includes the Cube, a 4-port USB hub, a PCI video card, an adapter, cables, and an installation CD-ROM. Workstation CPU Workstation VirtuaCore (VC004A) 4-port USB Hub Workstation VirtuaCore 2-User Cube (VC002A), in middle of desk, enables one CPU to power two separate and fully functioning workstations with their own monitors, keyboards, and mice blackbox.com Page 7

8 Why It s An Ideal Solution for Schools. The problem: As educators work to prepare children for the 21st century, the introduction of new technology into schools has become a major initiative. However, many schools have adopted the latest technologies only to experience unforeseen problems. Even with the introduction of laptop computers a seemingly safe integration of technology into curriculum problems have arisen, overshadowing the benefits of technology itself. The key, it seems, is to introduce appropriate technologies that can match expectations such as meeting curriculum goals or reducing resources. Determining what technology is appropriate can be a daunting task, however, especially when the selection is so vast and the dollars limited. School administrators, for instance, do not have an easy task when variables such as current mandates, affordability, and available resources are considered. The solution: VirtuaCore is product that addresses these problems. It came about as the result of developers looking for technology tools that enable schools to achieve high-priority K 12 initiatives such as 1:1 computing, project-based learning, and lab-based learning. In doing this, they focused on not the latest pocket-sized appliances, but the venerable desktop computer. As a desktop computer sharing solution, VirtuaCore leverages the attributes that still make the desktop desirable to schools. These attributes are: the power to run a full OS, run all applications (including ILS), controllability (where are all those laptops?), and easy maintenance. VirtuaCore is implemented in schools via a computer hardware and software peripheral that enables standard desktop computers to host independent terminals. This is much like what a main frame computer does best, but on a personal scale. When used for a table cluster of PC or Mac computers, one desktop computer can host up to four terminal stations without any perceived loss in performance. For the 1:1 computing initiative, for example, a school with a student to computer ratio of 16:1 can add VirtuaCore and achieve a 4:1 ratio immediately with about half the cost as purchasing a computer for each student. Field tested, too. In practice, the VirtuaCore solution has found a perfect home in K 12 school systems, where computers are normally found in clusters that can easily take advantage of what we call community computing, or the collaborative learning process with the computer as the main tool. A typical K 12 setup consists of a cluster of four computers set up on one table in a classroom or a lab. Not only does this table usually represent approximately $3000 or more worth of hardware, but also four separate computers that need to be maintained and commissioned. Using VirtuaCore, there is one desktop connected to four terminals. The cost now decreases to approximately $1600, and hardware, maintenance, and commissioning have been reduced by as much as 50%. Tailored especially for schools. Because it was created to support 1:1 computer initiatives in classrooms, VirtuaCore has many teacher-centric features embedded into its software. Features like virtual CD-ROMs allow multiple students to work from one CD-ROM image. Plus, there s a feature that enables a teacher to see what every student is doing on his or her computer, as well as a built-in search engine function that enables staff to search for educational freeware and cut software costs further. VirtuaCore was also developed to help schools with limited support staff. Specifically, the system has been designed to reduce the load on school IT departments. For instance, because the VirtuaCore technology is Linux based, the deployment and configuration of all software for downstream VirtuaCore computers can be accomplished in minutes as opposed to days in the standard Windows method of software installation. Also, because the product is PC and Mac centric, specialized skill sets, like those required for servers and thin clients, are not required. Teachers can usually take care of most problems that arise within their own clusters as they would on a typical desktop computer blackbox.com Page 8

9 About Box Box Network Services is the world s largest technical services company dedicated to designing, building, and maintaining today s complicated data and voice infrastructure systems. Box services 175,000 clients in 141 countries with 196 offices throughout the world. The Box catalog and Web site offer an extensive range of products, including KVM switches and extenders, and the VirtuaCore line of desktop virtualization computer sharing solutions (for more information, visit blackbox.com/go/virtuacore). Box also offers a wide selection of advanced console servers; WAN optimization products; content filtering/network access control (NAC) solutions; and many network switches, routers, extenders, and media converters for both large and small applications. What s more, the Company is the premier supplier of digital signage solutions and audio/video splitters, switches, extenders, and scalers, and is the industry-leading provider of cabinets, racks, cables, connectors, and other AV and data infrastructure products. To view Box s comprehensive offering, view its interactive e-catalog at blackbox.movadamedia.com/blackboxbigbook/page.aspx?id=1. Copyright All rights reserved. Box and the Double Diamond logo are registered trademarks of BB Technologies, Inc. Any third-party trademarks appearing in this white paper are acknowledged to be the property of their respective owners blackbox.com Page 9

evm Virtualization Platform for Windows

evm Virtualization Platform for Windows B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400

More information

Technical Brief. Userful Multiplatform Desktop Virtualization Software

Technical Brief. Userful Multiplatform Desktop Virtualization Software Technical Brief Userful Multiplatform Desktop Virtualization Software 11.04.2014 SUMMARY: This Technical Brief will summarize the installation and set up of Userful Multiplatform desktop virtualization

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have

More information

Virtualization. Types of Interfaces

Virtualization. Types of Interfaces Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity

More information

Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC

Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,

More information

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper Enterprise-class desktop virtualization with NComputing Clear the hurdles that block you from getting ahead Whitepaper Introduction Enterprise IT departments are realizing virtualization is not just for

More information

NEC Virtual PC Center (VPCC) Product and Technology Overview

NEC Virtual PC Center (VPCC) Product and Technology Overview NEC Virtual PC Center (VPCC) Product and Technology Overview Virtual PC Center is NEC s complete software solution to deploy and manage virtual desktop users throughout your entire organization. It is

More information

Understanding the Performance of an X550 11-User Environment

Understanding the Performance of an X550 11-User Environment Understanding the Performance of an X550 11-User Environment Overview NComputing's desktop virtualization technology enables significantly lower computing costs by letting multiple users share a single

More information

Comparing Virtualization Technologies

Comparing Virtualization Technologies CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational

More information

Integrating NComputing Virtual Desktops with VMware and Citrix

Integrating NComputing Virtual Desktops with VMware and Citrix Click to edit Master title style Integrating NComputing Virtual Desktops with VMware and Citrix Karen Gaines Director of Southern Europe, NComputing, Inc. September, 2010 1 Click Topicsto edit Master title

More information

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines: Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between

More information

Red Hat VDI. David Simmons

Red Hat VDI. David Simmons Red Hat VDI David Simmons Senior Architect, Red Hat Virtualization AGENDA Open Source and the Evolution of Virtualization Desktop VDI Value Components Real VDI TCO The Future of the Desktop and the savings

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges

More information

Virtual Machines. www.viplavkambli.com

Virtual Machines. www.viplavkambli.com 1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software

More information

Expert Reference Series of White Papers. VMware vsphere Essentials

Expert Reference Series of White Papers. VMware vsphere Essentials Expert Reference Series of White Papers VMware vsphere Essentials 1-800-COURSES www.globalknowledge.com VMware vsphere Essentials Raj Tolani, Global Knowledge Instructor Introduction Every VMware class

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...

More information

Using Multi-Port Intel Ethernet Server Adapters to Optimize Server Virtualization

Using Multi-Port Intel Ethernet Server Adapters to Optimize Server Virtualization White Paper Intel Ethernet Multi-Port Server Adapters Using Multi-Port Intel Ethernet Server Adapters to Optimize Server Virtualization Introduction As enterprise-class server infrastructures adopt virtualization

More information

DP Hi-Speed USB 4-Port PCIe Quick Installation Guide

DP Hi-Speed USB 4-Port PCIe Quick Installation Guide Introduction DP Hi-Speed USB 4-Port PCIe Quick Installation Guide The DP Hi-Speed USB 4-Port PCIe adds 4 high-speed USB 2.0 ports to your system. Features and Benefits Compliant with USB specifications

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

Network Station - Thin Client Computing - Overview

Network Station - Thin Client Computing - Overview Network Station - Thin Client Computing - Overview Overview The objective of this document is to help develop an understanding of a Server Based Computing/Thin-Client environment using MS Windows NT 4.0,

More information

How to Achieve Cost-Efficient Data Centre Growth While BLACK BOX Keeping Your Existing Components

How to Achieve Cost-Efficient Data Centre Growth While BLACK BOX Keeping Your Existing Components How to Achieve Cost-Efficient Growth While BLACK BOX Keeping Your Existing Components ServReach KVMCube ServReach KVManager 0118 965 6000 www.blackbox.co.uk ServReach KVMGate Table of Contents Summary...

