Allow a user to have the experience as if they were working on their own computer when they are actually using a different one. Consider this possible future scenario: Joe is working on a presentation at home on his personal computer. On his home system he uses the same environment he does at work, including the same operating system, software applications, and IT policies. His home and office systems are virtually identical. Now, Joe needs to fly to a business conference. In the airport, a virtual environment that mirrors his home and office environment appears on a public computer.
Whether users are at home, at work, or on the road using a public computer, virtualization can be used to ensure that their computer environments are virtually identical. To access the virtual computing environment, Joe might log in using his thumbprint or a smart card or some other type of biometric authentication. This technology enables Joe to access his virtual computer using any physical hardware anywhere in the world. Although Joe does not necessarily own the physical computer he is working on at any given time, he does own the computing environment. The physical hardware can be anything from a PC to a PDA or even an advanced cell phone.
Virtualization uses overlays of the network using the power of the local computer. The user can always keep the personal environment, the virtual computer, in a keychain dongle and insert it into the public computer to begin working. In this way, platform virtualization creates a transparent, personalized computer environment.
Working in conjunction with academic research and industry participants, Intel® Research is conducting two projects, PlanetLab and Internet Suspend/Resume (ISR). The goal of these projects is to apply virtualization technologies to create transparent and personalized user experiences while providing unprecedented scalability for secure, autonomous, and flexible systems.
Virtualization lays the foundation for future computing systems and platform design. It is rooted in every layer of the computing system, from applications to platform components, interconnects, and processors. Supporting virtualization in every layer of the hardware ensures that computing systems are secure and autonomous and th
at complexities are managed transparently.