- Thread starter
- #41
S
S. Pidgorny
G'day:
"Kerry Brown" <kerry@kdbNOSPAMsys-tems.c*a*m> wrote in message
news:OiROnV08IHA.4468@TK2MSFTNGP06.phx.gbl...
> To get back to the original topic. I think that given the future of
> "cloud" computing or whatever you want to call it the network stack needs
> to be at a very low level in the OS and completely protected from all
> other processes including security software. A new code base is probably
> needed for this. I see a very minimal hypervisor based OS with hardware
> support, including networking, and not much else. Everything else would
> run in virtual machines. Each application would have it's own virtual
> machine and only talk to other applications and the OS through strictly
> enforced communications channels. The application would be free to supply
> it's own higher level OS, UI, or whatever you want to call it for it's own
> virtual machine. Applications could also have their own virtual file
> system completely inaccessible to other applications if they wanted.
> Hardware is advancing at a pace that this will be be possible in the near
> future if not already. We are currently using OS's that have security and
> other problems because they were designed to make the most of minimal
> hardware. Many compromises were made to get acceptable speed. We need an
> OS that is aware that things exist "out there somewhere" but it's core is
> isolated by hardware means. It's like having someone isolated in a missile
> silo with only a telephone line for communications. You also need a well
> guarded elevator to get a replacement operator and food in (updates) but
> this elevator is a physical mechanism that is well guarded and can be shut
> down in an emergency. All normal communications are done only through the
> phone line.
I would say - using single OS kernel and libraries, without virtualisation
layer and other interprocess barriers, is the most effective way to ustilise
computing resources.
We mustn't assume that the resources are unlimited. It is a popular
assumption lately though. Which is why we have new generation of software
that is capable of running like a snail even on more powerful systems, and
many problems with performance are being solved by throwing more hardware at
the issue.
Cloud computing presents an interesting change in security landscape.
--
Svyatoslav Pidgorny, MS MVP - Security, MCSE
-= F1 is the key =-
* http://sl.mvps.org * http://msmvps.com/blogs/sp *
"Kerry Brown" <kerry@kdbNOSPAMsys-tems.c*a*m> wrote in message
news:OiROnV08IHA.4468@TK2MSFTNGP06.phx.gbl...
> To get back to the original topic. I think that given the future of
> "cloud" computing or whatever you want to call it the network stack needs
> to be at a very low level in the OS and completely protected from all
> other processes including security software. A new code base is probably
> needed for this. I see a very minimal hypervisor based OS with hardware
> support, including networking, and not much else. Everything else would
> run in virtual machines. Each application would have it's own virtual
> machine and only talk to other applications and the OS through strictly
> enforced communications channels. The application would be free to supply
> it's own higher level OS, UI, or whatever you want to call it for it's own
> virtual machine. Applications could also have their own virtual file
> system completely inaccessible to other applications if they wanted.
> Hardware is advancing at a pace that this will be be possible in the near
> future if not already. We are currently using OS's that have security and
> other problems because they were designed to make the most of minimal
> hardware. Many compromises were made to get acceptable speed. We need an
> OS that is aware that things exist "out there somewhere" but it's core is
> isolated by hardware means. It's like having someone isolated in a missile
> silo with only a telephone line for communications. You also need a well
> guarded elevator to get a replacement operator and food in (updates) but
> this elevator is a physical mechanism that is well guarded and can be shut
> down in an emergency. All normal communications are done only through the
> phone line.
I would say - using single OS kernel and libraries, without virtualisation
layer and other interprocess barriers, is the most effective way to ustilise
computing resources.
We mustn't assume that the resources are unlimited. It is a popular
assumption lately though. Which is why we have new generation of software
that is capable of running like a snail even on more powerful systems, and
many problems with performance are being solved by throwing more hardware at
the issue.
Cloud computing presents an interesting change in security landscape.
--
Svyatoslav Pidgorny, MS MVP - Security, MCSE
-= F1 is the key =-
* http://sl.mvps.org * http://msmvps.com/blogs/sp *