Re-engineering of Xen: the open-source hypervisor totally remodeled

Xen is a heavy weight of open source. This hypervisor, which runs and manages virtual machines (VMs), powers some of the largest clouds. You know their names: Amazon Web Services (AWS), Tencent, Alibaba Cloud, Oracle Cloud or IBM SoftLayer. It is also a base for VM products from Citrix, Huawei, Inspur and Oracle. But, with the release of its latest edition, Xen Project Hypervisor 4.11 , there are major changes under the hood.

Xen, 15, has been completely re-architected. All of its core technologies, such as x86 support, device emulation, and boot sequence, have been rewritten. The new Xen uses less code and has a smaller trusted computing base (TCB). It is also less complex and easier to maintain. This latest update has both better performance and better scalability. It also better supports ARM architectures.

 

“Xen worked to meet the security needs of Specter and Meltdown”

Xen’s security has also benefited from several major improvements. Lars Kurth, chairman of the Xen Project Advisory Board, said in a statement: “The Xen project community has been working to meet the security needs of Specter and Meltdown.”

Xen did more than just patch the old security holes. Programmers have combined the best features of Xen paravirtualization (PV) and Hardware Assisted Virtualization (HVM) into PVH . This simplifies the interface between operating systems with Xen Project Support and the Xen Project hypervisor. It also reduces Xen’s attack surface.

The new version also includes the experimental support of PVH Dom0. When you run Xen in this mode, you lose about 1 million lines of VM QEMU code. This further reduces Xen’s attack surface. You can use it with PVH Dom0 or FreeBSD compatible Linux distributions . Fixes for this are currently under development. They will be available in the next major releases of Linux and FreeBSD.

 

Xen at the heart of public clouds

What does all this mean? Citrix Chief Technology Officer James Bulpin said in a statement: “The Xen Project 4.11 hypervisor is based on its maturity and flexibility as a reliable and secure hypervisor.” This combination with “several other performance, security and maintainability improvements” demonstrates the Xen community’s dedication to making Xen the best hypervisor for a wide range of use cases, from huge private clouds to embedded systems.

With Xen at the heart of so many public clouds, these improvements should make many users happy even if they have no idea that their work depends on it.

 

Data management plan and its related topics

To have proper data management, you need a proper data management plan. How to do this?

It comes to data management, they are data architecture, data quality management, data storage, date sharing, data security, data reference, contact data systems, data governance… There are many topics related to data management.

Leave a Reply

Your email address will not be published. Required fields are marked *

News Letters

SECURITY GUARANTEES AND DATA LOCALIZATION IN EUROPE

The European Commission has selected three European reference suppliers, but despite the sensitive nature of the market, it has not ruled out non-European suppliers since it also chose the American IBM and Microsoft. It believes that it has sufficient guarantees in terms of security and location of data. As the notion of sovereign cloud invoked […]

Read More
News Letters

Personal data: the Privacy Shield, a trompe l’oeil shield?

The European Commission was able to find an agreement in time to fill the legal vacuum created by the cancellation of the Safe Harbor. At stake is maintaining the ability for US companies to manage and exploit the personal data of EU citizens. But the text itself has not been disclosed to the public, nor […]

Read More
News Letters

Oracle Database Firewall protects databases by controlling the SQL queries

The new Oracle Database Firewall controls all database traffic and prevents attacks on Oracle and non-Oracle databases. Network-based security software monitors application behavior in real time and protects the database from SQL injection attacks and unauthorized access by enforcing “normal” database query behavior. At the RSA Conference in San Francisco, Oracle has now introduced the […]

Read More