Skip to main content

iSCSI Virtualization: Ever heard of Stonefly?

StoneFly's Product Manager, Jame Ervin, has written a neat article on Intelligent IP SANs. They're cheap, they're smart and they're what a typical SMB would want!

Three Major Approaches to Virtualizing Operating Systems and Applications

A simple way to maximize system utilization and take advantage of the huge processing power of current hardware platforms is to use server virtualization. The three major approaches to virtualizing operating systems and applications include emulation, para-virtualization, and operating system virtualization. These are described in more detail below. Each type has specific benefits and drawbacks. Some approaches attract more media attention than others, but it is important during the planning phases to evaluate the approaches and choose what makes the most sense in your environment based on your priorities, whether they are performance, hardware utilization, consolidation, or application availability.

  • Emulation virtualization platforms use a reference hardware platform to emulate, which specifies the CPU, memory and add-on components independently of the actual hardware the VM is installed on; all of the guest machines also take advantage of the reference platform. This approach is ideal when the application requires specific hardware or systems to run properly, but it may have more performance limitations than other approaches since performance is limited to the reference platform. This approach can have multiple operating system kernels (Unix, Linux or Windows variants) running simultaneously on the same hardware.
  • Para-virtualization adds a hypervisor that manages the communications of the virtual machines to the physical hardware devices. In order for paravirtualization to work, the operating system needs to be "hypervisor" aware and know to look in the hypervisor to execute commands. It is difficult to use older operating system kernels with this approach, but it offers performance advantages over the emulation approach since the hypervisor acts like a standard OS that communicates with the actual hardware devices. This approach also allows the simultaneous use of multiple operating systems.
  • Operating system-level virtualization allows one machine to run multiple instances of the same operating system. Since this approach has a single, native operating system communicating with the hardware devices, it is very speedy and efficient, but this approach cannot be used to consolidate multiple operating system kernels.

Check out his article here.


  1. Thanks for the shoutout! Jame

  2. smart. finally someone puts these virtualization technologies into perspective! Great perspective from StoneFly.


Post a Comment

Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to; 1st Jan 2009 live


I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)

Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…