Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms
|
|
|
- Scot Morgan
- 10 years ago
- Views:
Transcription
1 Intel Cloud Builders Guide Intel Xeon Processor-based Servers Power Management & Security within Open Source Private Cloud with Intel & OpenStack Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Power Management & Security within Open Source Private Cloud with Intel & OpenStack Intel Xeon Processor 5500 Series Intel Xeon Processor 5600 Series Audience and Purpose This document is intended for cloud administrators and enterprise IT professionals deploying cloud solutions based on OpenStack*. The document describes the solution architecture of a private cloud based on OpenStack that includes several enhancements to security and energy efficiency that take advantage of Intel processor architecture, advanced technologies, and software components. September 2011
2 Table of Contents Executive Summary... 4 Introduction... 4 Extensions to OpenStack... 5 Server Power Management... 5 Server Security Management...5 Solution Architecture... 6 Test-bed Blueprint... 9 Design Considerations... 9 Hardware Description... 9 Physical Architecture Installation and Configuration Power Management Use Cases Use Case One: Real Time Server Power Purpose Pre-requisites Steps for Execution Results Use Case Two: Policy Based Resource Distribution using VM Migrations Purpose Pre-requisites Steps for Execution Results Use Case Three: Optimize Rack Density Purpose Pre-requisites Steps for Execution Results Enhanced Security Use Case Use Case One: Platform Attestation Purpose Pre-requisites Steps for Execution Results Things to Consider Architectural Considerations Power Management
3 Security Hardware Additional Usage Models under Development Group Level (Aggregated) Power Management Secure VM Provisioning and Migration Storage Management and Support for Additional Hypervisors Glossary APPENDIX A: Server Power Management Intel Power Management Technologies...23 Intel Intelligent Power Node Manager APPENDIX B: Intel Trusted Execution Technology
4 Executive Summary To help businesses take advantage of the economic benefits of cloud computing, Intel pursues a vision that centers on three themes essential for simplifying the design, deployment and operation of cloud computing solutions: federated, automated, and client-aware. Federated means communications, data, and services can move easily and securely within and across cloud computing infrastructures. Automated means that cloud computing services and resources can be specified, located, and securely provisioned with very little or zero human interaction. Client-aware means that cloud computing solutions are both aware of and able to adapt seamlessly to take advantage of the capabilities of the end user s device optimizing application delivery regardless of the type of device in hand. Intel executes on this vision by implementing open, standards-based cloud computing solutions through a variety of means including academic and industry research, the Open Data Center Alliance (ODCA), Intel Cloud Builders, engagement with ISV and OEM partners, and contributions to key open source virtualization and cloud computing projects. As a rapidly evolving open source project, OpenStack is designed to support massively scalable cloud computing infrastructures. Its adoption by a broad range of enterprises and service providers makes the implementation of usage models on this infrastructure widely useful. Recent customer surveys on cloud computing cite security and compliance as primary issues slowing the adoption of cloud computing. Comprehensive security requires an uninterrupted chain of trust from the application user interfaces to the underlying hardware infrastructure. Any gaps in this trust chain invite attack targets. Today, security mechanisms in the lower stack layers (for example, hardware, firmware and hypervisors) are almost absent. Yet another area of focus for leading solution providers and enterprises deploying massive scale datacenters is energy efficiency. Even though servers have become much more efficient, packaging densities and power have increased much faster. As a result, power and its associated thermal characteristics have become the dominant components of datacenter operational costs. This reference architecture (RA) addresses these security and energy efficiency issues through a solution architecture that illustrates several specific usage models implemented in the OpenStack framework. It meets the requirements for real-time power monitoring and capping capabilities, managing power consumption using Intel Intelligent Power Node Manager (Intel Node Manager). We also describe the concept of a trusted compute pool (TCP), which is a collection of physical platforms known to be trustworthy, using Intel Trusted Execution Technology (Intel TXT) available with Intel Xeon processors. Much of this implementation required the development of new software mechanisms, extensions to the OpenStack APIs, and enhancements to core components of the OpenStack architecture. The RA describes these modifications to OpenStack at a high level of detail. For more details of this work, we encourage customers to contact Intel representatives engaged with the OpenStack community at design summits, conferences, and other forums. Introduction The world s largest