Security Working Group Members Goals and Interests. Cesare Garlati, Chief Security Strategist May 2015

Size: px
Start display at page:

Download "Security Working Group Members Goals and Interests. Cesare Garlati, Chief Security Strategist May 2015"

Transcription

1 Cesare Garlati, Chief Security Strategist May 2015

2 Methodology and sampling COMPANY NAME TITLE broadcom Marcus Kellerman Snr Director, Software Systems broadcom Sherman Chen VP Technology Broadband cupp Art Swift Chief Executive Officer elliptictech Mike Borza Chief Technology Officer ikanos Pramod Kaluskar Snr Manager Product Marketing imgtec David Capon Design Engineer imgtec David Lau VP Software Engineering imgtec Majid Bemanian Director of Marketing imgtec Sanjay Patel Senior Manager, Architecture imgtec Dave Roberts Senior Design Manager imperas Larry Lapides VP Sales ingenic LiQin Chen Software Director kernkonzept Adam Lackorzynski CTO kernkonzept Michael Hohmuth Chief Executive Officer lantiq Olaf Wachendorf Head of CPE Software qualcomm Brian Rosenberg Engineering Director qualcomm Kathy Giori Sr Product Manager sartura Luka Perkov Managing Director seltech Shoi Egawa President & CEO seltech Toshihide Watanabe General Manager Sales

3 Market forces behind the formation of the security group Demand Side Increasing demand for stronger security - $77B in 2015 Demand for hardware security layers - in addition to software New multitenant business models multiple service providers - trust Explosion of connected devices home / car / industrial - IoT New privacy / data protection regulations and bigger fines prpl Foundation Development of security open standards open security Open source community development and support Open source framework and APIs no royalties Reference frameworks open to ecosystem partners development Across vendors and architectures - initially focused on MIPS Supply Side Availability of security features at the silicon level - resiliency Availability of hardware support for virtualization - multitenancy Multicore architectures secure / not secure model doesn t scale Multiprocessor architectures multidomain security cpu, gpu, Proprietary security frameworks too expensive to implement

4 Charter: verbatim comments We see new requirements, new markets, the green field space is being formed we see a clear gap in this space and how you can deploy services based on virtualization protecting the box from being accessed or data extracted from the box. That's more of the aspect of security that we are interested to working with prpl on the more software that's involved, the less secure things tend to be just generally it's important to stress the 'feature' is security, a 'method' to deliver it is virtualisation virtualization may be too expensive in terms of hardware memory is still a major cost

5 Charter: objectives, deliverables and timeline Objectives Deliverables Timeline Define open source framework, specification, and set of API's to improve security in small footprint single purpose use cases facilitate the use of virtualization in multitenant / multidomain use cases Reference architecture including hardware, software and documentation Guest speaker series to improve understanding of emerging threat landscape Promote group s activity and standards across the industry Immediately Start thought leadership series (1 guest speaker per month) Q4Y2015 Reference architecture V1 (minimal scope) Q2Y2016 Reference architecture V2 (full scope)

6 Charter: hardware-level security scope Secure Boot Key mgm Crypto hd Secure JTAG Secure Video Streams Linux Containers Hypervisor Multitenant service provisioning Common security framework across hardware and software components

7 Openness to non-mips members and architectures Cross architecture has emerged as a key common requirement 1 prpl initial focus is on MIPS Some members believe an initial focus on MIPS can act as a catalyst for success All members already work across heterogeneous environments 2 3 prpl welcomes the contribution of all industry leaders will eventually encompass diverse architectures

8

The MIPS architecture and virtualization

The MIPS architecture and virtualization The MIPS architecture and virtualization Simply put, virtualization makes one physical device appear as one or more virtual devices. Virtualization can be implemented at the processor level (e.g. CPU or

More information

SOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT. Julian Chesterfield, Director of Emerging Technologies

SOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT. Julian Chesterfield, Director of Emerging Technologies SOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT Julian Chesterfield, Director of Emerging Technologies DEFINING SOFTWARE DEFINED! FLEXIBILITY IN SOFTWARE Leveraging commodity CPU cycles to provide traditional

More information

High Performance or Cycle Accuracy?

High Performance or Cycle Accuracy? CHIP DESIGN High Performance or Cycle Accuracy? You can have both! Bill Neifert, Carbon Design Systems Rob Kaye, ARM ATC-100 AGENDA Modelling 101 & Programmer s View (PV) Models Cycle Accurate Models Bringing

More information

The Role of the Operating System in Cloud Environments

The Role of the Operating System in Cloud Environments The Role of the Operating System in Cloud Environments Judith Hurwitz, President Marcia Kaufman, COO Sponsored by Red Hat Cloud computing is a technology deployment approach that has the potential to help

More information

Secure Containers. Jan 2015 www.imgtec.com. Imagination Technologies HGI Dec, 2014 p1

Secure Containers. Jan 2015 www.imgtec.com. Imagination Technologies HGI Dec, 2014 p1 Secure Containers Jan 2015 www.imgtec.com Imagination Technologies HGI Dec, 2014 p1 What are we protecting? Sensitive assets belonging to the user and the service provider Network Monitor unauthorized

More information

Servervirualisierung mit Citrix XenServer

Servervirualisierung mit Citrix XenServer Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86

More information

Multi-core Programming System Overview

Multi-core Programming System Overview Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,

More information

Hardware/microprocessor Run- time executive (real- time OS, hypervisor, etc.) Web messaging infrastructure

Hardware/microprocessor Run- time executive (real- time OS, hypervisor, etc.) Web messaging infrastructure Firmware Strategy for the Internet of Cars David Kleidermacher, CTO Green Hills Software The Internet of Things (IoT) trend can be defined as the rapid assimilation of the world s objects (anything that

More information

Bringing Intelligence to the Cloud Edge

Bringing Intelligence to the Cloud Edge Bringing Intelligence to the Cloud Edge Bringing compute capabilities closer to the real value Executive Summary The telecommunications industry is moving to cloud-based technologies at the network edge

More information

A hypervisor approach with real-time support to the MIPS M5150 processor

A hypervisor approach with real-time support to the MIPS M5150 processor ISQED Wednesday March 4, 2015 Session 5B A hypervisor approach with real-time support to the MIPS M5150 processor Authors: Samir Zampiva (samir.zampiva@acad.pucrs.br) Carlos Moratelli (carlos.moratelli@pucrs.br)

More information

A Mainframe Guy and Cloud Computing

A Mainframe Guy and Cloud Computing A Mainframe Guy and Cloud Computing Per Fremstad, IBM pensjonist 2 Computing models: A bit of history 1950 s / 60 s / 70 s - Centralized Sharing and reliability Dumb, text-based terminals ----> PC s 1980

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...

More information

Virtualization. Michael Tsai 2015/06/08

Virtualization. Michael Tsai 2015/06/08 Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%

More information

Next Generation Operating Systems

Next Generation Operating Systems Next Generation Operating Systems Zeljko Susnjar, Cisco CTG June 2015 The end of CPU scaling Future computing challenges Power efficiency Performance == parallelism Cisco Confidential 2 Paradox of the

More information

Red Hat VDI. David Simmons

Red Hat VDI. David Simmons Red Hat VDI David Simmons Senior Architect, Red Hat Virtualization AGENDA Open Source and the Evolution of Virtualization Desktop VDI Value Components Real VDI TCO The Future of the Desktop and the savings

More information

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Storage for Different Compute Clouds

Storage for Different Compute Clouds Storage for Different Compute Clouds Session D-203, OpenStorage: Use Cases Joe Arnold CEO, SwiftStack Inc. October 2013 1 Storage for Different Compute Clouds Essential elements of Cloud Different compute

More information

SaaS, PaaS & TaaS. By: Raza Usmani

SaaS, PaaS & TaaS. By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani SaaS - Introduction Software as a service (SaaS), sometimes referred to as "on-demand software. software and its associated data are hosted centrally (typically in the

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

Inadequacies of Current Risk Controls for the Cloud

Inadequacies of Current Risk Controls for the Cloud Inadequacies of Current Risk Controls for the Cloud Name: Michael Goldsmith Michael Auty, Sadie Creese and Paul Hopkins Venue: CPSRT@CloudCom2010, Indianapolis Date: 2 December 2010 Research supported

More information

Big Data in the Cloud Conference. Big Data Working Group

Big Data in the Cloud Conference. Big Data Working Group Big Data in the Cloud Conference + Big Data Working Group 1 CSCC Big Data in the Cloud Conference The Conference s goal is to help end-user organizations understand the current state and future directions

More information

Making Data Security The Foundation Of Your Virtualization Infrastructure

Making Data Security The Foundation Of Your Virtualization Infrastructure Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges

More information

WIND RIVER SECURE ANDROID CAPABILITY

WIND RIVER SECURE ANDROID CAPABILITY WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion

More information

Virtualizare sub Linux: avantaje si pericole. Dragos Manac

Virtualizare sub Linux: avantaje si pericole. Dragos Manac Virtualizare sub Linux: avantaje si pericole Dragos Manac 1 Red Hat Enterprise Linux 5 Virtualization Major Hypervisors Xen: University of Cambridge Computer Laboratory Fully open sourced Set of patches

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual

More information

Key Challenges in Cloud Computing to Enable Future Internet of Things

Key Challenges in Cloud Computing to Enable Future Internet of Things The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet

More information

ARM s role in Open Source software

ARM s role in Open Source software ARM s role in Open Source software The Network Infrastructure perspective Bob Monkman Enterprise Segment Marketing Manager September 2015 Open Source Software: definition Open source software is developed

More information

Shared Services Canada. Cloud Computing

Shared Services Canada. Cloud Computing Shared Services Canada Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design January 28, 2013 1 Agenda TIME TOPICS PRESENTER(S) 09:00 9:15 Opening Remarks

More information

Remote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014

Remote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014 Remote 2014 Monitoring & Control Securing Mobile Devices November 7 th 2014 Purpose / Agenda Ken Lewis, CISSP Director of Cross Domain Security Solutions for Tresys Technology Systems Security Engineer

More information

THE CHANGING FACE OF SDN. Guido Appenzeller 2014

THE CHANGING FACE OF SDN. Guido Appenzeller 2014 THE CHANGING FACE OF SDN Guido Appenzeller 2014 AGENDA Agenda: Why SDN? Origins of SDN Hypervisor Switches Bare Metal Switches Where is SDN today? 2013 BIG SWITCH NETWORKS, INC. WWW.BIGSWITCH.COM 2 CLOSED

More information

REVAMP YOUR IT CAREER AS A CLOUD SECURITY EXPERT

REVAMP YOUR IT CAREER AS A CLOUD SECURITY EXPERT REVAMP YOUR IT CAREER AS A CLOUD SECURITY EXPERT Here s a ringside view of some exciting and challenging careers in the cloud security realm. The advent of the cloud, which was once a niche concept, has

More information

Leveraging Thin Hypervisors for Security on Embedded Systems

Leveraging Thin Hypervisors for Security on Embedded Systems Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical

More information

Cyber Security in the Financial Industry

Cyber Security in the Financial Industry Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today

More information

How To Get The Most Out Of Redhat.Com

How To Get The Most Out Of Redhat.Com RED HAT ENTERPRISE VIRTUALIZATION AND CLOUD STRATEGY Aram Kananov EMEA Product Marketing Manager Platform and Cloud Business Units Red Hat 1 RED HAT BRINGS COMMUNITY, VENDORS, USERS TOGETHER 2 RED HAT

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...

More information

Making Multicore Work and Measuring its Benefits. Markus Levy, president EEMBC and Multicore Association

Making Multicore Work and Measuring its Benefits. Markus Levy, president EEMBC and Multicore Association Making Multicore Work and Measuring its Benefits Markus Levy, president EEMBC and Multicore Association Agenda Why Multicore? Standards and issues in the multicore community What is Multicore Association?

More information

Be Part of the Cloud Conversation Grow your share of wallet permanently. Start

Be Part of the Cloud Conversation Grow your share of wallet permanently. Start Be Part of the Cloud Conversation Grow your share of wallet permanently Start The Cloud Dilemma 1 2 3 Today, we each use several devices and multiple channels text, IM, email, voice and for some, video.

More information

Control your corner of the cloud.

Control your corner of the cloud. Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing

More information

Network functions Virtualisation CIO Summit 2013. Peter Willis & Andy Reid

Network functions Virtualisation CIO Summit 2013. Peter Willis & Andy Reid Network functions Virtualisation CIO Summit 2013 Peter Willis & Andy Reid Contents 2 1. What is Network functions Virtualisation (NfV) 2. Strategic Networking Paradigms & Software Defined Networks 3. 2011-2012

More information

THE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY. Ken Cheng, CTO, Brocade October, 2013

THE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY. Ken Cheng, CTO, Brocade October, 2013 THE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY Ken Cheng, CTO, Brocade October, 2013 Fundamentally we ve had to redesign and challenge the way we ve run distributed infrastructure

More information

Introduction to Cloud Computing DLT Solutions LL DL C T Solutions LL May 2011

Introduction to Cloud Computing DLT Solutions LL DL C T Solutions LL May 2011 Introduction to Cloud Computing DLT Solutions LLC May 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) cloud@dlt.com dl www.dlt.com/cloud #DLTCloud Your Hosts Van Ristau Chief

More information

Open: Broader and Deeper

Open: Broader and Deeper Open: Broader and Deeper A Vision for the Future of Open Hardware Development Aaron Sullivan Rackspace Senior Director and Distinguished Engineer The Future The Future The Future OUR PROGRESS Vertically

More information

Server-centric client virtualization model reduces costs while improving security and flexibility.

Server-centric client virtualization model reduces costs while improving security and flexibility. BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating

More information

YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE. Greg Lissy Director, Red Hat Virtualization Business. James Rankin Senior Solutions Architect

YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE. Greg Lissy Director, Red Hat Virtualization Business. James Rankin Senior Solutions Architect YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE Greg Lissy Director, Red Hat Virtualization Business James Rankin Senior Solutions Architect 1 THE VIRTUALIZATION MARKET HAS CHANGED The release of Red Hat Enterprise

More information

Citrix XenServer 7 Feature Matrix

Citrix XenServer 7 Feature Matrix Citrix XenServer 7 Matrix Citrix XenServer 7 Matrix A list of Citrix XenServer 7 features by product edition, including entitlements XenApp and XenDesktop license holders. The most comprehensive application

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

The Online Service Quality Solution. Bernd Harzog, CEO OpsDataStore Dave Wagner, CTO OpsDataStore

The Online Service Quality Solution. Bernd Harzog, CEO OpsDataStore Dave Wagner, CTO OpsDataStore The Online Service Quality Solution Bernd Harzog, CEO OpsDataStore Dave Wagner, CTO OpsDataStore Company Overview Team 60 years collective experience in enterprise systems and Applications Management:

More information

Virtualization is set to become a key requirement

Virtualization is set to become a key requirement Xen, the virtual machine monitor The art of virtualization Moshe Bar Virtualization is set to become a key requirement for every server in the data center. This trend is a direct consequence of an industrywide

More information

Securing the Virtualized Data Center With Next-Generation Firewalls

Securing the Virtualized Data Center With Next-Generation Firewalls Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks

More information

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends

More information

The Next Frontier for SDN: SDN Transport

The Next Frontier for SDN: SDN Transport The Next Frontier for SDN: SDN Transport Vishnu Shukla Verizon OIF President June 2, 2015 TIA 2015, Dallas Changing Role of Transport Networks A new kind of business customer Using both private and public

More information

What Cloud computing means in real life

What Cloud computing means in real life ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)

More information

Networking Services Trusted at every level and every phase

Networking Services Trusted at every level and every phase Networking Services Trusted at every level and every phase freescale.com/netservices Networking Services Overview Freescale has over 1000 in-house software resources providing networking expertise, software

More information

Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG

Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG 1 Virtualization: Hypervisors for Embedded and Safe Systems Hanspeter Vogel Triadem Solutions AG 2 Agenda Use cases for virtualization Terminology Hypervisor Solutions Realtime System Hypervisor Features

More information

IoT: Smart Vision Leads The Way

IoT: Smart Vision Leads The Way IoT: Smart Vision Leads The Way Peter McGuinness Multimedia Technology Marketing www.imgtec.com IoT is changing from amorphous to concrete: Imagination Technologies US Summit May 2015 2 IoT is changing

More information

Cloud Enterprise Computing Solutions BeLux. ArrowSphere xsp. arrow.com

Cloud Enterprise Computing Solutions BeLux. ArrowSphere xsp. arrow.com Cloud Enterprise Computing Solutions BeLux ArrowSphere xsp arrow.com The Arrow Difference At Arrow we aggregate. Enable. Build ecosystems. We anticipate market momentum, technology demands and adoption

More information

Cloud Enterprise Computing Solutions United Kingdom. ArrowSphere xsp. arrow.com

Cloud Enterprise Computing Solutions United Kingdom. ArrowSphere xsp. arrow.com Cloud Enterprise Computing Solutions United Kingdom ArrowSphere xsp arrow.com The cloud. It possesses extraordinary promise. But comes with complex challenges. ArrowSphere Enabling cloud service providers

More information

The Evolution of SDN and NFV Orchestration

The Evolution of SDN and NFV Orchestration INFONETICS RESEARCH SPECIAL REPORT The Evolution of SDN and NFV Orchestration February 2015 By Principal Analyst Michael Howard 1 Table of Contents INTRODUCTION 1 MANY TYPES OF ORCHESTRATION FOR SDN AND

More information

MORE INNOVATION WITHOUT VENDOR LOCK IN OPEN VIRTUALIZATION: Open Virtualization White Paper May 2009. Abstract

MORE INNOVATION WITHOUT VENDOR LOCK IN OPEN VIRTUALIZATION: Open Virtualization White Paper May 2009. Abstract OPEN VIRTUALIZATION: MORE INNOVATION WITHOUT VENDOR LOCK IN Open Virtualization White Paper May 2009 Abstract For many organizations, virtualization is an attractive strategy to ensure that datacenter

More information

Cyber Security. U.S. Executive Order 13636 and Critical Security Capabilities to Consider. Intel Corporation. White Paper. Authors

Cyber Security. U.S. Executive Order 13636 and Critical Security Capabilities to Consider. Intel Corporation. White Paper. Authors Cyber Security Intel Corporation U.S. Executive Order 13636 and Critical Security Capabilities to Consider White Paper Authors Amit Agrawal (Security Strategist, Intel) Jack Lawson (Director - Security,

More information

Practical Guide to Platform as a Service. http://cloud-council.org/resource-hub.htm#practical-guide-to-paas

Practical Guide to Platform as a Service. http://cloud-council.org/resource-hub.htm#practical-guide-to-paas Practical Guide to Platform as a Service http://cloud-council.org/resource-hub.htm#practical-guide-to-paas October, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards! Provide

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015

AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015 AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems Robert Leibinger 5 th June 2015 Agenda Architecture requirements for ADAS ECU Overview of different architecture approaches Compare and contrast

More information

Android Virtualization from Sierraware. Simply Secure

Android Virtualization from Sierraware. Simply Secure Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility

More information

How to Hear the Web Seminar

How to Hear the Web Seminar How to Hear the Web Seminar Click on Communicate in the top menu bar Select Integrated Voice Conference in the drop down Click Join to join the conference You will be able to listen to the presenter through

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

usa 98% PROGRAMME & EVENT HIGHLIGHTS The inaugural 5G Forum USA, saw an interesting mix 5G FORUM USA 2015 POST SHOW REPORT

usa 98% PROGRAMME & EVENT HIGHLIGHTS The inaugural 5G Forum USA, saw an interesting mix 5G FORUM USA 2015 POST SHOW REPORT 14-15 April 2015 Crown Plaza, Palo Alto, USA Part of: usa PROGRAMME & EVENT HIGHLIGHTS The inaugural 5G Forum USA, saw an interesting mix of carriers, solution providers, verticals & academics/ associations,

More information

Cloud Security Axians Carrier & Broadband Days. Christof Jungo C1, Public (Axians Carrier Days) September 15 Darmstadt

Cloud Security Axians Carrier & Broadband Days. Christof Jungo C1, Public (Axians Carrier Days) September 15 Darmstadt Cloud Security Axians Carrier & Broadband Days Christof Jungo C1, Public (Axians Carrier Days) September 15 Darmstadt C1, public use (Axians Carrier Days) Cloud 2002 Expo.02 artificial physical cloud in

More information

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com Next Generation Now: Virtualization A Unique Cloud Approach Jeff Ruby Channel Manager jruby@redhat.com Introducing Extensive improvements in every dimension Efficiency, scalability and reliability Unprecedented

More information

SDN IN TOMORROW'S DATA CENTER. Guido Appenzeller October, 2013

SDN IN TOMORROW'S DATA CENTER. Guido Appenzeller October, 2013 SDN IN TOMORROW'S DATA CENTER Guido Appenzeller October, 2013 CLOSED & PROPRIETARY NETWORKING EQUIPMENT Ver8cally Integrated Systems Have Changed LiEle Over the Past 15 Years Feature 1 Feature 2 Provisioning

More information

Virtualization Overview

Virtualization Overview VMWARE W HWHITE I T E PPAPER A P E R Virtualization Overview 1 Table of Contents Introduction... 3 Virtualization in a Nutshell... 3 Virtualization Approaches... 4 Virtualization for Server Consolidation

More information

FPGA Accelerator Virtualization in an OpenPOWER cloud. Fei Chen, Yonghua Lin IBM China Research Lab

FPGA Accelerator Virtualization in an OpenPOWER cloud. Fei Chen, Yonghua Lin IBM China Research Lab FPGA Accelerator Virtualization in an OpenPOWER cloud Fei Chen, Yonghua Lin IBM China Research Lab Trend of Acceleration Technology Acceleration in Cloud is Taking Off Used FPGA to accelerate Bing search

More information

Survey of Big Data Architecture and Framework from the Industry

Survey of Big Data Architecture and Framework from the Industry Survey of Big Data Architecture and Framework from the Industry NIST Big Data Public Working Group Sanjay Mishra May13, 2014 3/19/2014 NIST Big Data Public Working Group 1 NIST BD PWG Survey of Big Data

More information

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex

More information

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of

More information

Client Overview. Engagement Situation. Key Requirements for Platform Development :

Client Overview. Engagement Situation. Key Requirements for Platform Development : Client Overview Our client provides leading video platform for enterprise HD video conferencing and has product suite focused on product-based visual communication solutions. Our client leverages its solutions

More information

Introduction to Openstack, an Open Cloud Computing Platform. Libre Software Meeting

Introduction to Openstack, an Open Cloud Computing Platform. Libre Software Meeting Introduction to Openstack, an Open Cloud Computing Platform Libre Software Meeting 10 July 2012 David Butler BBC Research & Development david.butler@rd.bbc.co.uk Introduction: Libre Software Meeting 2012

More information

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator Confidentio Integrated security processing unit Including key management module, encryption engine and random number generator Secure your digital life Confidentio : An integrated security processing unit

More information

Flash and OpenStack in the Enterprise: An Accelerating Trend

Flash and OpenStack in the Enterprise: An Accelerating Trend Flash and OpenStack in the Enterprise: An Accelerating Trend Dave Wright Founder & CEO Roark Hiloman Data & Storage Technologist Why all the excitement about Cloud? We are now 10 years in to the Virtualization

More information

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing Yinong Chen 2 Big Data Big Data Technologies Cloud Computing Service and Web-Based Computing Applications Industry Control

More information

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'

More information

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS)

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) PSCR Public Safety Broadband Stakeholder Conference June 4 th, 2014 Alex Kreilein Technology Policy Strategist Office

More information

Open Source and Cloud. Ramesh Kumar

Open Source and Cloud. Ramesh Kumar Open Source and Cloud Ramesh Kumar Agenda Introduction to Open Source Potential Benefits Potential Disadvantages/ Risks Costs vis a vis Business Needs What is Cloud technology? Benefits V/s Risks of Cloud

More information

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models. Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,

More information

SCO Virtualization Presentation to Customers

SCO Virtualization Presentation to Customers SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization

More information

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. 2 While the core server virtualization market has matured, virtualization itself is seeing

More information

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape STRATEGIC WHITE PAPER The next step in server virtualization: How containers are changing the cloud and application landscape Abstract Container-based server virtualization is gaining in popularity, due

More information

Integrated Technology Plan (FY10 FY12)

Integrated Technology Plan (FY10 FY12) (FY10 FY12) Anne Arundel Community College embraces and promotes a seamless integration of appropriate technologies in support of the learning community within the framework of the college s mission and

More information

G-Cloud II Services Service Definition Accenture Cloud Infrastructure Implementation Services

G-Cloud II Services Service Definition Accenture Cloud Infrastructure Implementation Services G-Cloud II Services Service Definition Accenture Cloud Infrastructure Implementation Services 1 Table of Contents 1. Scope of our Services... 3 1.1. Data Centre Services... 3 1.2. Cloud Enterprise Services...

More information

The XenServer Product Family:

The XenServer Product Family: The XenServer Product Family: A XenSource TM White Paper Virtualization Choice for Every Server: The Next Generation of Server Virtualization The business case for virtualization is based on an industry-wide

More information

Mentor Embedded IVI Solutions

Mentor Embedded IVI Solutions Mentor Embedded IVI Solutions Infotainment Instrument Cluster Andrew Patterson andrew_patterson@mentor.com Business Development Director Automotive Embedded Software mentor.com/embedded Android is a trademark

More information

Virtualization benefits Introduction to XenSource How Xen is changing virtualization The Xen hypervisor architecture Xen paravirtualization

Virtualization benefits Introduction to XenSource How Xen is changing virtualization The Xen hypervisor architecture Xen paravirtualization www.xensource.com Virtualization benefits Introduction to XenSource How Xen is changing virtualization The Xen hypervisor architecture Xen paravirtualization Interoperable virtualization The XenEnterprise*

More information

EMA Advisory Note: Virtualization and Management Trends, Forecasts, and Recommendations (Summary)

EMA Advisory Note: Virtualization and Management Trends, Forecasts, and Recommendations (Summary) EMA Advisory Note: Virtualization and Management Trends, Forecasts, and Recommendations (Summary) Sponsored by: Virtualization is clearly a mission-critical production technology Written by Andi Mann Enterprise

More information

Understanding the Business Case of Network Function Virtualization

Understanding the Business Case of Network Function Virtualization White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building

More information