By using this technology, there is no risk of corrupting the host operating system.These hypervisors are directly installed on the hardware without the need for any other operating system.This article focuses on the guidelines for research scholars and practitioners in the domain of cloud computing and related technologies.
First, research scholars or academicians need to focus on their own interests and skills.
It cannot boot until the operating system is already up and running and, if for any reason the operating system crashes, all end users are affected.
This is a big drawback of Type 2 hypervisors, as they are only as secure as the operating system on which they rely.
Also, since Type 2 hypervisors depend on an OS, they are not in full control of the end users machine.
Hypervisors in the industry The table below gives a few examples of hypervisors and the corresponding cloud service provider companies.