cloud service providers have long been working with Intel to take advantage of the innovations in performance, energy efficiency, virtualization, and security that Intel is bringing to the silicon, server, and datacenter technologies. Given this heritage and unique role in the industry, Intel was drawn to participate as the technical advisor of the Open Data Center Alliance, an end user organization delivering next generation data center and cloud requirements in an open, industry standard and vendor agnostic fashion. To transform the usage models defined by the Open Data Center Alliance and other end user requirements into real-world deployments, Intel partners with the industry through the Intel Cloud Builders Program. Furthermore, recognizing the pace of innovation sustained by open source projects, Intel is working on key open source virtualization and cloud computing projects to develop open source implementations for several usage models. The Intel Cloud Builders program brings together leading systems and software solutions providers to provide practical guidance on how to deploy, maintain and optimize a cloud infrastructure. As a central resource for reference architectures and best practices, Cloud Builders helps businesses accelerate their cloud deployments. Published by the Intel Cloud Builders program, cloud reference architectures, such as the one described in this document, include a combination of client, server, storage, or network hardware blueprints and a software architecture using a partner ISV software stack that clearly illustrates how to implement selected set of pre-defined use cases. OpenStack is an open source project designed to provide a massively scalable cloud operating system running on industry standard hardware. The technology consists of a series of interrelated projects delivering various components for a cloud infrastructure in private or public clouds. The project is backed by a global community of developers from over 100 companies including researchers, service providers, 4
5 and enterprises. All of the code is freely available under the Apache 2.0 license, allowing anyone to run it, build it, or submit changes back to the project. Intel is contributing to OpenStack to enable it to make more intelligent decisions about placing workloads on the physical infrastructure. Intel is enhancing low-level modules in OpenStack to expose various hardware characteristics such as trust, power consumption, quality of service, etc. -- up to the cloud management software. Intel is also enhancing the cloud software to make policy-based decisions that are informed by these hardware characteristics. And finally, Intel is enabling the operator to monitor the OpenStack deployment more closely via an updated management interface. As a result, OpenStack takes better advantage of advanced hardware technologies in modern server platforms and service providers are able to use their physical infrastructure more efficiently. The Open Source Private Cloud (OSPC) solution based on OpenStack* that Intel IT has developed demonstrates how enterprises can secure and manage a private cloud based on open source software by taking advantage of Intel technologies such as Intel TXT and Intel Node Manager. In addition to enabling OpenStack to exploit the advanced capabilities of Intelbased platforms, the web-based interface developed by Intel allows users and administrators to manage a virtualization environment based on multiple hypervisors such as Xen and VMware ESX. Some of these enhancements include: EC2-compatible interfaces for public clouds User control with different user groups, AD/LDAP authentication integration Policy-based resource monitoring and management Implement OpenStack object storage solution (Glance and Swift) Enterprise standard guest OS image provisioning and build (Microsoft Windows* 2003, 2008, SUSE) Low level physical RAS indicator through IPMI channel Third party monitoring solutions integration (Ganglia, Nagios) VM lease, snapshot, and migration Logging and report Unattended deployment package for flexible installation The rest of the paper will focus on the usage models around power management and security. Discussion on the remaining features of OSPC is out of the scope of this paper. Extensions to OpenStack Intel solutions for open source private cloud have extended OpenStack in below areas, which are also represented in Figure 1: Open source Xen hypervisor support and optimization Extended EC2 API New Intel Node Manager module running on OpenStack node for power management Modification to cloud controller and API modules to accommodate the new Intel Node Manager module Server Power Management Server power consumption is often an afterthought in data centers. For example, in many facilities the utility bill is bundled with the overall building charge which reduces the visibility of the data center cost. Even though servers have become much more efficient, packaging densities and power have increased much faster. As a result, power and its associated thermal characteristics have become the dominant components of operational costs. Power and thermal challenges in data centers include: Increased total operational costs due to increased power and cooling demands. Physical limitations of cooling and power within individual servers, racks, and data center