KVM has made a place for itself among the industry’s most outstanding hypervisors for Linux. Currently, this hipervisor is deployed in a wide variety of processor architectures; even in mobile devices.
In addition, KVM is an important element in Network Functions Virtualization (NFV), since it drives the networking software to hardware with high performance and low cost.
The most read topics in our blog during last weeks have been Apple‘s decision about not renewing VMware‘s license agreement for server virtualization, UDS Enterprise & Nutanix Acropolis integration and Free Software Foundation 30th anniversary.
Find below the links to our top 3 posts according to our followers just in case you didn’t have the chance to read them yet:
Virtual machines live migration is a really interesting topic regarding virtualization, since guests continue growing (more CPUs, more RAM) and uptime demands are the same and long pauses between virtual machines migrating from one host to another are not expected.
Reading the article below, you’ll learn how to perform a live migration with QEMU/KVM hypervisor. In addition, the post includes interesting information about the early days, present and future of this hypervisor; paying special attention to the updates, optimization and the constant changes required in the design to meet the demands of the community.
In our post today we explain how to deploy and create KVM virtual machines under Red Hat based distros, such as RHEL, CentOS7 and Fedora 21.
First of all, you should make sure that the system has the necessary hardware virtualization extensions or that such extensions are enabled in the BIOS and that the KVM modules are loaded in the kernel.
Then, you should install packages qemu-kvm and qemu-img. These packages provide the disk image manager and the KVM user level.
The VDI architecture used by the University of Sevilla, the improvements in Citrix XenServer Workload Balancing an the new mobile virtual infrastruture have been the top 3 topics in our blog during the last two weeks.
Find below the links to these posts and have a look at them to find out why our followers have found them so interesting:
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.