4
18  communications of the acm  | march 2009 | vol. 52 | no. 3 news     s     c     r    e    e     n     s    h     o    t      B    y      c    h     r    i     s    t     o    P    h    e     r      g     l    i     s     s     o     n I t’S no SeCRet that virtualizatio n, a technology long associated  with mainrame computers, has been transorming data centers due to its ability to consolidate hardware resources and reduce energy costs. But in addition to its impact on data centers, virtualiza- tion is emerging as a viable technolo- gy or smartphones and virtual private networks, as well as being used to re- conceive agile and cloud computing. Over the past decade there has been a great deal o work on improv- ing the perormance, enhancing the fexibility, and increasing the manage- ability o virtualization technologies. Developments in the past ve years alone, or example, include the abil- ity to move a running virtual machine, along with its live operating system and applications, to a physical host  without major downtime. The indus- try has also recently witnessed the ability o virtualization to log the ac- tions o a virtual machine in real time,  with the purpose o being able to roll back an entire system to an arbitrary point and then roll it orward or de- bugging or auditing. These and other recent developments have positioned  virtualization as a core technology in cloud computing and have acilitated the technology’s move to the desktop. “It’s clear that virtualization is here to stay,” says Steve Herrod, chie tech- nology ocer at VMware. “In the u- ture, we’ll look back at the nonvirtual- ized compute models as we look back at the phonograph and bulky CRTs.” But Herrod also says that the industry is ar rom realizing the ull benets that  virtualization can bring to desktops, laptops, and smartphones. “Virtual- ization is picking up steam rapidly or desktop users, but it has certainly not achieved ubiquity yet,” he says. “End users don’t want or need to know that  virtualization is being used; they want access to their applications, and they  want the very rich media experiences that many modern applications oer.”  Arguably, one o the most interest- ing and novel uses o the technology is on mobile devices, where virtual- ization enables several new use-cas- es, such as isolating work and home smartphones on a single physical handset. Gartner predicts that more than 50% o new smartphones will have a virtualization layer by the year 2012. The need or virtualization on smartphones is strong, says Herrod, particularly as these devices become more powerul, as mobile applica- tions become more advanced, and as security becomes a bigger issue. “Just as in the early days o our x86 desktop  virtualization eorts, we see many di- erent benets that will come with this  virtualization,” says Herrod.  As one example, Herrod cites the substantial testing procedures that every new handset must undergo prior to shipping. Virtualization, he says, will let handset manuactur- ers test once and deploy on dierent handsets. For the carriers, Herrod pre- dicts that virtualization will enable a new set o services, such as allowing users to deploy a virtual copy o their mobile data to a newly purchased handset. And or businesses, he says that those who want a single handset or home and work will be able to use dierent virtual phones. “Their work phone could be restricted to very spe- cic applications and corporate data that is secure and completely isolated rom their home phone, where they may have personal inormation and games,” he says. “The more we talk  with people about this new area, the more use-cases we nd.” ed sry The notion that one o the strengths o virtualization is its ability to isolate data and applications corresponds to another aspect o the technology Technology | DOI:10.1145/1467247.1467253 Kirk L. Kroeker t evl Vrlz Virtualization is moving out of the data center and making inroads with mobile computing, security, and software delivery. a m pr, w Vmwr f, w bl r Wdw XP Pr l r, Wdw V h rg, d m os X Lprd bkgrd.

Technology | DOI:10.1145/1467247 .1467253 Kirk L. Kroeker

Embed Size (px)

Citation preview

Page 1: Technology | DOI:10.1145/1467247 .1467253 Kirk L. Kroeker

8/14/2019 Technology | DOI:10.1145/1467247 .1467253 Kirk L. Kroeker

http://slidepdf.com/reader/full/technology-doi1011451467247-1467253-kirk-l-kroeker 1/3

Page 2: Technology | DOI:10.1145/1467247 .1467253 Kirk L. Kroeker

8/14/2019 Technology | DOI:10.1145/1467247 .1467253 Kirk L. Kroeker

http://slidepdf.com/reader/full/technology-doi1011451467247-1467253-kirk-l-kroeker 2/3

news

march 2009 | vol. 52 | no. 3 |  communications of the acm   19

Quantum Computing

 AtomsTeleported a em scenss rm heUnversy Mrylnd ndhe Unversy Mchgnhve successully elerednrmn beween r  ms, hused n serend enclsed cnners,crss dsnce ne meer,rers Science. accrdng he scenss, hs s he frs me h nrmn hsbeen elered beween wsere ms n uncnnecedcnners.

 Wh her rcl,he scenss successully elered qunumnrmn beween w

 yerbum ns, usng mehd elern n whch hens re smuled em hns nd he qunum sesre nerred rm he clr  he emssns. the scenssrer h m--melered nrmn cn berecvered wh erec ccurcy rxmely 90% he me,nd hey beleve h fgure cnbe mrved.

“our sysem hs heenl rm he bss r lrge-scle ‘qunum reeer’h cn newrk qunum

memres ver vs dsnces,”sys Chrsher Mnre,he em leder nd hyscsressr he Unversy  Mrylnd. “Mrever,ur mehds cn be used ncnjuncn wh qunumb erns cree key cmnen needed r qunum cmun.

“one rculrly rcvesec ur mehd sh cmbnes he unquedvnges bh hns ndms,” sys Mnre. “phnsre del r rnserrng 

nrmn s ver lng dsnces, wheres mser vluble medum r lng-lved qunum memry.the cmbnn reresensn rcve rchecure r ‘qunum reeer,’ h wuldllw qunum nrmn be cmmunced ver muchlrger dsnces hn cn bedne wh jus hns. als,he elern qunumnrmn n hs wy culdrm he bss new ye  qunum inerne h culduerrm ny cnvennl

ye clsscl newrk r cern sks.”

that has become increasingly popu-

lar. While it might be easy to think

o virtualization as adding a sotware

layer that requires additional controlsto maintain security, proponents o 

 virtualization argue that it serves the

opposite purpose, and instead rep-resents a core enhancement to secu-

rity. “The only way we know how toget strong isolation is to keep thingssimple,” says Mendel Rosenblum,

ounder o VMware and a proessor o 

computer science at Stanord Univer-sity. “And the only way we know how to

do that is to have isolation enorced at

the lowest level.”

Modern operating systems have ahigh level o unctionality—and a cor-

responding level o complexity and

number o potential weaknesses. “I

look at virtualization as a step towardgetting out o the mess we have in

terms o these systems being so in-secure,” says Rosenblum, who main-

tains that better security is a natural

result o virtualization. Still, he says, itis incumbent on those working on vir-

tualization to build layers that don’t

make virtualized systems so ull o ea-

tures and complex that they becomedifcult to secure.

Ian Pratt, ounder o XenSource and

 vice president o advanced products at

Citrix, has a similar view o virtualiza-tion’s relationship to security. “I you

look at hypervisors or laptops andphones, it’s not about consolidation,”

he says. “It’s about security and being 

able to secure dierent partitions on

a device.”Citrix is developing sotware or

a model o mobile computing that

the company calls “bring your owncomputer,” with the idea being or

employees to use their own laptop

or securely connecting to the corpo-

rate network. In this model, the lap-top runs a corporate virtual machine

directly on top o a hypervisor ratherthan in a hosted virtual environment

contained by the employee’s personal

operating system.

“You need to provide very strict iso-lation between those environments

because you really don’t trust the per-

sonal environment,” says Pratt. “It isonly through using a hypervisor where

  you can achieve that strong isolation

between those environments.”Like VMware’s Herrod, Pratt points

to smartphones as one maniestation

o this new way o thinking about vir-

tualization and security. In Pratt’sexample, a handset might have one

  virtual machine that controls the ra-

dio, another that contains all the de-ault sotware and applications, and athird that operates everything the user

downloads and installs. “The whole

idea behind this,” says Pratt, “is thatbecause you have this strong isolation,

no matter what rubbish you download

and install on the phone, you are stillgoing to be able to make that 911 call

 whenever you need it.”

Proponents o virtualization say 

that, in addition to acilitating new   ways o enorcing security, virtual-

ization technologies are leading tonew ways o distributing sotware.“Virtualization not only gives you the

ability to manage hardware more e-

ectively,” says Rosenblum, “but alsoallows you to treat the sotware you’re

running dierently.” One way o lever-

aging virtualization’s capabilities isto ship complete packages o running 

  virtual machines rather than having 

users assemble operating systems

and applications themselves, he says.The idea represents a dierent take

on sotware as a service, a model thatobviates the need or users to assem-ble applications themselves. “It’s not

like you buy all the separate parts to

make a car, but that’s what we do withcomputers,” says Rosenblum, who

predicts that virtualization will lead to

users simply invoking complete, au-thenticated virtual machines tailored

to their particular needs.

cr cllg

  While virtualization is continuing to

make inroads in several new areas and

W vrlz,ppl wll b bl b rwrk p d

p gl d.

Page 3: Technology | DOI:10.1145/1467247 .1467253 Kirk L. Kroeker

8/14/2019 Technology | DOI:10.1145/1467247 .1467253 Kirk L. Kroeker

http://slidepdf.com/reader/full/technology-doi1011451467247-1467253-kirk-l-kroeker 3/3

20   communications o the acm   | march 2009 | vol. 52 | no. 3

news

    l   e   f   t   :   P   h    o   t    o    g    r    a   P   h

    c    o   u    r   t   e    s   y    o   f    c    a    r    o    l   i    n   e    s   e    l   f    r   i   d    g   e ,

    r   i    g   h   t   P   h    o   t    o

    g    r    a   P   h

    c    o   u    r   t   e    s   y    o   f   i    n   f    o    r   m    a   t   i    o    n    s   d   i   e    n    s   t   W   i    s    s   e    n    s    c   h    a   f   t

is leading to speculation about new 

models o computing, the technology’s

overhead remains a core challenge.

