ARM: Why Virtualization Belongs In Smartphone Hardware - InformationWeek
IoT
IoT
Infrastructure // PC & Servers
News
4/30/2012
11:46 AM
Connect Directly
Facebook
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
[Cyberattacks] Using Data as Your First Line of Defense
Aug 10, 2017
Attend this webinar to learn how you can determine which threats pose the greatest danger to your ...Read More>>

ARM: Why Virtualization Belongs In Smartphone Hardware

ARM's lead mobile strategist explains why virtualization is such an important trend for smartphones, and how ARM's Cortext-A15 fits in. See our video coverage.

ARM's cores are at the heart of almost every major smartphone CPU (Apple's being a rather large exception). The move to quad-core chipsets for tablets and smartphones came through ARM's continued push for innovation. ARM is planning more innovation in the coming year, such as Big Little--the idea that some tasks require minimal power but last a long time, whereas others consume much more power and devices will become smart enough to shift cores on that basis.

During the most recent episode of InformationWeek's Valley View--our monthly live Web TV series--ARM's lead mobile strategist, James Bruce, talked about another compelling innovation, involving virtualization. That is, the ability to create virtualized environments on a smartphone, where perhaps the more consumer-oriented applications and data reside in one virtual machine, and enterprise apps and data in another, thereby creating a more secure divide between the worlds of work and play.

ARM, Bruce said, is putting virtualization in hardware. He discusses why this is necessary, and why the impact (to performance and cost) will be negligible. Watch the whiteboard session in the video embedded below.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll