I've been reading about IBMs reasons for developing a Virtual Machine in the 1960s... and trying to read up on the current new technology from both Intel and AMD. It appears that we're learning from the past, and we might even have good chips with will allow full virtualization in our machines very soon now.
If a machine can be fully virtualized, the software running on it has absolutely now way to tell its not running on the raw hardware. This requires a piece of software known as a Virtual Machine Monitor. A good VMM implementation makes it possible to run a VMM inside of a VMM. The original reason for doing this type of recursion was to make it cheaper to work on new versions of the operating systems. Instead of having to have a real machine per developer (not cheap with mainframes), it was far more sensible to let them use a virtual machine.
The Pentium instruction set has holes which make it very difficult to fully virtualize. The new chips announced in the past week seem to include everything necessary to change this picture, and open up some interesting new choices.
If we can virtualize the main chip in a PC, then you can run as many virtual machines inside it as you like, setting whatever security rules and interconnections as you see fit, in a very safe manner. I'm amazed at how much you can learn just digging around the internet with google and some persistance. It's been quite fun.
- ► 2011 (35)
- ► 2010 (90)
- ► 2009 (56)
- ► 2008 (122)
- ► 2007 (73)
- What blogging means to me
- Dissecting Venture Capitol
- Management - The Missing Ingredient
- What's wrong with Venture Capital?
- Venture Capital, Open Source, and Quantum Mechanic...
- Hypercommentive Markets
- Reading about Capabilities
- Finding your voice in Web 2.0
- DRM is impossible in a secure system
- Learning from the past
- Learning about KeyKOS and CapROS
- Routing around damage
- Do you trust your PC?
- Predicitions for 2006
- Pulling rank
- Climbing the long tail, part deux
- I like Dave
- Where's the beef?
- Analyse this
- Getting side-swiped in the war for control
- Capabilities explained
- Starting new conversations?
- back to the point.... is a secure OS possible?
- Subverting hierarchy?
- Rethinking NGSCB
- Climbing up the long tail?
- ▼ January (27)
- ► 2005 (50)