Hardware virtualization was a great step forward in application hosting compared to the days of bare metal. Hypervisors allowed us to isolate multiple applications within one hardware platform, freeing us to use hardware resources more efficiently by hosting heterogeneous workloads on the same infrastructure. Still, virtual machines have massive overhead in terms of resource consumption, because each VM runs a fully dedicated operating system.Containerization advances the benefits of virtualization much further by allowing containers to share the OS kernel, networking stack, file system, and other system resources of the host machine, all while using less memory and CPU overhead.If your organization is wary about making the transition from VMs to containers, consider the following advantages of containers: Far more efficient resource utilization than with VMs. Easier scaling—resizing container limits can be achieved on the fly, without a reboot. Faster provisioning and start … [Read more...] about Shift your Java applications into containers with Jelastic PaaS
Containers provide a lightweight way to take application workloads portable, like a virtual machine but without the overhead and bulk typically associated with VMs. With containers, apps and services can be packaged up and moved freely between physical, virtual, or cloud environments.Docker, a container creation and management system created by Docker, Inc., takes the native container functionality found in Linux and makes it available to end-users through a command-line interface and a set of APIs.Many common application components are now available as prepackaged Docker containers, making it easy to deploy stacks of software as decoupled components (the “microservices” model). That said, it helps to know how the pieces fit together from the inside out.Thus, in this guide, we’ll install the Apache web server in a Docker container and investigate how Docker operates along the way. … [Read more...] about Docker tutorial: Get started with Docker
Unikernels promise fast boots, tiny memory footprints, and high performance, but they must be developed from scratch for each application. NEC is working to remove this barrier to unikernel adoption with a configurable unikernel code base called Unikraft.Developed under the auspices of the Linux Foundation’s Xen Project, Unikraft will address unikernel development issues by providing libraries of operating system components that users can pick and choose from, using a menu to build a working image. Among the goals is to support multiple target platforms including Xen, KVM, and bare metal without having to do additional work to accommodate them.Unikraft will provide two basic components: Library pools for creating unikernels. These include libraries specific to computer architectures such as x86_64 and Arm32, libraries that target platforms such as Xen and KVM, and a library of operating system elements such as device drivers, file systems, network stacks, and runtimes. A build … [Read more...] about Unikraft project promises to simplify unikernel creation
For all its benefits, the drive to virtualize everything has created a very big security issue: Virtualization creates a single target for a potential security breach. When a host runs 50 virtual machines (VMs) and is attacked, then you have a real problem. One compromised host compromises the 50 VMs running on it, and now you have what I lovingly call a “holy s**t” moment. Because you virtualized, you turned a whole bunch of servers and operating systems into just a couple of files that are super easy to steal.The industry needs a way to protect against online and offline attacks that could compromise entire farms of VMs. Microsoft has done some work in this area in Windows Server 2016 with the shielded virtual machine, and its sister service, the Host Guardian Service (HGS). Let’s look at what the folks in Redmond have done.Understanding the security problem with virtualizationLet’s frame the problem as a set of challenges that need to be solved for a … [Read more...] about What are shielded virtual machines and how to set them up
No advance in information technology in the past six decades has offered a greater range of quantifiable benefits than has virtualization. Many IT professionals think of virtualization in terms of virtual machines (VM) and their associated hypervisors and operating-system implementations, but that only skims the surface. An increasingly broad set of virtualization technologies, capabilities, strategies and possibilities are redefining major elements of IT in organizations everywhere.Virtualization definitionExamining the definition of virtualization in a broader context, we define virtualization as the art and science of making the function of an object or resource simulated or emulated in software identical to that of the corresponding physically realized object. In other words, we use an abstraction to make software look and behave like hardware, with corresponding benefits in flexibility, cost, scalability, reliability, and often overall capability and performance, and in a broad … [Read more...] about What is virtualization?