Features list: March 2009 - Virtualisation

Feature

Features list: March 2009 - Virtualisation

Deadline: 5 February 2009

Publication date: Articles will run through the month of March 2009

Editorial contact: features@computerweekly.com

How does a hypervisor work

This article will get under the covers of hypervisor architecture and will examine the use of API and interrupts traps.

The design of hypervisor could impact operating systems in the future. Could OSs be built in such a way that all the hardware, memory/disc allocation, process scheduling/threading, interrupts and event/error handling is handled by the Hypervisor, leaving the OS to provide a robust/secure application programming layer?

We will also cover the history of this kind of emulation such as in Dos extender technologies like PharLap, as well as the Java, Basic virtual machines, which run interpreted computer languages.

Hypervisor practical

Once businesses have piloted virtualisation they usually want to move up to the next stage with a a production rollout. However the tools to support hypervisors in a production environment are only now starting to come to market. This article will look at how to manage production server virtualisation environments and how you support business continuity for virtualisation.

The Security Opportunity of virtualisation

Since virtualisation separates the operating system from the hardware, it provides a layer of protection that could improve IT security. This article will examine the security benefits of virtualisation.

The Security Risk of hypervisor products

This article will cover the security holes in hypervisor products like VMWare and Xen. What are the risks in a hypervisor. How can an IT department protect the hypervisor. We will provide a top tips list of how to secure your hypervisor.

Case Studies on virtualisation

We will be presenting a series of server virtualisation case studies covering different levels of maturity from pilot to measuring return on investment on a project.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in January 2009

 

COMMENTS powered by Disqus  //  Commenting policy