facilities. Lack of visibility into actual real-time power consumption of servers and racks. Complexity of management components and sub-systems from multiple vendors with incompatible interfaces and management applications. These challenges to manage data centers can be translated into the following requirements: Power monitoring and capping capabilities at all levels of the data center (system, rack identification, and data center). What can be done at an individual server level becomes much more compelling once physical or virtual servers are scaled up significantly. Aggregation of the power consumed at the rack level and management of power within a rack group to ensure that the total power does not exceed the power allocated to a rack. Higher level aggregation and control at the row or data center level to manage power budget within the average power and cooling resources available. Optimization of productivity per watt through management of power at the server, rack, row, and data center levels to optimize TCO. 5
6 Application of standards-based power instrumentation solutions available in all servers to allow management for optimal data center efficiency. Extension of instrumentation to enable load balancing or load migration based on power consumption, and close coupled cooling for the management of pooled power and cooling resources. Intel Xeon processors starting from Intel Xeon 5500 series processors onwards support Intel Node Manager, which regulates power consumption through voltage and clock frequency scaling. Reducing the clock frequency reduces power consumption, as does lowering voltage. The scale of reduction is accomplished through a series of discrete steps, each with a specific voltage and frequency. Server Security Management Cloud architectures abstract the physical hardware from logical compute units consumed by the user. As virtualization proliferates throughout the data center, the IT manager can no longer point to a specific physical node as being the home to any one critical processes or data VMs may move to satisfy policies for high-availability, or resource usage. Regulatory compliance for certain types of data has also become increasingly difficult to enforce. Public cloud resources usually host multiple tenants concurrently, increasing the need for isolated and trusted compute infrastructure. In order to minimize security risks, it is essential to protect and validate the integrity of the infrastructure on an ongoing basis. This requires implementing the right tools and processes for protecting and validating all compute resources. One approach is to establish a root of trust where each server must have a component that will reliably behave in the expected manner, and contain a minimum set of functions enabling a description of the platform characteristics, and its trustworthiness. The value of Intel TXT is in the establishment of this root of trust, which provides the necessary underpinnings for reliable evaluation of the computing platform and the platform s level of protection. This root is optimally compact, extremely difficult to defeat or subvert, and allows for flexibility and extensibility to measure platform components during Figure 1 6
7 the boot and launch of the environment including BIOS, operating system loader, and virtual machine managers (VMM). Given the current nature of malicious threats prevalent in today s environment and the stringent security requirements many organizations employ, a system cannot blindly trust its execution environment. Solution Architecture Starting from the bottom layer, we have the physical node layer, the cloud management framework layer and the application layer. The physical node layer consists of the physical servers that are being managed by OSPC. The cloud management framework layer is the cloud management core layer that works in conjunction with the node layer and the application layer. It operates with the node layer for low level monitoring data collection and provides RESTful APIs for the application layer. The application layer is the cloud final management cockpit presented to end users. The physical node layer consists of different types of hypervisors including open source Xen & VMWare ESX, each hypervisor managing a bunch of virtual machines. The cloud management framework layer consists of hardware management, VM management and high level cloud management functionalities. Hardware management monitors the physical node for low level monitoring and data collection of thermal, base board, and voltage through NM/IPMI. VM management consists of: VM ops, which exposes EC2 compatible APIs and admin APIs for all the VM operations Network management manages and configures elastic IP and network configuration Image Store (Glance) is to utilize OpenStack Glance components to manage VM images which store images in OpenStack Swift Component, local drive, or Amazon S3 VM Monitor monitors disk usage, CPU usage, memory workload, network IO, and VM information on VM through Ganglia and Libvirt Security is for VM startup authentication through Intel TXT and OpenStack Key Pair authentication Storage management is to create, delete, detach, and attach storage volume through OpenStack Compute Volume or Glance High level cloud management consists of: Policy-based management to implement