CPU Virtualization Series: VM Entry and Exit

CPU Virtualization Series: VM Entry and Exit

Wang Baisheng, Xie Guangjun Reading time: 8 minutes Quick read: 3 minutes This article is excerpted from the book “In-Depth Exploration of Linux System Virtualization: Principles and Implementation” written by Wang Baisheng and Xie Guangjun, focusing on how the virtual CPU switches between Host mode and Guest mode, and how KVM and the physical CPU … Read more

Research on Base Station Virtualization Technology

Research on Base Station Virtualization Technology

Authors Wang Youxiang, Li Yiqun, Li Fuchang, Feng Yi: China Unicom Network Technology Research Institute. Zhang Lan: China Xun Postal and Telecommunications Design Institute Co., Ltd. Abstract: Using a general hardware platform, virtualization technology achieves the decoupling of software and hardware, enabling the network to have flexible scalability, openness, and evolution capabilities. By virtualizing network … Read more

Performance Comparison of Virtualization Software

Performance Comparison of Virtualization Software

Produced by Kong Sang First published on WeChat account Kong Sang WeChat ID: OpenDataFoundation After tinkering with the home network, it’s almost time to timeout. Here’s a simple article. Test Results CPU The detailed entries come from the GPGPU testing section of AIDA64. Due to many peculiar issues in this section, and the big-little core … Read more

How to Solve Backup Time Issues with Large Virtualization Capacity?

How to Solve Backup Time Issues with Large Virtualization Capacity?

◉ How to Solve Backup Time Issues with Large Virtualization Capacity?Whether it is domestic or foreign virtualization, performing a full backup can result in a large capacity. Sometimes, based on requirements, off-site backups are also needed, which may require dedicated lines, not considering the cost issue for now. In reality, for example, when performing a … Read more

Exploring Vulnerabilities in the VMware Workstation Renderer

Exploring Vulnerabilities in the VMware Workstation Renderer

Background In mid-January, ZDI announced the rules for the 2017 competition, which included a substantial reward for teams that could break VMware and achieve virtual machine escape. VMware is no longer a new target; it was identified as a target in 2016. As a target, VMware has undergone various attacks, with many points of attack … Read more

Virtualization Leader Completes Product Transformation, Establishes the Second Major Alliance in Cloud Computing

Virtualization Leader Completes Product Transformation, Establishes the Second Major Alliance in Cloud Computing

(Above is VMware’s global CEO Pat Gelsinger) The strategy of “alliance and cooperation” originated during the Spring and Autumn Period and the Warring States Period. Initially, the states of Qi and Qin were the most powerful, while the other five states would sometimes form alliances to counter Qi and Qin, and vice versa, Qi and … Read more

Comparing Virtualization and Containerization in DevOps

Comparing Virtualization and Containerization in DevOps

Both virtualization and containerization are common technologies in the DevOps field, enabling resource isolation, but they differ significantly in principles and application scenarios. Today, we will compare them to see how to choose the right one in practical work. Virtualization: The Heavyweight “Fortress” Virtualization divides a physical machine into multiple virtual machines (VMs) through a … Read more

Don’t Say Domestic Virtualization is Ineffective; We Have Actually Reached a Leading Level!

Don't Say Domestic Virtualization is Ineffective; We Have Actually Reached a Leading Level!

Recently, Gartner released its latest report“China x86 Server Virtualization Market Guide”, indicating that the virtualization rate of x86 server infrastructure in Chinese enterprises is lower than the global average; IT infrastructure decision-makers in China must understand market trends, improve server virtualization levels and speed to support business agility, promote cost optimization, and meet the needs … Read more

Full-Stack Adaptation: The Ingenious Calculation of New Productive Forces

Full-Stack Adaptation: The Ingenious Calculation of New Productive Forces

Editor’s Note Driven by the wave of digitalization, the construction of information infrastructure such as basic hardware, basic software, application software, and information security provides solid support for the “flow” of information security. This year, the “Government Work Report” proposed to “optimize the layout of national computing power resources and create a digital industry cluster … Read more

In-Depth Analysis of Arm Cortex-R52+ Technology

In-Depth Analysis of Arm Cortex-R52+ Technology

This article is approximately 8,000 words long, recommended for saving and reading. Author | Beiwai NannxiangProduced by | Chip Technology and Process Cortex-R52+ is an enhanced version of Cortex-R52, designed to meet the integration and virtualization needs of functional safety applications while maintaining software compatibility. It is based on the Armv8-R architecture, providing hardware-level task … Read more