You are on page 1of 3

news

Technology | doi:10.1145/1467247.1467253 Kirk L. Kroeker

The Evolution
of Virtualization
Virtualization is moving out of the data center and making inroads
with mobile computing, security, and software delivery.

I
t’s no secret that virtualization,
a technology long associated
with mainframe computers,
has been transforming data
centers due to its ability to
consolidate hardware resources and
reduce energy costs. But in addition to
its impact on data centers, virtualiza-
tion is emerging as a viable technolo-
gy for smartphones and virtual private
networks, as well as being used to re-
conceive agile and cloud computing.
Over the past decade there has
been a great deal of work on improv-
ing the performance, enhancing the
flexibility, and increasing the manage-
ability of virtualization technologies.
Developments in the past five years
alone, for example, include the abil-
ity to move a running virtual machine, An iMac computer, with VMware Fusion, which enables it to run Windows XP Pro on the left
along with its live operating system screen, Windows Vista Home on the right, and Mac OS X Leopard in the background.
and applications, to a physical host
without major downtime. The indus- virtualization is being used; they want prior to shipping. Virtualization, he
try has also recently witnessed the access to their applications, and they says, will let handset manufactur-
ability of virtualization to log the ac- want the very rich media experiences ers test once and deploy on different
tions of a virtual machine in real time, that many modern applications offer.” handsets. For the carriers, Herrod pre-
with the purpose of being able to roll Arguably, one of the most interest- dicts that virtualization will enable a
back an entire system to an arbitrary ing and novel uses of the technology new set of services, such as allowing
point and then roll it forward for de- is on mobile devices, where virtual- users to deploy a virtual copy of their
bugging or auditing. These and other ization enables several new use-cas- mobile data to a newly purchased
recent developments have positioned es, such as isolating work and home handset. And for businesses, he says
virtualization as a core technology in smartphones on a single physical that those who want a single handset
cloud computing and have facilitated handset. Gartner predicts that more for home and work will be able to use
the technology’s move to the desktop. than 50% of new smartphones will different virtual phones. “Their work
“It’s clear that virtualization is here have a virtualization layer by the year phone could be restricted to very spe-
to stay,” says Steve Herrod, chief tech- 2012. The need for virtualization on cific applications and corporate data
nology officer at VMware. “In the fu- smartphones is strong, says Herrod, that is secure and completely isolated
ture, we’ll look back at the nonvirtual- particularly as these devices become from their home phone, where they
ized compute models as we look back more powerful, as mobile applica- may have personal information and
at the phonograph and bulky CRTs.” tions become more advanced, and as games,” he says. “The more we talk
Screensh ot by Ch ristoph er Glisso n

But Herrod also says that the industry is security becomes a bigger issue. “Just with people about this new area, the
far from realizing the full benefits that as in the early days of our x86 desktop more use-cases we find.”
virtualization can bring to desktops, virtualization efforts, we see many dif-
laptops, and smartphones. “Virtual- ferent benefits that will come with this Enhanced Security
ization is picking up steam rapidly for virtualization,” says Herrod. The notion that one of the strengths
desktop users, but it has certainly not As one example, Herrod cites the of virtualization is its ability to isolate
achieved ubiquity yet,” he says. “End substantial testing procedures that data and applications corresponds
users don’t want or need to know that every new handset must undergo to another aspect of the technology

