From The Blog

Displaying items by tag: Hypervisor

Sunday, 27 January 2013 18:10

Smartphones to get the Virtual treatment

Header

Smartphones are used every day all over the world by millions, with a large portion of those millions using them both for work and personal use.  The huge increase in the functionality of the telephone combined with the growing complexity of today’s workplace has forced a merger between the two worlds on the average device.  All that could be changing soon.

Published in News
Code

In Microsoft news of another, albeit similar, nature to what we have been seeing with Windows 8 and Surface it looks like Steve Ballmer wants to reignite the war between Microsoft and VMware. Ever since the launch of Windows 2008 Microsoft has tried to realize its vision of maintaining a data center eco system. They were more than slightly put out when VMware entered the scene and started pushing their new virtualization technology (including the hyper visor) around the market back in 1999. VMware’s continued success in 2001-2003 was something of a thorn in Microsoft’s side. It was this that led Microsoft to buy Virtual PC and Virtual Server from Connectix in early 2003.

Published in News

us_cert_logoThere is a new security warning for some people running virtualized systems on Intel CPUs. According to researchers at US CERT (Computer Emergency Readiness Team) the issue exists with some 64-bit operating systems when running on a hyper visor style host machine (also if the host OS is 64-bit). The vulnerability includes a method for escalation of privileges and a potential guest to host escape.

Published in News

News_manstealingdataRemember the article that we posted a couple of weeks ago stating that one thing that Anonymous has done is highlight security concerns that corporations would rather keep hidden? Well it turns out that the recent hack on the China Electronics Import & Export Corp (CEIEC) through an outsourced email provider sina.com was all about highlighting security. We had said more than once that the outsourcing of information into the cloud creates a security hole that is miles wide. Still we see this happening more and more as it becomes “cost effective” to allow someone else to deal with security.

Published in Editorials