Security Working Group Members Goals and Interests. Cesare Garlati, Chief Security Strategist May 2015
|
|
- Shawn Wiggins
- 8 years ago
- Views:
Transcription
1 Cesare Garlati, Chief Security Strategist May 2015
2 Methodology and sampling COMPANY NAME TITLE broadcom Marcus Kellerman Snr Director, Software Systems broadcom Sherman Chen VP Technology Broadband cupp Art Swift Chief Executive Officer elliptictech Mike Borza Chief Technology Officer ikanos Pramod Kaluskar Snr Manager Product Marketing imgtec David Capon Design Engineer imgtec David Lau VP Software Engineering imgtec Majid Bemanian Director of Marketing imgtec Sanjay Patel Senior Manager, Architecture imgtec Dave Roberts Senior Design Manager imperas Larry Lapides VP Sales ingenic LiQin Chen Software Director kernkonzept Adam Lackorzynski CTO kernkonzept Michael Hohmuth Chief Executive Officer lantiq Olaf Wachendorf Head of CPE Software qualcomm Brian Rosenberg Engineering Director qualcomm Kathy Giori Sr Product Manager sartura Luka Perkov Managing Director seltech Shoi Egawa President & CEO seltech Toshihide Watanabe General Manager Sales
3 Market forces behind the formation of the security group Demand Side Increasing demand for stronger security - $77B in 2015 Demand for hardware security layers - in addition to software New multitenant business models multiple service providers - trust Explosion of connected devices home / car / industrial - IoT New privacy / data protection regulations and bigger fines prpl Foundation Development of security open standards open security Open source community development and support Open source framework and APIs no royalties Reference frameworks open to ecosystem partners development Across vendors and architectures - initially focused on MIPS Supply Side Availability of security features at the silicon level - resiliency Availability of hardware support for virtualization - multitenancy Multicore architectures secure / not secure model doesn t scale Multiprocessor architectures multidomain security cpu, gpu, Proprietary security frameworks too expensive to implement
4 Charter: verbatim comments We see new requirements, new markets, the green field space is being formed we see a clear gap in this space and how you can deploy services based on virtualization protecting the box from being accessed or data extracted from the box. That's more of the aspect of security that we are interested to working with prpl on the more software that's involved, the less secure things tend to be just generally it's important to stress the 'feature' is security, a 'method' to deliver it is virtualisation virtualization may be too expensive in terms of hardware memory is still a major cost
5 Charter: objectives, deliverables and timeline Objectives Deliverables Timeline Define open source framework, specification, and set of API's to improve security in small footprint single purpose use cases facilitate the use of virtualization in multitenant / multidomain use cases Reference architecture including hardware, software and documentation Guest speaker series to improve understanding of emerging threat landscape Promote group s activity and standards across the industry Immediately Start thought leadership series (1 guest speaker per month) Q4Y2015 Reference architecture V1 (minimal scope) Q2Y2016 Reference architecture V2 (full scope)
6 Charter: hardware-level security scope Secure Boot Key mgm Crypto hd Secure JTAG Secure Video Streams Linux Containers Hypervisor Multitenant service provisioning Common security framework across hardware and software components
7 Openness to non-mips members and architectures Cross architecture has emerged as a key common requirement 1 prpl initial focus is on MIPS Some members believe an initial focus on MIPS can act as a catalyst for success All members already work across heterogeneous environments 2 3 prpl welcomes the contribution of all industry leaders will eventually encompass diverse architectures
8
The MIPS architecture and virtualization
The MIPS architecture and virtualization Simply put, virtualization makes one physical device appear as one or more virtual devices. Virtualization can be implemented at the processor level (e.g. CPU or
More informationSOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT. Julian Chesterfield, Director of Emerging Technologies
SOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT Julian Chesterfield, Director of Emerging Technologies DEFINING SOFTWARE DEFINED! FLEXIBILITY IN SOFTWARE Leveraging commodity CPU cycles to provide traditional
More informationHigh Performance or Cycle Accuracy?
