TechXchange: Hypervisors, Containers, and Virtual Machines

Isolating applications is a good way to secure a system and make it more reliable
April 29, 2026
3 min read

Building embedded system software can be challenging given the wide range of constraints from the amount of available memory to hardware security capabilities. Technologies like hypervisors, containers, and virtual machines (VMs) can make this task easier by providing isolation between software components. The content in this TechXchange focuses on the different approaches to application and operating-system isolation and security.

Click to see the list of topics

 

We're interested in what environment you're targeting now with respect to virtualization and containers. Take our quick poll and see what others are using.

Virtualization vs. Containers

There are many ways to provide isolated software environments depending on the hardware available plus the security and performance requirements of the application. Hardware virtualization tends to be the most secure, but it requires additional hardware found in higher-end processors that's often missing in microcontrollers.

Articles in this section look at the different approaches, including hardware virtualization, containers with and without operating-system support, and embedded language environments like Java and Python that utilize software VMs.

Image
Containers and virtual machines are two ways to deploy multiple, isolated services on a single platform. So how do they differ?
Thinkstock
Coding
Enterprise computing has delivered virtual machines, containers and now serverless programming. Find out where it fits for embedded developers.
Maciek905 | dreamstime.com
Ed Promo Maciek905 Dreamstime Xxl 112936792
Python programming is popular on the web and for AI applications but it can also be used for embedded applications.

Hypervisor and Virtual-Machine Architectures

Virtual machines and hypervisors can be supported in more than one way. These articles explore these approaches, especially for embedded applications.

Whats The Difference 583806094
Both hypervisors and separation microkernels with a virtualization layer support multiple guest OSes, but one focuses more on virtualization features while the other targets security...
Dreamstime_Suwin-Puengsamrong_88792593 and Ono Sokki
dreamstime_suwinpuengsamrong_88792593
Virtualization helps overcome the limitations of traditional test systems. By consolidating multiple PCs into a single solution, the system becomes more compact, cost-efficient...
congatec
congatec Starter 1 COM-HPC modules
Workload consolidation has massive benefits, but implementation concerns have held back OEMs. Pre-integrated hardware and software platforms address these challenges, making virtualizat...
congatec
promoaready
Real-time hypervisors — the central technology for workload consolidation — enable the safe execution of multiple workloads on a single hardware platform.
Hard Partitioning Secures Embedded Virtual Machines
Lynx Software’s MOSA.ic delivers hard, virtual-machine configurations for safety- and security-related applications.

Languages and Virtual Machines

While it's possible to build VMs for programming languages like C and C++, the results aren't necessarily useful or as secure as one might like simply due to the limited boundaries of the languages.

On the other hand, some high-level languages like Python and Java can be used with interpreted software- or compiler-based VMs that limit the access of applications within the confines of the language specification. These articles and videos examine what's available and the ensuing tradeoffs.

Maciek905 | dreamstime.com
Ed Promo Maciek905 Dreamstime Xxl 112936792
Python programming is popular on the web and for AI applications but it can also be used for embedded applications.
Image
Simon Ritter, Deputy CTO for Azul Systems, debunks and clarifies 11 myths swirling around the Java universe.
Use Containers with Zephyr OS
Leveraging WebAssembly, Atym’s system offers container support that runs on top of the Zephyr RTOS.
Dreamstime_Ozmosis_15682171
dreamstime_ozmosis_15682171_promo
Inside Electronics
Segger’s emApps provides an execution sandbox for embedded code.

Containers, Interpreters, and Kernel Architectures

Containers provide software isolation within an operating system or operating environment. This can be done using compiler technology to make sure the application can't exceed the limits of the virtual machine. These articles look at the different implementations and approaches available to embedded developers.

Maciek905 | dreamstime.com
Ed Promo Maciek905 Dreamstime Xxl 112936792
Python programming is popular on the web and for AI applications but it can also be used for embedded applications.
Use Containers with Zephyr OS
Leveraging WebAssembly, Atym’s system offers container support that runs on top of the Zephyr RTOS.
Dreamstime_Ozmosis_15682171
dreamstime_ozmosis_15682171_promo
Inside Electronics
Segger’s emApps provides an execution sandbox for embedded code.
New Promo Wizard Of Oz
Catching up on several interesting developments that slipped by due to volume, here’s a look at the TeaVM translator, Nvidia’s Jetson emulator, and Ubuntu’s MicroK8s container...
Electronic security
As the embedded world looks to security solutions to protect connected critical computing functions from external threats, two software platforms have emerged that, at first glance...
Dreamstime_Agsandrew_40383209
Background Dreamstime Agsandrew 40383209 Prom Onew
From an architecture standpoint, unikernels fit between virtual machines and containers in terms of virtualization technology.

Virtualization, Containers, and Security

One reason for using virtualization or containers is to improve security. Isolating applications can help reduce platform-level threats, but developers need to understand the details as well as the types of attacks that can be perpetrated. These articles examine aspects of system security, isolation guarantees, and attack surfaces, as well as common misconceptions about security.

Dreamstime_Funtap-P_131525868
Security Dreamstime Funtap P 131525868
Virtual machines and containers are widely used in embedded systems to consolidate workloads and enable DevSecOps, but which type of virtualization is more secure and is there...
Thinkstock
Hypervisors Bring Greater Security to Arm Cortex-A
The Arm TechCon conference spotlighted some of the latest hypervisor advances targeting Arm Cortex-A platforms.
11 Myths About Platform Security
Greater system complexity means more areas are vulnerable to security breaches. This article examines the role hardware and software play in ensuring a secure computing platform...
Mcos
Society continues to embrace technology, and advanced application spaces are being created/renewed/addressed in new and interesting ways.

Virtual-Machine and Container Environments

This section looks at some implementations of VMs and container environments for embedded applications. One area where virtualization has taken off is in the automotive space and particularly software-defined vehicles (SDVs).

congatec
promoaready
Find out how virtualization and pre-integrated hardware streamline system implementation.
NXP
Nxpa101 Promotional Image Web
Next-generation vehicles will be defined by software, not hardware, with cloud software concepts like containers delivering an agile approach to swapping out and updating software...
Green Hills Hypervisor Promo Dreamstime Xxl 159168556
Green Hills Software’s µ-visor enforces hardware separation in microcontrollers.
86140867 © Mikhail Mikhailin - Dreamstime.com
Transparent car
Software-defined vehicles (SDVs) are built around real-time networking.

I/O Virtualization

I/O virtualization is typically associated with hardware virtualization. It can isolate the application from the underlying hardware as well as enable sharing of a single device among different VMs in a transparent fashion. For example, a single Ethernet adapter can connect all of the VMs on a machine to the network.

Different approaches exist, such as single-root I/O virtualization (SR-IOV) and VirtIO. Articles in this section explore the I/O side of things. Containers and software VMs don't have to contend with these details as I/O is typically part of the software support provided to the isolated applications.

Adobe Stock
promoimage
Intel offers its perspective on why the auto industry needs silicon-enforced virtualization features to properly build software-defined vehicles.
Image
AMD’s new FirePro MxGPU series delivers virtualized GPUs for a range of applications including virtual desktop infrastructure (VDI) support.
Image
Intel and AMD dominate x86 enterprise servers because of their hardware-assisted virtual machine (HVM) support.
ID 140363531 © Chiradech Chotchuang - Dreamstime.com
PCI Express connectors
I/O virtualization at the device level can dramatically improve system performance by freeing system processors from emulation of those devices. Learn how to make I/O virtualization...
Electronic security
As the embedded world looks to security solutions to protect connected critical computing functions from external threats, two software platforms have emerged that, at first glance...
Almost exclusively a PCI Express issue, virtualization addresses processing clusters and links them to PCI Express end nodes. The system can employ standard hosts and end nodes...

More Electronic Design TechXchanges

ID 38307812 © Cammeraydave - Dreamstime.com
promo_id_38307812__cammeraydave__dreamstime
Check out the newest TechXchanges on Electronic Design
ID 38307812 © Cammeraydave | Dreamstime.com
id_38307812__cammeraydave__dreamstime
Search for a TechXchange

About the Author

William G. Wong

Senior Content Director - Electronic Design and Microwaves & RF

I am Editor of Electronic Design focusing on embedded, software, and systems. As Senior Content Director, I also manage Microwaves & RF and I work with a great team of editors to provide engineers, programmers, developers and technical managers with interesting and useful articles and videos on a regular basis. Check out our free newsletters to see the latest content.

You can send press releases for new products for possible coverage on the website. I am also interested in receiving contributed articles for publishing on our website. Use our template and send to me along with a signed release form. 

Check out my blog, AltEmbedded on Electronic Design, as well as his latest articles on this site that are listed below. 

You can visit my social media via these links:

I earned a Bachelor of Electrical Engineering at the Georgia Institute of Technology and a Masters in Computer Science from Rutgers University. I still do a bit of programming using everything from C and C++ to Rust and Ada/SPARK. I do a bit of PHP programming for Drupal websites. I have posted a few Drupal modules.  

I still get a hand on software and electronic hardware. Some of this can be found on our Kit Close-Up video series. You can also see me on many of our TechXchange Talk videos. I am interested in a range of projects from robotics to artificial intelligence. 

Sign up for our eNewsletters
Get the latest news and updates

Voice Your Opinion!

To join the conversation, and become an exclusive member of Electronic Design, create an account today!