18 comm unicatio ns o f the acm | m a r c h 2009 | vo l . 5 2 | no. 3


news

that has become increasingly popu- Quantum Computing


lar. While it might be easy to think
of virtualization as adding a software
layer that requires additional controls
With virtualization,
people will be able
Atoms
to maintain security, proponents of
virtualization argue that it serves the to use both their Teleported
opposite purpose, and instead rep- work phone and A team of scientists from the
resents a core enhancement to secu-
rity. “The only way we know how to home phone on University of Maryland and
the University of Michigan
get strong isolation is to keep things a single handset. have successfully teleported
information between a pair
simple,” says Mendel Rosenblum,
of atoms, housed in separate
founder of VMware and a professor of and enclosed containers,
computer science at Stanford Univer- across a distance of one meter,
sity. “And the only way we know how to reports Science. According to
the scientists, this is the first
do that is to have isolation enforced at time that information has
the lowest level.” to smartphones as one manifestation been teleported between two
Modern operating systems have a of this new way of thinking about vir- separate atoms in unconnected
high level of functionality—and a cor- tualization and security. In Pratt’s containers.
With their protocol,
responding level of complexity and example, a handset might have one the scientists successfully
number of potential weaknesses. “I virtual machine that controls the ra- teleported quantum
look at virtualization as a step toward dio, another that contains all the de- information between two
ytterbium ions, using a method
getting out of the mess we have in fault software and applications, and a of teleportation in which the
terms of these systems being so in- third that operates everything the user ions are stimulated to emit
secure,” says Rosenblum, who main- downloads and installs. “The whole photons and the quantum states
tains that better security is a natural idea behind this,” says Pratt, “is that are inferred from the color of
the emissions. The scientists
result of virtualization. Still, he says, it because you have this strong isolation, report that atom-to-atom
is incumbent on those working on vir- no matter what rubbish you download teleported information can be
tualization to build layers that don’t and install on the phone, you are still recovered with perfect accuracy
approximately 90% of the time,
make virtualized systems so full of fea- going to be able to make that 911 call and they believe that figure can
tures and complex that they become whenever you need it.” be improved.
difficult to secure. Proponents of virtualization say “Our system has the
Ian Pratt, founder of XenSource and that, in addition to facilitating new potential to form the basis for a
large-scale ‘quantum repeater’
vice president of advanced products at ways of enforcing security, virtual- that can network quantum
Citrix, has a similar view of virtualiza- ization technologies are leading to memories over vast distances,”
tion’s relationship to security. “If you new ways of distributing software. says Christopher Monroe,
look at hypervisors for laptops and “Virtualization not only gives you the the team leader and a physics
professor at the University
phones, it’s not about consolidation,” ability to manage hardware more ef- of Maryland. “Moreover,
he says. “It’s about security and being fectively,” says Rosenblum, “but also our methods can be used in
able to secure different partitions on allows you to treat the software you’re conjunction with quantum
bit operations to create a
a device.” running differently.” One way of lever- key component needed for
Citrix is developing software for aging virtualization’s capabilities is quantum computation.
a model of mobile computing that to ship complete packages of running “One particularly attractive
the company calls “bring your own virtual machines rather than having aspect of our method is
that it combines the unique
computer,” with the idea being for users assemble operating systems advantages of both photons and
employees to use their own laptop and applications themselves, he says. atoms,” says Monroe. “Photons
for securely connecting to the corpo- The idea represents a different take are ideal for transferring
information fast over long
rate network. In this model, the lap- on software as a service, a model that distances, whereas atoms
top runs a corporate virtual machine obviates the need for users to assem- offer a valuable medium for
directly on top of a hypervisor rather ble applications themselves. “It’s not long-lived quantum memory.
than in a hosted virtual environment like you buy all the separate parts to The combination represents
an attractive architecture for a
contained by the employee’s personal make a car, but that’s what we do with ‘quantum repeater,’ that would
operating system. computers,” says Rosenblum, who allow quantum information to
“You need to provide very strict iso- predicts that virtualization will lead to be communicated over much
lation between those environments users simply invoking complete, au- larger distances than can be
done with just photons. Also,
because you really don’t trust the per- thenticated virtual machines tailored the teleportation of quantum
sonal environment,” says Pratt. “It is to their particular needs. information in this way could
only through using a hypervisor where form the basis of a new type of
quantum Internet that could
you can achieve that strong isolation Core Challenges outperform any conventional
between those environments.” While virtualization is continuing to type of classical network for
Like VMware’s Herrod, Pratt points make inroads in several new areas and certain tasks.”

ma r c h 2 0 0 9 | vo l. 52 | n o. 3 | c om m u n ic at ion s of t he acm 19
news

is leading to speculation about new and effectively make global optimiza-


models of computing, the technology’s tion decisions for thousands of virtual
overhead remains a core challenge. In the future, all systems running in data centers or in
Recent advances in hardware and new machines might the hands of a large work force. So-
software have been removing some of phisticated management tools will be
the performance concerns associated have virtualization essential in the future imagined by vir-
with virtualization, but the goal is to capabilities embedded tualization’s proponents, who predict
eliminate the performance gap alto- that industry is moving toward a world
gether. “We are not there yet, but what in their firmware. in which the technology is ubiquitous,
you’re going to see is enhancements and where all new machines will have
in processors and other technolo- virtualization capabilities embedded
gies to make the performance gap go in firmware.
away,” says Leendert van Doorn, who Certainly, says Citrix’s Pratt, all
is a senior fellow at AMD and respon- servers, desktops, laptops, smart-
sible for AMD’s virtualization technol- ized environments varies from a few phones, routers, storage arrays, and
ogy, including the AMD virtualization percent to upward of 20%, a figure that anything else running software that
extensions in the company’s latest van Doorn says depends on several must be isolated from other applica-
quad-core Opteron processor, which factors, including how the hypervisor tions will be virtualized. The result?
are designed to reduce the perfor- is implemented and whether the oper- “The main noticeable thing will be
mance overhead of software-based vir- ating system running atop the hypervi- more trustworthy computing,” says
tualization. “The big problem with vir- sor is aware that it is being virtualized. Pratt. Echoing this sentiment, Herrod
tualization right now is performance “The Holy Grail is to get near-native predicts that users won’t think about
guarantees,” he says. “If you have a performance,” he says. “We are get- virtualization as a different form of
database transaction requirement of a ting closer to that goal.” computing. “It will seamlessly fit into
few milliseconds, it is very difficult to In addition to the performance is- our notion of computing,” he says,
provide that guarantee in a virtualized sue, there remains the issue of man- “enabling a much simpler and more
environment.” ageability in the data center and else- productive experience for all of us.”
Still, van Doorn says he is confident where. “For the next generation, every
that this overhead will be reduced in big software company is working on
the coming years with better hardware comprehensive management tools,” Based in Los Angeles, Kirk L. Kroeker is a freelance
editor and writer specializing in science and technology.
and software support for virtualiza- says van Doorn. The goal is to deal with Steven Hand, Citrix, and Carl Waldspurger, VMware,
tion. Currently, overhead in virtual- a massive number of virtual machines assisted in the development of this article.

Lef t: Photog ra ph courtesy of Caroline Self ridge, Righ t P hotograph co urt esy o f Informat i on sd i e n st W i s s e n s chaft
Obituaries

In Memoriam
The world of computer science definition and selection, being handcrafted ahead of time metaheuristics, and his
recently lost two esteemed dependencies among variables, and fixed, the agents and their conviction that optimization
members: Oliver G. Selfridge, and unsupervised learning— networks of communication algorithms based on
who died at 82, and Ingo learning without explicit access could evolve with experience. metaheuristics, like evolutionary
Wegener, 57. to signals about success versus “For decades, Oliver algorithms and simulated
Selfridge, whose career failure.” communicated an exciting vision annealing, should be studied
included positions at MIT, In 1956, Selfridge, with where computers would one day with the methods from
BBN, and GTE four colleagues, organized a learn to infer human intentions the theory of
Laboratories, is conference at Dartmouth College and act to assist people without efficient
widely regarded as that led to the creation of the the need for detailed expression algorithms and
a leading pioneer field of artificial intelligence. And of problems,” says Horvitz. “Such complexity theory.
in the field of his 1958 paper, “Pandemonium: a vision has evolved to be central Wegener’s new,
artificial A Paradigm for Learning,” is a in research on human-computer theoretical
intelligence and classic AI treatise that essentially interaction.” approach
the father of machine perception. provides a blueprint for machine Ingo Wegener, a professor of produced a profound
“In prescient research in the learning research. computer science at the understanding of the limitations
1950s,” says Eric Horvitz, “The Pandemonium work Technical University of of such metaheuristics.
president of the American introduced a distributed model Dortmund, is well known for his Wegener was appointed a
Association of Artificial for pattern recognition, where groundbreaking work in member of the German Council
Intelligence, “he introduced and a community of interacting complexity theory. He wrote a of Science and Humanities,
tackled key problems that are ‘demons’ or agents with different pair of important monographs, the leading scientific advisory
now well known to machine competencies and functions The Complexity of Boolean Functions committee to the German
learning researchers, including perform different subtasks (1987) and Branching Programs government, in 2004, and
the challenges of search and that are then combined into and Binary Decision Diagrams won the Konrad-Zuse-Medal,
optimization over large final answers or behaviors,” (2000). In the early 1990s, he Germany’s most prestigious
parameter spaces, feature Horvitz notes. “Rather than worked in the formal analysis of computer science award, in 2006.

20 com municatio ns o f th e acm | m a r c h 2009 | vo l . 5 2 | no. 3

You might also like