CHIP DESIGN High Performance or Cycle Accuracy? You can have both! Bill Neifert, Carbon Design Systems Rob Kaye, ARM ATC-100 AGENDA Modelling 101 & Programmer s View (PV) Models Cycle Accurate Models Bringing
More informationThe Role of the Operating System in Cloud Environments
The Role of the Operating System in Cloud Environments Judith Hurwitz, President Marcia Kaufman, COO Sponsored by Red Hat Cloud computing is a technology deployment approach that has the potential to help
More informationSecure Containers. Jan 2015 www.imgtec.com. Imagination Technologies HGI Dec, 2014 p1
Secure Containers Jan 2015 www.imgtec.com Imagination Technologies HGI Dec, 2014 p1 What are we protecting? Sensitive assets belonging to the user and the service provider Network Monitor unauthorized
More informationServervirualisierung mit Citrix XenServer
Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86
More informationMulti-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
More informationHardware/microprocessor Run- time executive (real- time OS, hypervisor, etc.) Web messaging infrastructure
Firmware Strategy for the Internet of Cars David Kleidermacher, CTO Green Hills Software The Internet of Things (IoT) trend can be defined as the rapid assimilation of the world s objects (anything that
More informationBringing Intelligence to the Cloud Edge
Bringing Intelligence to the Cloud Edge Bringing compute capabilities closer to the real value Executive Summary The telecommunications industry is moving to cloud-based technologies at the network edge
More informationA hypervisor approach with real-time support to the MIPS M5150 processor
ISQED Wednesday March 4, 2015 Session 5B A hypervisor approach with real-time support to the MIPS M5150 processor Authors: Samir Zampiva (samir.zampiva@acad.pucrs.br) Carlos Moratelli (carlos.moratelli@pucrs.br)
More informationA Mainframe Guy and Cloud Computing
A Mainframe Guy and Cloud Computing Per Fremstad, IBM pensjonist 2 Computing models: A bit of history 1950 s / 60 s / 70 s - Centralized Sharing and reliability Dumb, text-based terminals ----> PC s 1980
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
More informationVirtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
More informationNext Generation Operating Systems
Next Generation Operating Systems Zeljko Susnjar, Cisco CTG June 2015 The end of CPU scaling Future computing challenges Power efficiency Performance == parallelism Cisco Confidential 2 Paradox of the
More informationRed Hat VDI. David Simmons
Red Hat VDI David Simmons Senior Architect, Red Hat Virtualization AGENDA Open Source and the Evolution of Virtualization Desktop VDI Value Components Real VDI TCO The Future of the Desktop and the savings
More informationClodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage
Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is
More informationVirtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:
More informationStorage for Different Compute Clouds
Storage for Different Compute Clouds Session D-203, OpenStorage: Use Cases Joe Arnold CEO, SwiftStack Inc. October 2013 1 Storage for Different Compute Clouds Essential elements of Cloud Different compute
More informationSaaS, PaaS & TaaS. By: Raza Usmani
SaaS, PaaS & TaaS By: Raza Usmani SaaS - Introduction Software as a service (SaaS), sometimes referred to as "on-demand software. software and its associated data are hosted centrally (typically in the
More informationEnabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
More informationInadequacies of Current Risk Controls for the Cloud
Inadequacies of Current Risk Controls for the Cloud Name: Michael Goldsmith Michael Auty, Sadie Creese and Paul Hopkins Venue: CPSRT@CloudCom2010, Indianapolis Date: 2 December 2010 Research supported
More informationBig Data in the Cloud Conference. Big Data Working Group
Big Data in the Cloud Conference + Big Data Working Group 1 CSCC Big Data in the Cloud Conference The Conference s goal is to help end-user organizations understand the current state and future directions
More informationMaking Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
More informationWIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
More informationVirtualizare sub Linux: avantaje si pericole. Dragos Manac
Virtualizare sub Linux: avantaje si pericole Dragos Manac 1 Red Hat Enterprise Linux 5 Virtualization Major Hypervisors Xen: University of Cambridge Computer Laboratory Fully open sourced Set of patches
More informationWindows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationThe Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual
More informationKey Challenges in Cloud Computing to Enable Future Internet of Things
The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet
More informationARM s role in Open Source software
ARM s role in Open Source software The Network Infrastructure perspective Bob Monkman Enterprise Segment Marketing Manager September 2015 Open Source Software: definition Open source software is developed
More informationShared Services Canada. Cloud Computing
Shared Services Canada Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design January 28, 2013 1 Agenda TIME TOPICS PRESENTER(S) 09:00 9:15 Opening Remarks
More informationRemote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014
Remote 2014 Monitoring & Control Securing Mobile Devices November 7 th 2014 Purpose / Agenda Ken Lewis, CISSP Director of Cross Domain Security Solutions for Tresys Technology Systems Security Engineer
More informationTHE CHANGING FACE OF SDN. Guido Appenzeller 2014
THE CHANGING FACE OF SDN Guido Appenzeller 2014 AGENDA Agenda: Why SDN? Origins of SDN Hypervisor Switches Bare Metal Switches Where is SDN today? 2013 BIG SWITCH NETWORKS, INC. WWW.BIGSWITCH.COM 2 CLOSED
More informationREVAMP YOUR IT CAREER AS A CLOUD SECURITY EXPERT
REVAMP YOUR IT CAREER AS A CLOUD SECURITY EXPERT Here s a ringside view of some exciting and challenging careers in the cloud security realm. The advent of the cloud, which was once a niche concept, has
More informationLeveraging Thin Hypervisors for Security on Embedded Systems
Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical
More informationCyber Security in the Financial Industry
Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today
More informationHow To Get The Most Out Of Redhat.Com
RED HAT ENTERPRISE VIRTUALIZATION AND CLOUD STRATEGY Aram Kananov EMEA Product Marketing Manager Platform and Cloud Business Units Red Hat 1 RED HAT BRINGS COMMUNITY, VENDORS, USERS TOGETHER 2 RED HAT
More informationEnabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
More informationIoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
More informationWhy Choose VMware vsphere for Desktop Virtualization? WHITE PAPER
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...