Migration, Storage, Voltage, Thermal, Power, CPU usage based policy management User management by User group integrates with AD/LDAP Authentication and IEM Access VM Lease management is to manage VM lease through OSPC Instance Expiration Monitor Report and Log management is to generate, store and show report/log through Nagios Monitoring Data collects via IPMI, Ganglia and libvirt, and stores in RRD database VM Migration, Snapshot and Failover is for high availability and flexibility in Cloud The cloud service management Cockpit (application layer) invokes and gets data from cloud management framework layer through RESTful APIs. It consists of: Resource indicator showing the resource usage and workload for VMs, CPU, memory, thermal and storage UI User access control for user/user group management and handling AD/LDAP and IEM authentication integration Policy based management for creating and maintenance of policies Infrastructure event management to manage the infrastructure event Config compliance service is to streamline SW version updates and compliance in the enterprise environment Status monitoring to monitor cloud, nodes, and VM status On-demand migration is the policybased V2V migration Event logging is to log and show nodes and VM service events SW delivery and automation service to automatically provide software stack based on SAAS 7
8 Figure 2 8
9 Test-bed Blueprint The test-bed is intended to provide a flexible environment for simulating those aspects of a commercial data center that are relevant cloud computing usage models. Design Considerations Features include: Intel Node Manager compliant systems along with Advance Configuration and Power Interface (ACPI) compliant power supply for real-time power monitoring. 1GbE and 10GbE networks for achieving optimal performance during virtual machine migrations. Hardware Description Functionality Software Hardware Description Cloud Controller SLES 11 SP1 OpenStack Compute Cactus Release Ganglia Intel Xeon CPU 2.53GHz with 1.5G RAM, 200GB SATA HDD Intel Baseboard Management Controllers (BMC) enabled Portal Server CentOS 5.5 Nagios Liferay Intel Modular Server System MFSYS25 (Clearbay) 2 Intel Xeon CPU 2.80GHz with 12G RAM, 100GB SATA HDD Intel BMC enabled Node Controller (3) Node Controller (2) Node Controller with Intel Node Manager Node Controller with Intel TXT Image Service Node SLES 11 SP1 Xen Hypervisor OpenStack Compute Cactus Release Ganglia SLES 11 SP1 Xen Hypervisor OpenStack Compute Cactus Release Ganglia SLES 11 SP1 Xen Hypervisor OpenStack Compute Cactus Release Ganglia Fedora 14 Xen Hypervisor OpenStack Compute Cactus Release Ganglia SLES 11 SP1 OpenStack Image Service Cactus Release Ganglia Intel Modular Server System MFSYS25 (Clearbay) 2 Intel Xeon CPU 2.80GHz with 12G RAM, 100GB SATA HDD Intel BMC enabled Intel Xeon CPU 2.53GHz with 1.5G RAM, 200GB SATA HDD Intel BMC enabled Intel Xeon CPU 2.53GHz with 5G RAM, 200GB SATA HDD Intel Intelligent Power Node Manager enabled Intel BMC enabled Intel Core i7 CPU 2.93GHz with 3.6G RAM, 90GB SATA HDD Intel BMC enabled Intel TXT enabled Intel Xeon CPU 2.53GHz with 1.5G RAM, 200GB SATA HDD Intel BMC enabled 9
10 Physical Architecture Figure 3 Installation and Configuration Intel is currently working on getting the required approvals to submit the OSPC solution to the open source community and this paper will be refreshed after the approval with the appropriate links to the source code and setup documents. In the meanwhile if you need any help please contact the Intel sales team or go to the discussion forum on the Intel Cloud Builders forum. 10
11 Power Management Use Cases Use Case One: Real Time Server Power Monitoring Power monitoring is a critical capability that enables us to characterize workloads and identify opportunities to increase data center energy efficiency. 1. Purpose Server power monitoring helps us find and manage data center hotspots and thereby reduce the chances of hardware failure. The analysis of the historical usage of power consumption data enables us to develop forecast models for data center planning. These forecast models are very accurate as they are based on the real-time data. 2. Pre-Requisites Intel Node Manager enabled hypervisor hosts, which can be a combination of open source Xen and VMware ESX Steps for Execution Log in to the management portal using administrative credentials. 11
12 Click on the Power tab on the top. In the next screen, you have either the option to view the historical usage of power or choose the real time power monitoring option. In our case we would click on the Power Monitor option at the bottom on the screen. Click on "Power Monitor" Choose the Intel Node Manager compliant server with in the cluster. 12
13 4. Results Real time power utilization of the server is shown. 13
14 Use Case Two: Policy Based Resource Distribution using VM Migrations 1. Purpose Real-time power consumption allows us to perform power aware resource distribution. Virtual machines that run the workload can be relocated to optimize and rebalance power margins based on measurements. The virtual machines can be relocated from power constrained systems to un-constrained systems within the cluster or across different clusters for better system utilization and performance. 2. Pre-Requisites Intel Node Manager compliant server with few VMs. 3. Steps for Execution Click on the Policy tab at the top. Create a new policy with the action of migration as shown below. Here we have created a policy that gets activated when the power utilization of the server chosen goes beyond the threshold value specified. Save the policy and ensure that it is enabled. Below screen shot shows the two VMs currently running on Server8. 14