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

Post-production Video Editing Solution Guide with Microsoft SMB 3 File Serving AssuredSAN 4000

Post-production Video Editing Solution Guide with Microsoft SMB 3 File Serving AssuredSAN 4000 Post-production Video Editing Solution Guide with Microsoft SMB 3 File Serving AssuredSAN 4000 Dot Hill Systems introduction 1 INTRODUCTION Dot Hill Systems offers high performance network storage products

More information

Red Hat enterprise virtualization 3.0 feature comparison

Red Hat enterprise virtualization 3.0 feature comparison Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware

More information

Consolidating Multiple Network Appliances

Consolidating Multiple Network Appliances October 2010 Consolidating Multiple s Space and power are major concerns for enterprises and carriers. There is therefore focus on consolidating the number of physical servers in data centers. Application

More information

PC Blade Virtualization Configuration Guide

PC Blade Virtualization Configuration Guide PC Blade Virtualization Configuration Guide The combination of ClearCube PC Blades and management software with industry-standard virtualization technology gives IT managers a new way to more efficiently

More information

Server-centric client virtualization model reduces costs while improving security and flexibility.

Server-centric client virtualization model reduces costs while improving security and flexibility. BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

Software Licensing in Virtual Environments. Managing the Terms of Software Use in Virtualized Systems

Software Licensing in Virtual Environments. Managing the Terms of Software Use in Virtualized Systems Software Licensing in Virtual Environments Managing the Terms of Software Use in Virtualized Systems Introduction While virtualization has numerous IT infrastructure benefits, it can be a concern for software

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

Virtualization and the U2 Databases

Virtualization and the U2 Databases Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the

More information

Pano Device. Data Sheet. How It Works: Key Benefits:

Pano Device. Data Sheet. How It Works: Key Benefits: Pano Device Data Sheet How It Works: The Pano Device is a true zero client it has no CPU or memory, no embedded operating system or firmware, no device drivers or other software, no local storage or moving

More information

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain

More information

The Microsoft Windows Hypervisor High Level Architecture

The Microsoft Windows Hypervisor High Level Architecture The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its

More information

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits: Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique

More information

Handling Multimedia Under Desktop Virtualization for Knowledge Workers

Handling Multimedia Under Desktop Virtualization for Knowledge Workers Handling Multimedia Under Desktop Virtualization for Knowledge Workers Wyse TCX Multimedia capabilities deliver the applications and performance required, for less A white paper by Wyse Technology Inc.

More information

Microsoft Virtual Desktop Infrastructure (VDI) FAQ

Microsoft Virtual Desktop Infrastructure (VDI) FAQ Microsoft Virtual Desktop Infrastructure (VDI) FAQ Q1: What is VDI? A1: Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution that enables organizations to store and execute desktop

More information

Desktop Consolidation. Stéphane Verdy, CTO Devon IT

Desktop Consolidation. Stéphane Verdy, CTO Devon IT Desktop Consolidation Stéphane Verdy, CTO Devon IT Agenda - Desktop Consolidation Migrating from PCs to Hosted Desktops Desktop Centralization Deployment Graphics Compression PCs vs. Thin s TCO User segmentation

More information

Thin Client Total Cost of Ownership & ACP ThinManager Enterprise Software Advantages. White Paper

Thin Client Total Cost of Ownership & ACP ThinManager Enterprise Software Advantages. White Paper Thin Client Total Cost of Ownership & ACP ThinManager Enterprise Software Advantages ABSTRACT: This document shows the cost savings associated with adopting Thin Clients and ACP s ThinManager centralized

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual

More information

Optimize VDI with Server-Side Storage Acceleration

Optimize VDI with Server-Side Storage Acceleration WHITE PAPER Optimize VDI with Server-Side Storage Acceleration Eliminate Storage Bottlenecks for Fast, Reliable Virtual Desktop Performance 1 Virtual Desktop Infrastructures (VDI) give users easy access

More information

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business

More information

OPTIMIZING SERVER VIRTUALIZATION

OPTIMIZING SERVER VIRTUALIZATION OPTIMIZING SERVER VIRTUALIZATION HP MULTI-PORT SERVER ADAPTERS BASED ON INTEL ETHERNET TECHNOLOGY As enterprise-class server infrastructures adopt virtualization to improve total cost of ownership (TCO)