More informationMaking Multicore Work and Measuring its Benefits. Markus Levy, president EEMBC and Multicore Association
Making Multicore Work and Measuring its Benefits Markus Levy, president EEMBC and Multicore Association Agenda Why Multicore? Standards and issues in the multicore community What is Multicore Association?
More informationBe Part of the Cloud Conversation Grow your share of wallet permanently. Start
Be Part of the Cloud Conversation Grow your share of wallet permanently Start The Cloud Dilemma 1 2 3 Today, we each use several devices and multiple channels text, IM, email, voice and for some, video.
More informationControl your corner of the cloud.
Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing
More informationNetwork functions Virtualisation CIO Summit 2013. Peter Willis & Andy Reid
Network functions Virtualisation CIO Summit 2013 Peter Willis & Andy Reid Contents 2 1. What is Network functions Virtualisation (NfV) 2. Strategic Networking Paradigms & Software Defined Networks 3. 2011-2012
More informationTHE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY. Ken Cheng, CTO, Brocade October, 2013
THE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY Ken Cheng, CTO, Brocade October, 2013 Fundamentally we ve had to redesign and challenge the way we ve run distributed infrastructure
More informationIntroduction to Cloud Computing DLT Solutions LL DL C T Solutions LL May 2011
Introduction to Cloud Computing DLT Solutions LLC May 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) cloud@dlt.com dl www.dlt.com/cloud #DLTCloud Your Hosts Van Ristau Chief
More informationOpen: Broader and Deeper
Open: Broader and Deeper A Vision for the Future of Open Hardware Development Aaron Sullivan Rackspace Senior Director and Distinguished Engineer The Future The Future The Future OUR PROGRESS Vertically
More informationServer-centric client virtualization model reduces costs while improving security and flexibility.
BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating
More informationYOUR STRATEGIC VIRTUALIZATION ALTERNATIVE. Greg Lissy Director, Red Hat Virtualization Business. James Rankin Senior Solutions Architect
YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE Greg Lissy Director, Red Hat Virtualization Business James Rankin Senior Solutions Architect 1 THE VIRTUALIZATION MARKET HAS CHANGED The release of Red Hat Enterprise
More informationCitrix XenServer 7 Feature Matrix
Citrix XenServer 7 Matrix Citrix XenServer 7 Matrix A list of Citrix XenServer 7 features by product edition, including entitlements XenApp and XenDesktop license holders. The most comprehensive application
More informationCloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
More informationThe Online Service Quality Solution. Bernd Harzog, CEO OpsDataStore Dave Wagner, CTO OpsDataStore
The Online Service Quality Solution Bernd Harzog, CEO OpsDataStore Dave Wagner, CTO OpsDataStore Company Overview Team 60 years collective experience in enterprise systems and Applications Management:
More informationVirtualization is set to become a key requirement
Xen, the virtual machine monitor The art of virtualization Moshe Bar Virtualization is set to become a key requirement for every server in the data center. This trend is a direct consequence of an industrywide
More informationSecuring the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
More informationInternational Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends
More informationThe Next Frontier for SDN: SDN Transport
The Next Frontier for SDN: SDN Transport Vishnu Shukla Verizon OIF President June 2, 2015 TIA 2015, Dallas Changing Role of Transport Networks A new kind of business customer Using both private and public
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationNetworking Services Trusted at every level and every phase
Networking Services Trusted at every level and every phase freescale.com/netservices Networking Services Overview Freescale has over 1000 in-house software resources providing networking expertise, software
More informationVirtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG
1 Virtualization: Hypervisors for Embedded and Safe Systems Hanspeter Vogel Triadem Solutions AG 2 Agenda Use cases for virtualization Terminology Hypervisor Solutions Realtime System Hypervisor Features
More informationIoT: Smart Vision Leads The Way
IoT: Smart Vision Leads The Way Peter McGuinness Multimedia Technology Marketing www.imgtec.com IoT is changing from amorphous to concrete: Imagination Technologies US Summit May 2015 2 IoT is changing
More informationCloud Enterprise Computing Solutions BeLux. ArrowSphere xsp. arrow.com