15 Simulate a workload on the node and monitor the power consumption. 15
16 4. Results TThe VM(s) running on the power constrained server to an un-constrained system once the server goes beyond the threshold value. As you see in the below screenshot, both of the VMs have been migrated out of the server on to other unconstrained servers within the cluster. VMs migrated from Server8 to flex-tr server 16
17 Use Case Three: Optimize Rack Density 1. Purpose The collection of real-time power consumption data constitutes an essential capability for power monitoring. Without this data, the best approximation for server power usage comes from the manufacturer s specifications. To use the nameplate numbers as a guidepost requires the allowance of a hefty safety margin. To honor the safety margin in turn leads to data center power overprovisioning and stranded power that needs to be allocated in case it is needed, but is very unlikely to be used. This situation results in over-provisioned data center power, overcooling of IT equipment, and increased TCO. The availability of power monitoring data allows management by numbers, which tightly matches servers by power consumption to available data center power. The use case is useful in older data centers under-provisioned for power and in host settings with power quotas in effect. In typical host data centers where the customers are allocated power quotas, the main goal is to optimize the rack utilization so as to place as many servers in a rack as the power limit allows in order to maximize the microprocessor without interlocked pipeline stages (MIPS) yield. The number of machines will be so large that all machines will likely need to operate under a permanent cap. However, the overall MIPS yield for the collection of machines will be larger than otherwise possible for any combination of machines running uncapped, but whose aggregate power consumption is still subject to the rack power quota. 2. Pre-requisites To measure the power utilization of the servers in the rack over a period of time and capture the maximum power utilized at the peak workload. 3. Steps for execution Click on the Policy tab at the top. Create a new policy with the action of power capping as shown below. Here we have created a policy that ensures that the power usage of the server will not go beyond the threshold value specified. Ensure that this threshold value is little lower than the maximum power utilization of the server captured earlier. Setting the threshold value to a value lower than the maximum will allow us to demonstrate the power capping policy. Note: In reality, the threshold value would be higher than the maximum power utilization to ensure that the workload performance is not impacted. Save the policy and ensure it is enabled. 17
18 Initiate the workload on the server for which the policy is enabled so as to increase the power utilization. 18
19 4. Results The below screenshot shows that the power utilization of the server stays within the threshold limit set from the server, which is 185 watts. In the earlier use case we observed that without any power cap, the power utilization of the server went up to about 275 watts Note: Please note that the Intel Node Manager always tries to honor the power cap setting. But in certain cases, where the workload demand is very high, it will try to come down to the lowest p-state possible, if not to the level requested. Note: Since the current version of our management solution does not support group level power capping, we need to set power caps at the individual server level for all the servers within the rack to optimize the rack density. 19
20 Enhanced Security Use Case Use Case One: Platform Attestation 1. Purpose In today s increasingly virtualized environment, security concerns are amplified due to the complication of security management through: Multi-tenancy, employed to increase density and efficiency in the data center, and Software trust requirements combined with physical abstraction. The purpose of this usage model is to showcase how Intel TXT can help address these problems, through the creation of a pool of trusted hosts, each with Intel TXT enabled, and through the validation of the launch of the platform and hypervisor. This trusted platform ensures that even if one VM is compromised, the physical host is still trusted and other VMs that co-exist can continue to run without any concerns. This trusted platform assures that physical hosts can maintain trust and prohibit compromised VMs access to their resources, and that trusted nodes can be managed in a scalable fashion. 2. Pre-Requisites One cluster that consists of hypervisor hosts with Intel TXT and Intel Node Manager capabilities. 3. Steps for Execution Complete the configuration as specified in Installation and Configuration. Login to the OSPC portal and go to the home page. Click on the Security tab at the top and choose the Intel TXT enabled server for which we need to verify the status of platform attestation. In our demo environment, Server11 is the one that is enabled for Intel TXT. 20
