Presentation is loading. Please wait.

Presentation is loading. Please wait.

Dual Identity Devices By: Tony Peadick By: The Breakdown What is a dual identity device Why they were designed and who needs one How they work Availability.

Similar presentations


Presentation on theme: "Dual Identity Devices By: Tony Peadick By: The Breakdown What is a dual identity device Why they were designed and who needs one How they work Availability."— Presentation transcript:

1

2 Dual Identity Devices By: Tony Peadick By:

3 The Breakdown What is a dual identity device Why they were designed and who needs one How they work Availability Other dual-identity devices Conclusion

4 What is a Dual-Identity Device and who needs one? A smartphone containing an application that allows two operating systems to be run on the same device Typically used to combine a person’s personal phone and business phone onto one device Other uses would be for a person with two distinct secret families, or possibly even secret agents.

5 Why were they designed? BYOD (Bring Your Own Device)BYOD (Bring Your Own Device) –More employees are bringing their personal devices to work Benefits to EmployeeBenefits to Employee –More convenient to manage personal and work contacts –Keeps their private information secure –Reduces the number of devices an employee has to keep track of Benefits to BusinessBenefits to Business –Allows employees to access corporate data without compromising security. –Gives business the added security of being able to remotely delete data if the device becomes lost, stolen, or the employee quits or faces termination. –Reduced technology cost

6 So, how do they work? When you purchase the phone you have the option of using the native hypervisor, or an app that allows you to run two separate user interfaces. Hypervisor – Not your boss after too much coffee, it’s a Virtual Machine Manager(VMM) that can be hardware, software, or firmware which runs virtual machines.

7 So, how do they work? Allows the device to essentially create two instances of the same OS on one device that will run independently while sharing resources

8 So, how do they work? Type-1 hypervisor Hardware based system that runs two instances of the OS in distinct regions of the processor. Considered to be the more secure implementation. Type-2 hypervisor Software based system that produces a guest copy of the OS and runs it on top of the host OS, not in parallel. The guest must go through the host OS in order to access the hardware. Graphic: http://www.computerworld.com/s/article/9233834/Dual_identity_smartphones_could_bridge_BYOD_private_corporate_divide

9 Availability Second half of 2013 Red Bend –Type-1 hypervisor that will use newly developed mobile processors that are due to hit the market soon. –Have a partnership with ARM to develop the Cortex-A15 processor –ARM also has a partnership with AMD to develop x86 processors that are optimized for dual-identity devices.

10 Availability VM Ware –Initially worked to develop a Type-1 hypervisor, but found them to be hard to build, and difficult to maintain –Developed Horizon Mobile, a Type-2 hypervisor that will be embedded in the phones, or available via free download

11 Not Only For Smartphones VM Ware also has applications for data center infrastructure, workstations, enterprise desktops, virtualization accelerators, and free virtualization products.

12 Not Only For Smartphones Xen is a VMM for x86-compatible computers. It’s an open source Type-1 hypervisor that interacts directly with the hardware. Microsoft Virtual Server offers Window’s Server Virtualization that provides a stable, secure, and readily available server virtualization platform

13 Not Only For Smartphones Intel and AMD are working to apply virtualization capabilities to applications that are difficult to virtualize such as Input/Output-intensive databases One thing’s for sure, there will be plenty of choices for virtualization in the near future.

14 Conclusion A dual identity device runs two instances of the same operating system on one device Designed to make BYOD easier and more secure for businesses to implement Benefits both employer and employee Work using a Type-1 or Type-2 hypervisor Both types available by the end of 2013 Smartphones aren’t the only area where virtualization is evolving.

15 The End Any questions

16 Sources http://electronics.howstuffworks.com/smartphone.htm http://www.computerworld.com/s/article/9233834/Dual_identity_smartphones_could_brid ge_BYOD_private_corporate_divide http://www.businessweek.com/news/2013-01-10/rim-leads-phones-letting-employees- use-own-devices-on-job-tech http://www.computerworld.com/s/article/9233834/Dual_identity_smartphones_could_brid ge_BYOD_private_corporate_divide Mearian, L. (2013, Febuary Vol. 31 Issue 2 Vol. 31 Issue 2). Smartphones Could Separate Work and Play. PC World, pp. 15-15. http://www.webopedia.com/quick_ref/hypervisor.asp


Download ppt "Dual Identity Devices By: Tony Peadick By: The Breakdown What is a dual identity device Why they were designed and who needs one How they work Availability."

Similar presentations


Ads by Google