More information

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced

More information

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to Hanspeter Vogel Triadem Solutions AG Real-Time Systems GmbH Gartenstrasse 33 D-88212 Ravensburg Germany

More information

DeltaV Virtual Studio

DeltaV Virtual Studio June 2013 Page 1 DeltaV Virtual Studio Makes Virtualization Easy. DeltaV Virtualization Made Easy Reduced Costs and Increased Flexibility Fewer Computers and Control Hardware Extended System Life with

More information

Getting Started with VMware Fusion

Getting Started with VMware Fusion Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization

More information

NComputing desktop virtualization

NComputing desktop virtualization NComputing Abstract We ve all become accustomed to the PC model, which allows every user to have their own CPU, hard disk, and memory to run their applications. But personal computers have now become so

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

What is virtualization

What is virtualization Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them

More information

Leveraging Thin Hypervisors for Security on Embedded Systems

Leveraging Thin Hypervisors for Security on Embedded Systems Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned

More information

APC Enterprise KVM Switches

APC Enterprise KVM Switches APC Enterprise KVM Switches Introduction You need more than point access products. You need a system that provides more control, flexibility and scalability than ever before. Systems that reduce your Mean

More information

Virtualization for Desktops

Virtualization for Desktops Red Hat Enterprise Virtualization for Desktops Delivering on the promises of Desktop Virtualization www.redhat.com TABLE OF CONTENTS 3 Benefits of desktop virtualization 3 Benefits for IT Departments 3

More information

Virtualization Technologies

Virtualization Technologies 12 January 2010 Virtualization Technologies Alex Landau (lalex@il.ibm.com) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on

More information

Hypervisors and Virtual Machines

Hypervisors and Virtual Machines Hypervisors and Virtual Machines Implementation Insights on the x86 Architecture DON REVELLE Don is a performance engineer and Linux systems/kernel programmer, specializing in high-volume UNIX, Web, virtualization,

More information

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches

More information

Windows MultiPoint Server 2011 Deployment Guide. Document Version 1.0 March 2011

Windows MultiPoint Server 2011 Deployment Guide. Document Version 1.0 March 2011 Windows MultiPoint Server 2011 Deployment Guide Document Version 1.0 March 2011 Copyright Notice This document is provided as-is. Information and views expressed in this document, including URL and other

More information

9/26/2011. What is Virtualization? What are the different types of virtualization.

9/26/2011. What is Virtualization? What are the different types of virtualization. CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,

More information

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont. Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures

More information

Servervirualisierung mit Citrix XenServer

Servervirualisierung mit Citrix XenServer Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

System Virtual Machines

System Virtual Machines System Virtual Machines Introduction Key concepts Resource virtualization processors memory I/O devices Performance issues Applications 1 Introduction System virtual machine capable of supporting multiple

More information

Installing & Using KVM with Virtual Machine Manager COSC 495

Installing & Using KVM with Virtual Machine Manager COSC 495 Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system

More information

DeltaV Virtual Studio

DeltaV Virtual Studio DeltaV Distributed Control System Product Data Sheet June 2015 DeltaV Virtual Studio DeltaV Virtual Studio Makes Virtualization Easy. DeltaV Virtualization Made Easy. Reduced Costs and Increased Flexibility.

More information

Using AnywhereUSB to Connect USB Devices

Using AnywhereUSB to Connect USB Devices VMWARE TECHNICAL NOTE VMware ESX Server Using to Connect Devices Digi International s Remote I/O Concentrator is a remote networking solution that utilizes over IP technology, called RealPort, to enable

More information

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept. Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,

More information

RADMIN remote control software. Product Overview. What is Radmin? Innovative screen capture technology

RADMIN remote control software. Product Overview. What is Radmin? Innovative screen capture technology What is Radmin? Radmin is a secure and reliable Windows-based remote control program, which allows you to work on several computers through a simple and familiar graphical interface. Radmin allows a user

More information

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape STRATEGIC WHITE PAPER The next step in server virtualization: How containers are changing the cloud and application landscape Abstract Container-based server virtualization is gaining in popularity, due

More information

SAP Business One Hardware Requirements Guide

SAP Business One Hardware Requirements Guide Hardware Requirements Guide Document Version: 1.04 2014-08-25 Release 8.8 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field