Cloud Enterprise Computing Solutions BeLux ArrowSphere xsp arrow.com The Arrow Difference At Arrow we aggregate. Enable. Build ecosystems. We anticipate market momentum, technology demands and adoption
More informationCloud Enterprise Computing Solutions United Kingdom. ArrowSphere xsp. arrow.com
Cloud Enterprise Computing Solutions United Kingdom ArrowSphere xsp arrow.com The cloud. It possesses extraordinary promise. But comes with complex challenges. ArrowSphere Enabling cloud service providers
More informationThe Evolution of SDN and NFV Orchestration
INFONETICS RESEARCH SPECIAL REPORT The Evolution of SDN and NFV Orchestration February 2015 By Principal Analyst Michael Howard 1 Table of Contents INTRODUCTION 1 MANY TYPES OF ORCHESTRATION FOR SDN AND
More informationMORE INNOVATION WITHOUT VENDOR LOCK IN OPEN VIRTUALIZATION: Open Virtualization White Paper May 2009. Abstract
OPEN VIRTUALIZATION: MORE INNOVATION WITHOUT VENDOR LOCK IN Open Virtualization White Paper May 2009 Abstract For many organizations, virtualization is an attractive strategy to ensure that datacenter
More informationCyber Security. U.S. Executive Order 13636 and Critical Security Capabilities to Consider. Intel Corporation. White Paper. Authors
Cyber Security Intel Corporation U.S. Executive Order 13636 and Critical Security Capabilities to Consider White Paper Authors Amit Agrawal (Security Strategist, Intel) Jack Lawson (Director - Security,
More informationPractical Guide to Platform as a Service. http://cloud-council.org/resource-hub.htm#practical-guide-to-paas
Practical Guide to Platform as a Service http://cloud-council.org/resource-hub.htm#practical-guide-to-paas October, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards! Provide
More informationCloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
More informationAUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015
AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems Robert Leibinger 5 th June 2015 Agenda Architecture requirements for ADAS ECU Overview of different architecture approaches Compare and contrast
More informationAndroid Virtualization from Sierraware. Simply Secure
Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility
More informationHow to Hear the Web Seminar
How to Hear the Web Seminar Click on Communicate in the top menu bar Select Integrated Voice Conference in the drop down Click Join to join the conference You will be able to listen to the presenter through
More informationIaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationusa 98% PROGRAMME & EVENT HIGHLIGHTS The inaugural 5G Forum USA, saw an interesting mix 5G FORUM USA 2015 POST SHOW REPORT
14-15 April 2015 Crown Plaza, Palo Alto, USA Part of: usa PROGRAMME & EVENT HIGHLIGHTS The inaugural 5G Forum USA, saw an interesting mix of carriers, solution providers, verticals & academics/ associations,
More informationCloud Security Axians Carrier & Broadband Days. Christof Jungo C1, Public (Axians Carrier Days) September 15 Darmstadt
Cloud Security Axians Carrier & Broadband Days Christof Jungo C1, Public (Axians Carrier Days) September 15 Darmstadt C1, public use (Axians Carrier Days) Cloud 2002 Expo.02 artificial physical cloud in
More informationNext Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com
Next Generation Now: Virtualization A Unique Cloud Approach Jeff Ruby Channel Manager jruby@redhat.com Introducing Extensive improvements in every dimension Efficiency, scalability and reliability Unprecedented
More informationSDN IN TOMORROW'S DATA CENTER. Guido Appenzeller October, 2013
SDN IN TOMORROW'S DATA CENTER Guido Appenzeller October, 2013 CLOSED & PROPRIETARY NETWORKING EQUIPMENT Ver8cally Integrated Systems Have Changed LiEle Over the Past 15 Years Feature 1 Feature 2 Provisioning
More informationVirtualization Overview
VMWARE W HWHITE I T E PPAPER A P E R Virtualization Overview 1 Table of Contents Introduction... 3 Virtualization in a Nutshell... 3 Virtualization Approaches... 4 Virtualization for Server Consolidation
More informationFPGA Accelerator Virtualization in an OpenPOWER cloud. Fei Chen, Yonghua Lin IBM China Research Lab
FPGA Accelerator Virtualization in an OpenPOWER cloud Fei Chen, Yonghua Lin IBM China Research Lab Trend of Acceleration Technology Acceleration in Cloud is Taking Off Used FPGA to accelerate Bing search
More informationSurvey of Big Data Architecture and Framework from the Industry
Survey of Big Data Architecture and Framework from the Industry NIST Big Data Public Working Group Sanjay Mishra May13, 2014 3/19/2014 NIST Big Data Public Working Group 1 NIST BD PWG Survey of Big Data
More informationComprehensive Security for Internet-of-Things Devices With ARM TrustZone
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex
More informationSECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
More informationClient Overview. Engagement Situation. Key Requirements for Platform Development :
Client Overview Our client provides leading video platform for enterprise HD video conferencing and has product suite focused on product-based visual communication solutions. Our client leverages its solutions
More informationIntroduction to Openstack, an Open Cloud Computing Platform. Libre Software Meeting
Introduction to Openstack, an Open Cloud Computing Platform Libre Software Meeting 10 July 2012 David Butler BBC Research & Development david.butler@rd.bbc.co.uk Introduction: Libre Software Meeting 2012
More informationConfidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator
Confidentio Integrated security processing unit Including key management module, encryption engine and random number generator Secure your digital life Confidentio : An integrated security processing unit
More informationFlash and OpenStack in the Enterprise: An Accelerating Trend
Flash and OpenStack in the Enterprise: An Accelerating Trend Dave Wright Founder & CEO Roark Hiloman Data & Storage Technologist Why all the excitement about Cloud? We are now 10 years in to the Virtualization
More informationIntroduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing
Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing Yinong Chen 2 Big Data Big Data Technologies Cloud Computing Service and Web-Based Computing Applications Industry Control
More informationNubo Software's UX over IP brings network efficiency to virtual mobile infrastructure
Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'
More informationOffice of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS)
Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) PSCR Public Safety Broadband Stakeholder Conference June 4 th, 2014 Alex Kreilein Technology Policy Strategist Office
More informationOpen Source and Cloud. Ramesh Kumar
Open Source and Cloud Ramesh Kumar Agenda Introduction to Open Source Potential Benefits Potential Disadvantages/ Risks Costs vis a vis Business Needs What is Cloud technology? Benefits V/s Risks of Cloud
More informationSee Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
More informationSCO Virtualization Presentation to Customers
SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization
More informationCitrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com
Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. 2 While the core server virtualization market has matured, virtualization itself is seeing
More informationSTRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape
STRATEGIC WHITE PAPER The next step in server virtualization: How containers are changing the cloud and application landscape Abstract Container-based server virtualization is gaining in popularity, due
More informationIntegrated Technology Plan (FY10 FY12)
(FY10 FY12) Anne Arundel Community College embraces and promotes a seamless integration of appropriate technologies in support of the learning community within the framework of the college s mission and
More informationG-Cloud II Services Service Definition Accenture Cloud Infrastructure Implementation Services
G-Cloud II Services Service Definition Accenture Cloud Infrastructure Implementation Services 1 Table of Contents 1. Scope of our Services... 3 1.1. Data Centre Services... 3 1.2. Cloud Enterprise Services...
More informationThe XenServer Product Family:
The XenServer Product Family: A XenSource TM White Paper Virtualization Choice for Every Server: The Next Generation of Server Virtualization The business case for virtualization is based on an industry-wide
More informationMentor Embedded IVI Solutions
Mentor Embedded IVI Solutions Infotainment Instrument Cluster Andrew Patterson andrew_patterson@mentor.com Business Development Director Automotive Embedded Software mentor.com/embedded Android is a trademark
More informationVirtualization benefits Introduction to XenSource How Xen is changing virtualization The Xen hypervisor architecture Xen paravirtualization
www.xensource.com Virtualization benefits Introduction to XenSource How Xen is changing virtualization The Xen hypervisor architecture Xen paravirtualization Interoperable virtualization The XenEnterprise*
More informationEMA Advisory Note: Virtualization and Management Trends, Forecasts, and Recommendations (Summary)
EMA Advisory Note: Virtualization and Management Trends, Forecasts, and Recommendations (Summary) Sponsored by: Virtualization is clearly a mission-critical production technology Written by Andi Mann Enterprise
More informationUnderstanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
More information