Cisco and Microsoft have a developed a powerful alliance in the data center that extends the value of the Cisco Unified Fabric, Unified Computing System, and Unified Network Services through leading-edge integrated solutions with Microsoft Windows Server, Hyper-V and System Center. These integrations provide an opportunity for Channel Partners to deliver differentiated solutions that address their customer’s most pressing business and IT challenges.
The Nexus 1000V Switch for Microsoft Hyper-V stands out as an example of how Cisco and Microsoft are collaborating to offer integrated solutions to customers and partners. The Nexus 1000V extends Cisco networking benefits to Microsoft Windows Server 2012 Hyper-V deployments and provides a consistent operational model across physical and virtual environments. Cisco was the first company to integrate with Hyper-V and the industry is taking notice. Nexus 1000V for Microsoft Hyper-V was recently recognized as Best of TechEd 2013 in the Virtualization category.
If you’d like to learn more about Nexus 1000V for Microsoft Hyper-V, you’re in luck. Redmond Channel Partner is hosting a webinar on Cisco Nexus 1000V: Virtual Networking for Hyper-V Environments on Thursday, July 25, 2013, at 11am PT / 2pm ET.
Read More »
Tags: data center, Hyper-V, hypervisor, Microsoft, network hypervisor, Nexus 1000v, virtualization, webcast
The science behind Virtual Machine Monitors, or VMM, aka Hypervisors, was demystified almost half a century ago, in a famous ACM publication, “Formal Requirements for Virtualizable Third Generation Architectures”.
In my life, I had the honor of working on some of the most bleeding edge virtualization technologies of their day. My first was IBM’s VM, VSAM and a host of other v-words. My last was at XenSource (now Citrix) and Cisco, on what I still think is the most complete hypervisor of our age, true to its theoretical foundation in the Math paper I just mentioned.
Though Xen is arguably the most widely used hypervisor in the Cloud or sum of all servers in the world today, I actually think its most interesting accomplishment lies in what its founders just announced this week. Therefore, I want to extend my congratulations to my good friends Simon Crosby and Ian Pratt for the admirable work at Bromium with vSentry.
I think it is remarkable for two reasons. It addresses the missing part of what hypervisors are useful, which is security; for those of you that actually read Popek & Goldberg’s paper, you would note that VMM’s are very good at intercepting not just privileged but also sensitive instructions, and very few people out there, until now have focused on the latter, the security piece. But there is one more reason, in fact the key point of this paper, the necessary and sufficient conditions for a system to be able to have a VMM or hypervisor, and I am hoping the Xen guys who have done so well articulating that for real (not fictional or hyped) hypervisors, can also help sort our the hype from fiction in what is ambiguously called nowadays a “network hypervisor”.
Could this approach be what is actually missing, to sort out truth from hype in what we call SDN today? Is this the new age of hypervisors? Or is this just another useful application of an un-hyped hypervisor?
Tags: Cisco, hypervisor, network, network hypervisor, open source, SDN, security, virtualization, vmm, Xen