More information

CPS221 Lecture: Operating System Structure; Virtual Machines

CPS221 Lecture: Operating System Structure; Virtual Machines Objectives CPS221 Lecture: Operating System Structure; Virtual Machines 1. To discuss various ways of structuring the operating system proper 2. To discuss virtual machines Materials: 1. Projectable of

More information

nanohub.org An Overview of Virtualization Techniques

nanohub.org An Overview of Virtualization Techniques An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource

More information

Setting Up Control Rooms With Modern IT Solutions

Setting Up Control Rooms With Modern IT Solutions Superior Flexibility for the Control Room Workplace Thomas Singer 1, Ursula Kretschel 2 and Michael Schmidhuber 3 German Space Operations Center, DLR Oberpfaffenhofen, Germany The workplaces typically

More information

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh Introduction History, Advantages, Common Uses OS-Level Virtualization Hypervisors Type 1 vs. type 2 hypervisors

More information

StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud

StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud StACC: St Andrews Cloud Computing Co laboratory A Performance Comparison of Clouds Amazon EC2 and Ubuntu Enterprise Cloud Jonathan S Ward StACC (pronounced like 'stack') is a research collaboration launched

More information

EMA Product Brief: Desktop Virtualization with Quest

EMA Product Brief: Desktop Virtualization with Quest EMA Product Brief: Desktop Virtualization with Quest HIGHLIGHTS Vendor name: Quest Software Product name: vworkspace Production function: Desktop Virtualization Host Operating Systems Support: Windows

More information

Medical 360 Network Edition and Citrix

Medical 360 Network Edition and Citrix WHITE PAPER Dragon Medical 360 Network Edition and Citrix A White Paper from Nuance Healthcare HEALTHCARE DRAGON MEDICAL 360 AND CITRIX Contents Introduction... 3 Citrix Overview... 4 Dragon Medical 360

More information

Virtualised MikroTik

Virtualised MikroTik Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand

More information

Hyper-V: Microsoft s

Hyper-V: Microsoft s TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net Hyper-V: Microsoft s Approach to Server

More information

BLACK BOX. Quick Start Guide. Virtual Central Management System (VCMS) Works with LES Series Console Servers. LES-VCMS. Customer Support Information

BLACK BOX. Quick Start Guide. Virtual Central Management System (VCMS) Works with LES Series Console Servers. LES-VCMS. Customer Support Information LES-VCMS Virtual Central Management System (VCMS) Quick Start Guide Works with LES Series Console Servers. BLACK BOX Customer Support Information Order toll-free in the U.S.: Call 877-877-BBOX (outside

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

LaCie 5big Backup Server

LaCie 5big Backup Server LaCie 5big Backup Server DESIGN BY NEIL POULTON Centralized Backup Appliance for Small Businesses Back Up 10 PCs and 25 Macs 10TB * Gigabit Ethernet The Right Backup Solution for Small Business Delivering

More information

Virtualization and Other Tricks.

Virtualization and Other Tricks. Virtualization and Other Tricks. Pavel Parízek, Tomáš Kalibera, Peter Libič DEPARTMENT OF DISTRIBUTED AND DEPENDABLE SYSTEMS http://d3s.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and

More information

Server Based Desktop Virtualization with Mobile Thin Clients

Server Based Desktop Virtualization with Mobile Thin Clients Server Based Desktop Virtualization with Mobile Thin Clients Prof. Sangita Chaudhari Email: sangita123sp@rediffmail.com Amod N. Narvekar Abhishek V. Potnis Pratik J. Patil Email: amod.narvekar@rediffmail.com

More information

Cisco Unified Workforce Optimization

Cisco Unified Workforce Optimization Cisco Unified Workforce Optimization Desktop Requirements Guide Version 10.5 First Published: June 18, 2014 Last Updated: March 6, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS

More information

Basics of Virtualisation

Basics of Virtualisation Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are

More information

LuminonCore Virtual Desktop Infrastructure (VDI) Products

LuminonCore Virtual Desktop Infrastructure (VDI) Products LuminonCore Virtual Desktop Infrastructure (VDI) Products LuminonCore VDI products eliminate your doubts on current virtual desktop products from the market. LuminonCore VDI brings totally upgraded desktop

More information

Intro to Virtualization

Intro to Virtualization Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor

More information