21 4. Results The tree view of the OSPC home page displays a green icon next to the Server11 indicating that the Server11 is a trusted server, which is based on Xen Status of Server11 changed to Trusted Things to Consider Architectural Considerations 1. Power Management Power management should be considered after careful analysis of the workload performance under various power capping. As mentioned earlier, there are many usage models for which a power management solution would be very beneficial. At the same time, there are scenarios wherein power management may not be the right option. For example, if a highly-sensitive production workload is very processor intensive and the host is already highly utilized, the addition of a power cap would inadvertently affect the performance of the system. 2. Security Security is one of the key considerations in server deployments, either virtualized or bare-metal. In a cloud deployment scenario, from both the perspective of the service provider and consumer, it is highly recommended to use platforms that support Intel TXT, such as Intel Xeon processor 5600 series, along with supporting software platforms to create a trusted cloud environment that enjoys strong protection against compromise. 3. Hardware A full discussion of processor and overall server performance considerations is beyond the scope of this paper. However, it is important to note that the performance of VMs that run in a virtualized platform is heavily influenced by factors of processor architecture and specific feature sets available in the processor. The use of high performance server processors equipped with virtualization and I/O support feature sets, such as Intel Xeon processor 5500 and 5600 series, which also supports Intel Node Manager is strongly recommended. For more details on Intel Virtualization technologies please refer to www. intel.com/technology/virtualization/ and download.intel.com/business/ resources/briefs/xeon5500/xeon_5500_ virtualization.pdf. 21
22 Additional Usage Models Under Development 1. Group Level (Aggregated) Power Management In this paper we demonstrated power monitoring and capping at individual server levels. In the future versions, there would be capabilities to both monitor and cap at an aggregated or group level. Here the user would put a power cap say at the rack level, which then would be distributed internally to all the servers within the rack. The power allocation to the individual servers would depend upon the historical usage of the servers. 2. Secure VM Provisioning and Migration In the current version of OSPC, only the trust status of the platform is being shown. Going ahead the capability for the end user to request for a trusted host to run their VM would be added. Internally OSPC would provision the new VM on a trusted host and in case the VM needs to be migrated either because of maintenance or resource distribution, it would be migrated on to another trusted host. 3. Storage Management and Support for Additional Hypervisors Future releases of OSPC would have additional capabilities for storage management for VMs and would be supporting additional hypervisors including Microsoft Hyper-V* and KVM. Glossary Intel Intelligent Power Node Manager (Intel Node Manager): Intel Node Manager resides on Intel Xeon processor 5500 series server (and later) platforms. It provides power and thermal monitoring and policy based power management for an individual server. Capabilities are exposed through standard intelligent platform management interface (IPMI) interface from supported Baseboard Management Controllers (BMC). This requires an instrumented power supply such as PMBus*. Intel Trusted Execution Technology (Intel TXT): a hardware solution that validates the behavior of key components within a server or PC at startup. Authenticated Code Modules (ACM): Platform-specific code that is authenticated to the chipset and that is executed in an isolated environment within the CPU. This term is also used to denote Authenticated Code Mode that is a trusted environment enabled by an AC Module to perform secure tasks. Measured Launch Environment (MLE): An environment that is measured and launched as a result of the GETSEC [SENTER] instruction. This can be an operating system, virtual machine manager, or any trusted code that supports Intel TXT. Trusted Platform Module (TPM) 1.2 (third party silicon): A hardware device defined by the Trusted Compute Group that provides a set of security features used by Intel TXT. Secure Initialization (SINIT): A trusted process that measures, validates, and launches an MLE. Safer Machine extensions (SMX): The capabilities added to Intel processors that enable Intel TXT. Trusted Computing Group (TCG): Industry initiative for advancing computer security ( trustedcomputinggroup.org) Virtual Machine Extensions (VMX): A set of processor instructions defined by Intel Virtualization Technology that software uses to provide isolation and protection for virtual environments (part of VT-x). Intel Virtualization Technology for Directed I/O (Intel VT-d): Hardware support component of Intel Virtualization Technology for management of DMA and interrupts generated by I/O devices. Intel Virtualization Technology for Execution (Intel VT-x): A set of processor instructions (VMX) and capabilities defined by Intel Virtualization Technology that software uses to provide isolation and protection for virtual environments. 22
