When there are only a few days left to say goodbye to this unusual year, we have compiled the Top 5 of the most read articles in our blog in 2020. As you may know, we strive to keep our readers up-to-date with the most outstanding news about virtualization in general, desktop and application virtualization in particular, Open Source technologies, and announcements, news, and case studies with UDS Enterprise, our software for VDI, vApp and remote access to physical and virtual machines.
During this atypical summer our blog has received thousands of visits from people interested in finding out about news related to the virtualization sector in general, VDI in particular, interesting topics such as free and Open Source technologies and the latest news from UDS Enterprise, our connection broker for desktop and application virtualization.
Intel has released a new version of Cloud Hypervisor, an Open Source virtual machine monitor (VMM) that runs on KVM. This new release includes support for vhost-user-blk backends. This allows users to plug av host-user based block device (for example, SPDK) to be connected to the hypervisor as a back-end of paravirtualized storage.
Before upgrading a virtual machine, it is recommended to make a snapshot to be able to revert a Domain/VM to a snapshot in case an error occurs during the upgrading process. There is a command to create a snapshot of a Virtual Machine (VM) while it is running.
Nutanix Ready certification achieved by UDS Enterprise, the growing success of KVM Linux hypervisor and the integration of our multiplatform connection broker for Windows & Linux and Red Hat Enterprise Virtualization (RHEV) have been the most read posts in our blog during the last two weeks.
Find below the link to these topics in case you dind’t have the chance to read them yet:
KVM has made a place for itself among the industry’s most outstanding hypervisors for Linux. Currently, this hipervisor is deployed in a wide variety of processor architectures; even in mobile devices.
In addition, KVM is an important element in Network Functions Virtualization (NFV), since it drives the networking software to hardware with high performance and low cost.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.