Recent advances in hardware andsotware have been removing some o 

the perormance concerns associated

  with virtualization, but the goal is toeliminate the perormance gap alto-

gether. “We are not there yet, but what  you’re going to see is enhancementsin processors and other technolo-

gies to make the perormance gap go

away,” says Leendert van Doorn, whois a senior ellow at AMD and respon-

sible or AMD’s virtualization technol-

ogy, including the AMD virtualization

extensions in the company’s latestquad-core Opteron processor, which

are designed to reduce the peror-

mance overhead o sotware-based vir-

tualization. “The big problem with vir-tualization right now is perormance

guarantees,” he says. “I you have adatabase transaction requirement o a

ew milliseconds, it is very difcult to

provide that guarantee in a virtualizedenvironment.”

Still, van Doorn says he is confdent

that this overhead will be reduced in

the coming years with better hardwareand sotware support or virtualiza-

tion. Currently, overhead in virtual-

ized environments varies rom a ew percent to upward o 20%, a fgure that

  van Doorn says depends on several

actors, including how the hypervisor

is implemented and whether the oper-ating system running atop the hypervi-

sor is aware that it is being virtualized.“The Holy Grail is to get near-nativeperormance,” he says. “We are get-

ting closer to that goal.”

In addition to the perormance is-sue, there remains the issue o man-

ageability in the data center and else-

 where. “For the next generation, every big sotware company is working on

comprehensive management tools,”

says van Doorn. The goal is to deal with

a massive number o virtual machines

i r, llw gv vrlzpbl bddd

r frwr.

and eectively make global optimiza-

tion decisions or thousands o virtual

systems running in data centers or in

the hands o a large work orce. So-phisticated management tools will be

essential in the uture imagined by vir-

tualization’s proponents, who predictthat industry is moving toward a world

in which the technology is ubiquitous,and where all new machines will have

  virtualization capabilities embedded

in frmware.

Certainly, says Citrix’s Pratt, allservers, desktops, laptops, smart-

phones, routers, storage arrays, and

anything else running sotware that

must be isolated rom other applica-tions will be virtualized. The result?

“The main noticeable thing will be

more trustworthy computing,” says

Pratt. Echoing this sentiment, Herrodpredicts that users won’t think about

  virtualization as a dierent orm o computing. “It will seamlessly ft into

our notion o computing,” he says,

“enabling a much simpler and moreproductive experience or all o us.”

Bed in lo angee, Kirk L. Kroeker i freeneeditor nd writer peiizing in iene nd tenoogy.steven hnd, citrix, nd cr Wdpurger, Vmwre,ited in te deveopent of ti rtie.

Obituaries

In Memoriam

t wrd cmur sccrcy s w smdmmbrs: ovr G. Srdg, w dd 82, d ig Wgr, 57.

Srdg, ws crr cudd ss Mit,

BBn, d Gte

lbrrs, s wdy rgrdd s dg r  fd  rfcgc d

r mc rc.“i rsc rsrc 1950s,” sys erc hrvz,rsd amrc assc arfcigc, “ rducd dckd ky rbms rw w kw mcrg rsrcrs, cudg  cgs src d

mz vr rgrmr scs, ur

df d sc,ddcs mg vrbs,d usurvsd rg—rg wu xc ccss sgs bu succss vrsusur.”

i 1956, Srdg, wur cgus, rgzd

crc Drmu Cg d cr fd rfc gc. ads 1958 r, “pdmum: a prdgm r lrg,” s cssc ai rs ssy rvds bur r mcrg rsrc.

“t pdmum wrk rducd dsrbud mdr r rcg, wr cmmuy rcg ‘dms’ r gs w dr cmcs d ucsrrm dr subsks r cmbd

f swrs r bvrs,”hrvz s. “Rr

bg dcrd d md fxd, gs d r wrks cmmuccud vv w xrc.

“Fr dcds, ovr cmmucd xcg vs wr cmurs wud dy r r um s

d c sss wu  d r dd xrss rbms,” sys hrvz. “Suc vs s vvd b cr rsrc um-cmur rc.”

ig Wgr, rssr  cmur scc tcc Uvrsy  Drmud, s w kw r sgrudbrkg wrk cmxy ry. h wr r mr mgrs,The Complexity of Boolean Functions (1987) d Branching Programsand Binary Decision Diagrams

(2000). i ry 1990s,  wrkd rm yss  

murscs, d scvc mzgrms bsd murscs, k vury grms d smudg, sud b sudd w mds rm

ry  

fc grms dcmxy ry. Wgr’s w,rcrc

rducd rududrsdg ms suc murscs.

 Wgr ws d mmbr Grm Cuc Scc d hums, dg scfc dvsry cmm Grmgvrm, 2004, d w Krd-Zus-Md,

Grmy’s ms rsguscmur scc wrd, 2006.