yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
Cloud Expo & Virtualization 2009 East
Smarter Business Solutions Through Dynamic Infrastructure
Smarter Insights: How the CIO Becomes a Hero Again
Windows Azure
Why VDI?
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun's Incubation Platform: Helping Startups Serve the Enterprise
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Virtualization for Deeply Embedded Applications
Virtualization has penetrated far into the enterprise; now it's begun the march into portable electronics:

Readers of Virtualization Journal know that virtualization provides enormous benefits to makers and users of computing platforms ranging from desktops, to servers, and even supercomputers. The reasons for this are now obvious; cost savings through server consolidation, reduced administrative costs, and greater flexibility. Less obvious may be the degree to which virtualization can benefit deeply embedded applications such as cell phones, networking equipment, and point of sales terminals.   
While there are similarities in some of the value propositions involved, there are also substantial differences due to the more challenging timing and resource budgets of embedded devices. Real-time processing in embedded applications puts a premium on low latency, highly deterministic approaches to hypervisor design, while the available volatile and non-volatile memory is smaller, often by orders of magnitude, than that available in even a low end desktop machine.
The virtualization technique most often used in and enterprise computing or desktop application is known as “full” or “native” virtualization. In this approach, each instruction executed by a guest OS or application is trapped and each privileged instruction, instead of being executed by the underlying hardware platform, is processed by software that fully emulates the underlying hardware. This allows for the greatest flexibility in hosted software as essentially any and all software should, in theory at least, run unmodified. 
Unfortunately, this approach takes a relatively large amount of memory and processing overhead. In the enterprise space some of the overhead has been reduced by the inclusion by Intel and AMD of hardware virtualization support but the system overhead is still significant.  In the embedded space that hardware support is quite a bit less mature and the available processing overhead is typically not there.  While it is typical in a computing context to have ‘room for growth’ by virtue of more memory or speed than is strictly required at the time of purchase, in an embedded context this is more often than not labeled as ‘waste’ and not tolerated.
In order to get around this issue, most commercial virtualization vendors have adopted a technique known as “paravirtualization.”  In paravirtualization, the operating system and device drivers must be modified to take advantage of the characteristics of the hypervisor or Virtual Machine Monitor (VMM).  In this modification, calls to hardware are replaced by API calls to the hypervisor.  Since the analysis of which instructions must be managed, and just how those instructions should be managed, has all been done during the system’s design and development phase, no run time instruction trapping or analysis is required.  As a result, the performance overhead of operating virtual machines in a paravirtualized system is quite a bit lower, often by orders of magnitude than what was possible in full or native virtualization.  It also means that, as the hypervisor essentially owns hardware access, security between different virtualized domains is much greater, and systems can be built in a more robust fashion.
Why Should I Virtualize My Cell Phone?
I often wonder what the conversations were like years ago when microcontrollers were a new concept and customers would ask just what could be done with such a thing.  Most of the now common applications such as engine controls, GPS units, and cell phones would have seemed like so much science fiction.  But, once the basic building blocks were well understood by designers, applications began to come out of the woodwork and the microcontroller became just another generally accepted tool leading by stages to just those applications.
With virtualization we’re essentially at that same very early stage where designers may have heard of the technology, but they haven’t fully internalized that they have another tool in their toolkit.  The question now is more along the lines of  “what can be done with LOTs of virtual processors?”
When looking at the architecture of a cell phone, as often as not there’s a baseband processor that runs the actual communications, and a separate applications processor that does graphical display, multi-media, and other processing that’s not core to the phone’s basic functionality. Using virtualization, it’s very straightforward to integrate both apps processing and the radio stack on the same physical device saving BOM cost and also considerable development time.
Another area of study is how to support handset functionality in a robust fashion, and still have a degree of openness. The Open Handset Alliance’s “Android” platform attempts to answer the “openness” aspect, but actually does little to nothing to preserve the integrity of the handset, a critical issue with carriers.  Using virtualization it is possible to create highly secure and independent profiles for the basic phone function, and for the user, creating flexibility and preserving the integrity of the handset against malware or just simple user error. The Open and Secure Terminal Initiative or OSTI is a good example of this approach (

About Frank Altschuler
Frank Altschuler is in charge of marketing for Trango Virtual Processors, a leading provider of embedded virtualization IP. He has just recently joined Trango from Newisys where he was in charge of marketing for their X86 scaling solutions. He has previously held marketing positions at Starcore LLC, a DSP Intellectual property firm, and Cirrus Logic, a fabless semiconductor company. Prior to moving into marketing, Altschuler spent 15 years in engineering design and development in areas such as communications and electro-optics.
He has earned a bachelor's degree in electrical engineering from North Carolina State University. For more information on Trango Virtual Processors, please visit or email

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

Latest Cloud Developer Stories
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the...
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit f...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of cont...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the l...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relatio...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers