The Case for Device Namespaces
|
|
|
- Everett Stephens
- 10 years ago
- Views:
Transcription
1 The Case for Device Namespaces Oren Laadan September 18, aprilzosia
2 Device Namespaces Roots Based on research at Columbia University: Cells: A Virtual Mobile Smartphone Architecture Authors: Jeremy Andrus, Christoffer Dall, Alex Van t Hof, Oren Laadan, Jason Nieh. Proceedings of the 23 rd Symposium on Operating Systems Principles (SOSP 2011). Cascais, Portugal. October,
3 Mobile devices have multiple uses - 3
4 Mobile devices have multiple uses - - the device needs to reflect that. 4
5 Security Use Case Personal Phone Business Phone 5
6 Do People Remember? Only download apps from trusted sources, such as reputable app markets. Remember to look at the developer name, reviews, and star ratings. Always check the permissions an app requests. Use common sense to ensure that the permissions an app requests match the features the app provides. Be alert for unusual behavior on your phone. Suspicious behavior could be a sign that your phone is infected. These behaviors may include unusual SMS or network activity. Install a mobile security app for your phone that scans every app you download to ensure it s safe. 6
7 No, They Don t! Only download apps from trusted sources, such as reputable app markets. Remember to look at the developer name, reviews, and star ratings. Always check the permissions an app requests. Use common sense to ensure that the permissions an app requests match the features the app provides. Be alert for unusual behavior on your phone. Suspicious behavior could be a sign that your phone is infected. These behaviors may include unusual SMS or network activity. Install a mobile security app for your phone that scans every app you download to ensure it s safe. 7
8 No, They Don t! Only download apps from trusted sources, such as reputable app markets. Remember to look at the developer name, reviews, and star ratings. Always check the permissions an app requests. Use common sense to ensure that the permissions an app requests match the features the app provides. Be alert for unusual behavior on your phone. Suspicious behavior could be a sign that your phone is infected. These behaviors may include unusual SMS or network activity. Install a mobile security app for your phone that scans every app you download to ensure it s safe. 8
9 User Behavior is the #1 Security Risk Lack of user awareness about security policies Insecure web browsing Insecure Wi-Fi connectivity Lost or stolen mobile devices with corporate data Corrupt app downloaded to mobile devices Lack of security patches from service providers High rate of users changing/upgrading devices 9
10 More Use Cases Personal Phone Business Phone Children Phone Privacy Phone Secure Phone 10
11 Mobile Wallets 11
12 Even More Use Cases Personal Phone Business Phone Children Phone Privacy Phone Secure Phone Social Phone Guest Phone Dev Phone 12
13 Multi-Persona for Mobile Devices 13
14 The Usual Suspect Virtualization Every problem in computer science can be solved using another layer of abstraction. 14
15 Mobile Device Virtualization Typical device Linux kernel Device hardware 15
16 Nobody Will Notice? Performance Transparent Application Transparent Platform Transparent User Transparent 16
17 Bare-Metal Virtualization Typical device Virtual Phone Virtual Phone Linux kernel Device hardware Linux kernel Hypervisor Type I Device hardware Linux kernel 17
18 Bare-Metal (Type-I) Virtualization Suitable for servers standard hardware slow server replace rate strong security model Sub-optimal for mobile devices burden to support devices reduced performance / battery-life sub-optimal use of resources 18
19 Host-Based Virtualization Typical device Virtual Phone Virtual Phone Linux kernel Linux kernel Linux kernel Hypervisor Type II Device hardware Device hardware 19
20 Host-Based (Type-II) Virtualization Suitable for desktops rely on host for hardware rely on host for resources rely on host for security Sub-optimal for mobile devices weak security model (can trust host?) reduced performance / battery-life sub-optimal use of resources 20
21 Operating System Virtualization Typical device Virtual Phone Virtual Phone Linux kernel Namespaces Linux kernel Device hardware Device hardware 23
22 Operating System Virtualization Namespaces provide a group of processes with the illusion that they are the only processes on the system (LWN article) 24
23 Operating System Virtualization Challenge 1: hardware diversity plethora of peripherals not virtualized key logical devices not virtualized Challenge 2: interactive usage users interact with one app at a time foreground vs. background apps 25
24 Hardware Diversity A typical collection of peripherals available on a modern smartphone or tablet: Headset Microphone Speakers (Touch) Screen Power Buttons Telephony Bluetooth GPS WiFi Framebuffer GPU Compass Camera(s) Accelerometer RTC/Alarms 26
25 Device Namespaces Two roles: Virtualize physical and logical devices, to address hardware diversity Multiplex access to devices and switch contexts to allow interactive usage 27
26 Device Namespaces HW diversity: traditional virtualization create the illusion that processes interact exclusively with a set of devices hide the fact that other processes interact with the same set of devices Device major/minor (e.g. loop, dm), and device setup and internal state 28
27 Device Namespaces Interactivity: context-aware virtualization concept of an active namespace, with which the user actually interacts ability to switch namespaces, to allow interacting with multi-namespaces users really interact with one namespace at a time 29
28 Device Namespaces Namespaces Linux kernel GPU Framebuf Touch Camera(s) Headset Buttons GPS Device hardware 30
29 Framebuffer: single assignment? VP VP VP Framebuffer Linux kernel 31
30 Framebuffer: emulated hardware? VP VP VP Emulated Framebuffer Framebuffer Virtual State Linux kernel 32
31 Framebuffer: device namespaces Foreground Background Background Virtualized Framebuffer Framebuffer RAM Linux kernel 33
32 Framebuffer: device namespaces Foreground Background Background Virtualized Framebuffer Framebuffer RAM Linux kernel 34
33 Framebuffer: device namespaces Background Foreground Background Virtualized Framebuffer Framebuffer RAM Linux kernel 35
34 Experimental Benchmarks CPU (Linpack) Graphics (Neocore) Storage (Quadrant) Web browsing (SunSpider) Networking (custom) 36
35 Runtime Overhead (Idle) Baseline 1-VP 2-VP 3-VP 4-VP 5-VP Linpack NeoCore Quadrant I/O Sun Spider Network 37
36 Runtime Overhead (load) Baseline 1-VP 2-VP 3-VP 4-VP 5-VP Linpack NeoCore Quadrant I/O Sun Spider Network 38
37 Power Consumption Overhead Baseline 2-VP 4-VP After 4hrs Music 1-VP 3-VP 5-VP After 12hrs Idle 39
38 Device Namespaces Patches RFC patch-set posted in containers and lxc-devel mailing lists Includes 8 patches for: input, backlight, LED, framebuffer, some Demo of dual-namespaces and switch between them on Topic at containers mini-conf at LPC tomorrow 40
39 Summary Device namespaces bring virtualization to end-user devices. Active vs. non-active namespaces based on natural usage model Native performance (up to ~1% overhead in Vellamo benchmark) RFC patch-set posted in containers list, to be discussed in LPC 41
CELLS A Virtual Mobile Smartphone Architecture
CELLS A Virtual Mobile Smartphone Architecture Jeremy Andrus, Christoffer Dall, Alexander Van t Hof, Oren Laadan, Jason Nieh Columbia University 23rd ACM Symposium on Operating Systems Principles, Cascais,
Architecture (SOSP 2011) 11/11/2011 Minsung Jang
Cells: A Virtual Mobile Smartphone Architecture (SOSP 2011) Lunch TimeReading Group 11/11/2011 Minsung Jang Summary Novel Architecture for a Virtual Phone How to do away with overhead New way to virtualize
OpenEdge and Mobile Applications
PUG-Norway OpenEdge and Mobile Applications Gus Björklund. Wizard. Progress. PUG-Norway, Oslo, Norge, tirsdag 05.mars 2013 FinPUG, S/S Borea, Turku, Finland, 7-8.3.2013 Reminder: Turn your cell phones
Cloud Computing. Chapter 8 Virtualization
Cloud Computing Chapter 8 Virtualization Learning Objectives Define and describe virtualization. Discuss the history of virtualization. Describe various types of virtualization. List the pros and cons
Development. SriSeshaa Technologies. Table of Contents
SriSeshaa Technologies Development Table of Contents SriSeshaa Android Development... 2 Introduction to Android... 3 SriSeshaa Capabilities... 3 SriSeshaa Android Case Studies... 5 Privacy Guard... 5 Backup
Mark Bennett. Search and the Virtual Machine
Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business
Mobile App Testing Guide. Basics of Mobile App Testing
2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and
GHG Protocol Product Life Cycle Accounting and Reporting Standard ICT Sector Guidance. Chapter 7:
GHG Protocol Product Life Cycle Accounting and Reporting Standard ICT Sector Guidance Chapter : Guide for assessing GHG emissions related to software DRAFT January 0 Table of Contents GHG Protocol ICT
Introduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
GROUPTALK FOR ANDROID VERSION 3.0.0. for Android
for Android Requirements Android version 2.3 or later. Wi-Fi or mobile data connection of at least 20kbit/s network bandwidth. Optional: Bluetooth audio requires Android version 4.0.3 or later. Optional:
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
ANDROID OPERATING SYSTEM
ANDROID OPERATING SYSTEM Himanshi Grover,Devesh Agrawal IT Department, Dronacharya College Of Engg Gurgaon,Haryana,India Abstract - Android has become need rather than luxury these days. The computing
Introduction to Android
Introduction to Android Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch1, John Wiley & Sons, 2012 1. What is Android Android is a mobile operating system that is based on a modified
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
CSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel
CSE597a - Cell Phone OS Security Cellphone Hardware William Enck Prof. Patrick McDaniel CSE597a - Cellular Phone Operating Systems Security - Spring 2009 - Instructors McDaniel and Enck 1 2 Embedded Systems
Mobile Access Software Blade
Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.
RCN BUSINESS OFFICE MOBILITY FOR DESKTOP
RCN BUSINESS OFFICE MOBILITY FOR DESKTOP Quick Reference Guide 3 Office Mobility File Tools Help RECEIVING CALLS JOE SMITH Enter name or number + When someone calls your RCN Business number, you ll see
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Solution Guide Parallels Virtualization for Linux
Solution Guide Parallels Virtualization for Linux Overview Created in 1991, Linux was designed to be UNIX-compatible software that was composed entirely of open source or free software components. Linux
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Android Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
Berlin Institute of Technology FG Security in Telecommunications
Berlin Institute of Technology FG Security in Telecommunications Weiss L4Android: A Generic Operating System Framework for Secure Smartphones Workshop on Security and Privacy in Smartphones and Mobile
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring
AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring Chanmin Yoon*, Dongwon Kim, Wonwoo Jung, Chulkoo Kang, Hojung Cha Dept. of Computer Science Yonsei
Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser
Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software [email protected] @SymonPerriman Paul Zinn Senior
Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net
Super Manager User Manual English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net How to launch Super Manager? Click the Super Manager in Launcher or add a widget into your Launcher (Home
Remote Desktop on Mobile
Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Tablets in Data Acquisition
Tablets in Data Acquisition Introduction In the drive to smaller and smaller data acquisition systems, tablet computers bring a great appeal. Desktop personal computers gave engineers the power to create
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
MOVEIRO BT-200 Technical Information for Application Developer
MOVEIRO BT-200 Technical Information for Application Developer SEIKO EPSON CORPORATION 2014. All rights reserved. Rev.C Table of Content 1. Scope... 1 1.1 Purpose... 1 1.2 Major System Specification...
2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking?
2015 MDRT Annual Meeting e Handout Material Title: Speaker: What is Your Smartphone Leaking? Anwar Visram, CISSP Presentation Date: Wednesday, June 17, 2015 10:00 11:00 a.m. The Million Dollar Round Table
Android Virtualization from Sierraware. Simply Secure
Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility
Empowering Developers to Estimate App Energy Consumption. Radhika Mittal, UC Berkeley Aman Kansal & Ranveer Chandra, Microsoft Research
Empowering Developers to Estimate App Energy Consumption Radhika Mittal, UC Berkeley Aman Kansal & Ranveer Chandra, Microsoft Research Phone s battery life is critical performance and user experience metric
Mobile Phones Operating Systems
Mobile Phones Operating Systems José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-05-28 José Costa (DEI/IST) Mobile Phones Operating
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Android Commercial Spyware Disease and Medication
Android Commercial Spyware Disease and Medication By Eng. Mustafa Saad Computer Engineer 2003 Mobile App Developer 2011 Mobile Security Researcher 2012 Udemy Premium Instructor 2014 March 2016 Agenda Introduction.
