Oracle-BEA's LiquidVM - InformationWeek
Mobile // Mobile Applications
12:00 AM

Oracle-BEA's LiquidVM

Have you ever wanted to run a Java application right on the metal, without concern for an OS? If you're developing a dedicated appliance or embedded system, even one with server-style capabilities, this can be very desirable. Oracle-BEA offers a product called LiquidVM (, which is based on the BEA JRockit JVM (, that runs right on a hypervisor (, without the need for an OS. 

This also implies that the box running LiquidVM (and the lower-lever hypervisor) can run no other applications besides the one running in the JVM. This may actually be desirable for embedded systems and appliances, where simplicity and raw performance are  important qualities.

Take a look at Oracle-BEA's description of LiquidVM:

LiquidVM provides the following features:

  • JRockit JVM as the Java runtime component.
  • Java run-time class libraries.
  • A scaled-down OS kernel that replaces the OS for LiquidVM. It differs from a normal OS in that it is a single-user, single-process environment that is designed to only run a single JVM. No other processes can be started. It implements the following services that the JRockit JVM needs to run Java:
    • Low-level memory management
    • Thread-scheduling
    • Filesystem
    • Networking
    • Interaction with the hypervisor
  • Java-based services, started after the JRockit JVM has started, that run in threads that are separate from your application. The LiquidVM services are:
    • LiquidVM SSH-service
    • LiquidVM heap-resizer
    • LiquidVM syslog publisher
  • Tools that are used to create and control LiquidVM instances. The LiquidVM tools run on a standard OS; they do not run inside LiquidVM. LiquidVM tools include:
    • LiquidVM launcher—used to start and stop LiquidVM instances
    • LiquidVM Configuration Wizard—used to configure the connection between LiquidVM and the VMware VirtualCenter
  • A virtual local disk for each WLS-VE instance. The local disk removes the dependence on NFS and provides faster and more secure file transfers

For a full description, go to


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of Data and Analytics
Today's companies are differentiating themselves using data analytics, but the journey requires adjustments to people, processes, technology, and culture. 
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on for the week of November 6, 2016. We'll be talking with the editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll