Feeds

Getting under the shell of virtualization

On kernels and other nut puns

  • alert
  • submit to reddit

Gartner critical capabilities for enterprise endpoint backup

Round up Week 3 What's an operating system anyway? The questions we posed this week were quite disconnected, but they inspired similar perspectives from the comments. Not least, respondents to the first article sought to address what exactly was an operating system. Graham Bartlett summed it up perhaps, by saying:

The answer really is "everything that doesn't do application-level processing". It's a pretty vague question, and appropriately enough gets a vague answer.

Graham was more specific on what might constitute the core of the operating system that might be called its 'kernel':

That's a very specific question, with a specific answer: the section of code which directly controls activation and deactivation of all other sections of code.

What relevance does this have to virtualization? It's an important distinction when we start to think about what exactly should go into a hypervisor, and where it should sit. TooMuchCoffee answered the former point quite succinctly when he said, "When is an operating system not an operating system? When it's a big ol' bag of drivers."

Of course it's not just about what vendors/communities come up with, but also what organizations adopt, and we should note that it is too early to fully grasp where things are going in terms of hypervisors, virtualization and so on. In the article we noted that leaner versions of both Linux and Windows Server were already coming on-stream. Competitive pressures would suggest this trend will continue, to the extent that we may well end up with what are to all intents and purposes microkernels. Not a moment too soon, said The Indomitable Gall:

The world and his dog has been crying out for a decent microkernel OS, but no-one has ever been willing to put the time in, instead developing more and more convoluted ways to patch, modify and blu-tack external code onto the major monolithic kernels.

However this is by no means a done deal, and in today's legacy-rich environment it may well be a step too far, as indeed might the other architectural models that can be dreamed up. That hasn't stopped the speculation in the comments however. One anonymous respondent suggested running a JVM on top of Xen, or indeed WINE (a controversial open source Windows compatibility layer) on Xen:

Windows applications could be run without the need to have an instance of Windows. Similarly other OSes could be made redundant with similar technology.

If we started from scratch, how different things might be! However, given that we cannot, backwards compatibility remains a major reason why we need to stick with what we have. Continues Mr Anonymous:

Until application programmers can target the Virtual Machine environment through a standard API then the OS is here to stay.

All the same, comments such as these are a good illustration that there should be no sacred cows when it comes to virtualization. To bring things full circle and link back to the "what's an operating system" question, I'd like to finish with some thoughts on the second article, from W. Hower. First concerning the hypervisor layer itself.

I'm very much of the opinion that the basics of running a virtual machine should absolutely be free. The notion of paying for a hypervisor is simply ludicrous. There's nothing to it.

Now, while this view may be a little simplistic (I'd like to hear what OS kernel and hypervisor developers think of this sweeping statement), what it does illustrate is the pervading view that the very heart of a computer is rapidly commoditising. If this is the case, we will likely continue to see more attention turning to the operational aspects, as continues Mr Hower:

Management is another matter, as some of the pioneers of this latest wave of virtualization seem to have recognised some years ago, if you can integrate the management of these virtual platforms and environments into a broader suite of solutions it's real value add - hence it becomes a chargeable effort, and something that I'm prepared to pay for.

Well sir, rest assured that this perspective is shared by all major virtualization vendors. Whatever happens inside the box, it is what we do with it (and how) that will deliver the most value.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.