Is Virtualization Killing SSI Research?
Is Virtualization Killing SSI Research? Jérôme Gallard, Geoffroy Vallée, Adrien Lèbre, Christine Morin, Pascal Gallard and Stephen L. Scott Aug, 26th Outline Context Cluster BS/SSI Virtualization Combining
The Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
-Android 2.3 is the most used version of Android on the market today with almost 60% of all Android devices running 2.3 Gingerbread -Winner of
1 2 3 -Android 2.3 is the most used version of Android on the market today with almost 60% of all Android devices running 2.3 Gingerbread -Winner of Internet Telephony Magazine s 2012 Product of the Year
Module Title: Software Development A: Mobile Application Development
Module Title: Software Development A: Mobile Application Development Module Code: SDA SDA prerequisites: CT1, HS1, MS001, CA Award of BSc. In Information Technology The Bachelor of Science in Information
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
CLOUD GAMING WITH NVIDIA GRID TECHNOLOGIES Franck DIARD, Ph.D., SW Chief Software Architect GDC 2014
CLOUD GAMING WITH NVIDIA GRID TECHNOLOGIES Franck DIARD, Ph.D., SW Chief Software Architect GDC 2014 Introduction Cloud ification < 2013 2014+ Music, Movies, Books Games GPU Flops GPUs vs. Consoles 10,000
Luxriot Broadcast Server Manual 21.01.2013
Luxriot Broadcast Server Manual 21.01.2013 Table of contents Introduction... 2 Luxriot Broadcast Server system requirements...3 Installation... 4 Luxriot Broadcast Server configuration...5 Broadcast Server
Lua as a business logic language in high load application. Ilya Martynov [email protected] CTO at IPONWEB
Lua as a business logic language in high load application Ilya Martynov [email protected] CTO at IPONWEB Company background Ad industry Custom development Technical platform with multiple components Custom
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone
Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011
Sophos Mobile Control User guide for Apple ios Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on an Apple iphone... 4 3 Set up
ipecs Communicator Installation and Operation Guide Please read this manual carefully before operating your set. Retain it for future reference.
ipecs Communicator Installation and Operation Guide ipecs is an Ericsson-LG Brand Please read this manual carefully before operating your set. Retain it for future reference. Revision History Issue Date
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,
Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
big.little Technology Moves Towards Fully Heterogeneous Global Task Scheduling Improving Energy Efficiency and Performance in Mobile Devices
big.little Technology Moves Towards Fully Heterogeneous Global Task Scheduling Improving Energy Efficiency and Performance in Mobile Devices Brian Jeff November, 2013 Abstract ARM big.little processing
BBM467 Data Intensive ApplicaAons
Hace7epe Üniversitesi Bilgisayar Mühendisliği Bölümü BBM467 Data Intensive ApplicaAons Dr. Fuat Akal [email protected] Overview What is Cloud CompuAng? VirtualizaAon Service Oriented CompuAng What is
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Firefox OS Features Guide
Firefox OS Features Guide Reviewer s [email protected] Guide [email protected] Contents About Mozilla 1 About Firefox OS 2 Getting Started with Firefox OS 3 Web Apps and Adaptive App Search 17 Privacy
Knut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
Virtualization Strategy with Oracle VM and Oracle Linux. Bjorn Naessens
with Oracle VM and Bjorn Naessens Join the buzz: Wifi pass: BANQ Twitter #oracleopenxperience @oopenxperience 2 About me Certifications OVM 2.x/3.x Implementation Specialist 5.x Certified Administrator
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
Boost your VDI Confidence with Monitoring and Load Testing
White Paper Boost your VDI Confidence with Monitoring and Load Testing How combining monitoring tools and load testing tools offers a complete solution for VDI performance assurance By Adam Carter, Product
Getting Started with Tizen SDK : How to develop a Web app. Hong Gyungpyo 洪 競 杓 Samsung Electronics Co., Ltd
Getting Started with Tizen SDK : How to develop a Web app Hong Gyungpyo 洪 競 杓 Samsung Electronics Co., Ltd Introduction to Tizen SDK Tizen Platform (1/2) Application Web Applications Native Applications
Mobile Application Development
Web Engineering Mobile Application Development Copyright 2015 Slides from Federico M. Facca (2010), Nelia Lasierra (updates) 1 2 Where we are? # Date Title 1 5 th March Web Engineering Introduction and
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Multi-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
nanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Premium Design Phone with Smartphone Connect
Smartphone Connect App Guide Premium Design Phone with Smartphone Connect Model No. KX-PRW130 Thank you for purchasing a Panasonic product. This document explains how to use the Smartphone Connect app.
Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months
Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months Our program is a practical knowledge oriented program aimed at making innovative and attractive applications for mobile
Workshop on Android and Applications Development
Workshop on Android and Applications Development Duration: 2 Days (8 hrs/day) Introduction: With over one billion devices activated, Android is an exciting space to make apps to help you communicate, organize,
V3 Storage Architecture Overview and Implications for VDI. May 2016
V3 Architecture Overview and Implications for VDI May 2016 Our Technology Philosophy At Sphere 3D, our philosophy is to reduce as many layers of abstraction between hardware and software as possible. 2
A Review OnEmployee Monitoring Application Using Android Smartphone s Neha S. Mankar 1, Sweeti M. Shambharkar 2 and Asst. Prof. Priti P.
A Review OnEmployee Monitoring Application Using Android Smartphone s Neha S. Mankar 1, Sweeti M. Shambharkar 2 and Asst. Prof. Priti P. Dafale 3 [email protected] 1 [email protected] 2 [email protected]
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:
Discovering Computers
Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown
Android Basics. Xin Yang 2016-05-06
Android Basics Xin Yang 2016-05-06 1 Outline of Lectures Lecture 1 (45mins) Android Basics Programming environment Components of an Android app Activity, lifecycle, intent Android anatomy Lecture 2 (45mins)
, ACTIVITY AND, SLEEP TRACKING SMARTWATCH
2, ACTIVITY AND, SLEEP TRACKING SMARTWATCH TIME CALLS ACTIVITY KEY FACTS UNIQUE SELLING POINTS PRICE 79,90 COMPATIBILITY ios, Android, Windows Phone, PC Windows, MAC DESIGN fashion and Swiss, Available
Intermedia Cloud Softphone. User Guide
Intermedia Cloud Softphone User Guide FOR MORE INFO VISIT: CALL US EMAIL US intermedia.net +1.800.379.7729 [email protected] 1 Contents 1 Introduction... 3 1.1 Cloud Softphone Features... 3 2 Installation...
CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup Emmanuel Agu What is Android? Android is world s leading mobile operating system Google: Owns Android, maintains it, extends
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
Introduction to Android: Hello, Android! 26 Mar 2010 CMPT166 Dr. Sean Ho Trinity Western University
Introduction to Android: Hello, Android! 26 Mar 2010 CMPT166 Dr. Sean Ho Trinity Western University Android OS Open-source mobile OS (mostly Apache licence) Developed by Google + Open Handset Alliance
MOBILE APPS. QA Testing for mobile applications
MOBILE APPS QA Testing for mobile applications How familiar are you with Apple devices? This question can be asked for apple devices as well as Android devices - depending on the company your interviewing
Programming the Internet of Things
Programming the Internet of Things Why Devices Need APIs December 8, 2014 Greg Burns Chair of Technical Steering Committee AllSeen Alliance 2 December 2014 AllSeen Alliance 1 Mobile The largest technology
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Kaspersky Security for Business
Kaspersky Security for Business Licensing Program Renewals and Upgrades: A Migration Guide Introducing Kaspersky s Security for Business software licensing program. Table 1: Renew and Upgrade to Increased
Introduction to the NI Real-Time Hypervisor
Introduction to the NI Real-Time Hypervisor 1 Agenda 1) NI Real-Time Hypervisor overview 2) Basics of virtualization technology 3) Configuring and using Real-Time Hypervisor systems 4) Performance and
KASPERSKY SECURITY FOR BUSINESS
KASPERSKY SECURITY FOR BUSINESS Licensing Program RENEWALS AND UPGRADES: A Migration Guide INTRODUCING KASPERSKY S SECURITY FOR BUSINESS SOFTWARE LICENSING PROGRAM. Kaspersky s latest endpoint release
