Dual Identity Devices By: Tony Peadick By: The Breakdown What is a dual identity device Why they were designed and who needs one How they work Availability.

Slides:



Advertisements
Similar presentations
Virtualisation From the Bottom Up From storage to application.
Advertisements

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Virtualization Ryan Cahoon Timothy Farkas Christopher Garcia Jeremy Slovak.
Server Virtualization Gina Myers. Definition Creating virtual machines (VMs) “VMs are software entities that emulate a real machine’s functionality” ◦
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Virtual Machines. Virtualization Virtualization deals with “extending or replacing an existing interface so as to mimic the behavior of another system”
Virtualization B. Ramamurthy. References Practical Virtualization Solutions: Virtualization from the Trenches by K. Hess and A. Newman, Prentice-Hall.
Virtualization for Cloud Computing
Virtualization 101.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
Tanenbaum 8.3 See references
Operating System Virtualization
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Virtualization Week 20. This week Virtualization – What is it? – Software on different operating systems? Group Presentations – minutes per group.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
Selecting the Right Virtualization Technology Infrastructure Planning and Design Series.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
Presented by Mark Thompson High Level Overview and Demo.
ITServices Virtualization Terry Black January 2013.
Virtual Machine and its Role in Distributed Systems.
A Brief Intro to Virtualiztion. What is Virtualization? An abstraction Usually performed via software Many different types –Hardware –Software –Data –Network.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Server Virtualization
PC Operating Systems section 6b. UNIX DOS The Macintosh Operating System Windows 3.x OS/2 Warp Windows NT Windows 95 and 98 Linux Windows 2000 This lesson.
Desktop Virtualization
Adam Hall Technology Strategist Gavin Bennett Systems Engineer – Citrix NZ Session Code: SVR309.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Consolidate and Virtualize your Linux Environment M.S.Anand │ Technology.
CLOUD COMPUTING. What is cloud computing ? History Virtualization Cloud Computing hardware Cloud Computing services Cloud Architecture Advantages & Disadvantages.
Full and Para Virtualization
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
VIRTUALIZATION TECHNIQUES By:- Aman, Denis and Dharit.
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Chapter 2 Operating Systems
Using Virtualization in the Classroom
Unit 3 Virtualization.
Chapter 7. Identifying Assets and Activities to Be Protected
SPLA Licensing Overview
Virtualization Dr. Michael L. Collard
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Desktop Virtualization
Building a Virtual Infrastructure
Java Win32 native Java VM Linux OS ARM VM Runtime Windows OS
Virtual Servers.
1. 2 VIRTUAL MACHINES By: Satya Prasanna Mallick Reg.No
Virtual Machines.
Running other code under LINUX
Group 8 Virtualization of the Cloud
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
OS Virtualization.
Virtualization 101.
Virtualization Techniques
Virtualization.
Virtual machines benefits
Windows Virtual PC / Hyper-V
Virtualization Dr. S. R. Ahmed.
Continuous Services and Connected Devices
Hypervisor A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer.
Microsoft Virtual Academy
Presentation transcript:

Dual Identity Devices By: Tony Peadick By:

The Breakdown What is a dual identity device Why they were designed and who needs one How they work Availability Other dual-identity devices Conclusion

What is a Dual-Identity Device and who needs one? A smartphone containing an application that allows two operating systems to be run on the same device Typically used to combine a person’s personal phone and business phone onto one device Other uses would be for a person with two distinct secret families, or possibly even secret agents.

Why were they designed? BYOD (Bring Your Own Device)BYOD (Bring Your Own Device) –More employees are bringing their personal devices to work Benefits to EmployeeBenefits to Employee –More convenient to manage personal and work contacts –Keeps their private information secure –Reduces the number of devices an employee has to keep track of Benefits to BusinessBenefits to Business –Allows employees to access corporate data without compromising security. –Gives business the added security of being able to remotely delete data if the device becomes lost, stolen, or the employee quits or faces termination. –Reduced technology cost

So, how do they work? When you purchase the phone you have the option of using the native hypervisor, or an app that allows you to run two separate user interfaces. Hypervisor – Not your boss after too much coffee, it’s a Virtual Machine Manager(VMM) that can be hardware, software, or firmware which runs virtual machines.

So, how do they work? Allows the device to essentially create two instances of the same OS on one device that will run independently while sharing resources

So, how do they work? Type-1 hypervisor Hardware based system that runs two instances of the OS in distinct regions of the processor. Considered to be the more secure implementation. Type-2 hypervisor Software based system that produces a guest copy of the OS and runs it on top of the host OS, not in parallel. The guest must go through the host OS in order to access the hardware. Graphic:

Availability Second half of 2013 Red Bend –Type-1 hypervisor that will use newly developed mobile processors that are due to hit the market soon. –Have a partnership with ARM to develop the Cortex-A15 processor –ARM also has a partnership with AMD to develop x86 processors that are optimized for dual-identity devices.

Availability VM Ware –Initially worked to develop a Type-1 hypervisor, but found them to be hard to build, and difficult to maintain –Developed Horizon Mobile, a Type-2 hypervisor that will be embedded in the phones, or available via free download

Not Only For Smartphones VM Ware also has applications for data center infrastructure, workstations, enterprise desktops, virtualization accelerators, and free virtualization products.

Not Only For Smartphones Xen is a VMM for x86-compatible computers. It’s an open source Type-1 hypervisor that interacts directly with the hardware. Microsoft Virtual Server offers Window’s Server Virtualization that provides a stable, secure, and readily available server virtualization platform

Not Only For Smartphones Intel and AMD are working to apply virtualization capabilities to applications that are difficult to virtualize such as Input/Output-intensive databases One thing’s for sure, there will be plenty of choices for virtualization in the near future.

Conclusion A dual identity device runs two instances of the same operating system on one device Designed to make BYOD easier and more secure for businesses to implement Benefits both employer and employee Work using a Type-1 or Type-2 hypervisor Both types available by the end of 2013 Smartphones aren’t the only area where virtualization is evolving.

The End Any questions

Sources ge_BYOD_private_corporate_divide use-own-devices-on-job-tech ge_BYOD_private_corporate_divide Mearian, L. (2013, Febuary Vol. 31 Issue 2 Vol. 31 Issue 2). Smartphones Could Separate Work and Play. PC World, pp