23 References 1. Intel Intelligent Power Node Manager, technology/intelligentpower/index. htm 2. Intel Xeon Processor 5500 Series, products/xeon/5500/index.htm 3. Intelligent Platform Management Interface, design/servers/ipmi/ipmi.htm 4. PMBus*, 5. Advanced Configuration & Power Interface, APPENDIX A: Server Power Management Intel Power Management Technologies Micro-processors are possibly the most energy intensive components in servers and have traditionally been the focus of power management strategies. Emerging technologies such as solid state drives have the potential to significantly reduce power consumption and in future, management of memory power consumption may be incorporated. Intel Node Manage 1 is designed to address typical data center power requirements such as described above. Intel Node Manager is implemented on Intel server chipsets starting with Intel Xeon processor 5500 series platforms 2. Intel Node Manager provides power and thermal monitoring and policy based power management for an individual server and is exposed through a standards based IPMI interface 3 on supported Baseboard Management Controllers (BMCs). Intel Node Manager requires an instrumented power supply conforming to the PMBus standard 4. Intel Intelligent Power Node Manager Intel Xeon processors regulate power consumption through voltage and clock frequency scaling. Reducing the clock frequency reduces power consumption, as does lowering voltage. The scale of reduction is accomplished through a series of discrete steps, each with a specific voltage and frequency. The Intel Xeon processor 5500 series can support 13 power steps. These steps are defined under the ACPI (Advanced Configuration and Power Interface) 5 standard and are colloquially called P-states. P0 is nominally the normal operating state with no power constraints. P1, P2 and so on aggressively increase the power capped states. Voltage and frequency scaling also impacts overall system performance, and therefore will constrain applications. The control range is limited to a few tens of watts per individual micro-processor. This may seem insignificant at the individual micro-processor level, however, when applied to thousands or tens of thousands of micro-processors typical found in a large data center, potential power savings amount to hundreds of kilowatt hours per month. Intel Node Manager is a chipset extension to the BMC for supporting in-band / out-of-band power monitoring and management at the node (server) level. Some of the key features include: Figure 4: Intel Node Manager power management closed control loop 23
24 Real-time power monitoring Platform (server) power capping Power threshold alerting The below figure shows the Intel Node Manager server power management closed control loop. Keeping in pace with the changes in cloud computing, Intel is working on the next version of Intel Node Manager, where in there would be support for additional controls for better power management. These changes would support additional usage models for policy based power management. APPENDIX B: Intel Trusted Execution Technology Intel TXT is a set of enhanced hardware components designed to protect sensitive information from softwarebased attacks. Intel TXT features include capabilities in the microprocessor, chipset, I/O subsystems, and other platform components. When coupled with an enabled operating system, hypervisor, and enabled applications, these capabilities provide confidentiality and integrity of data in the face of increasingly hostile environments. Intel TXT reduces the overall attack surface for individual systems and compute pools. Principally, Intel TXT provides a signature of the launch environment to enable a trusted software launch and to execute system software. The protection of the launch environment ensures that the cloud infrastructure as a service (IaaS) has not been tampered with. Additionally, security policies based on a trusted platform or pool status can then be set to restrict (or allow) the deployment or redeployment of VMs and data to platforms with a known security profile. Rather than reliance on the detection of malware, Intel TXT works because it builds trust into a known software environment and thus ensures that the software being executed hasn t been compromised. This advances security to address key stealth mechanisms used to gain access to parts of the data center in order to access or compromise information. Intel TXT works with Intel VT to create a trusted, isolated environment for VMs. Intel TXT incorporates a number of secure processing innovations, including: Trusted extensions integrated into silicon (processor and chipset) Authenticated code modules (ACM): platform-specific code is authenticated to the chipset and executed in an isolated environment within the processor and the trusted environment (authenticated code mode) enabled by AC Modules to perform secure tasks. Launch control policy (LCP) tools Some of the required components for the Intel TXT secured platform are provided by third parties, including: Trusted Platform Module (TPM) 1.2 (third party silicon)3: A hardware device defined by the Trusted Compute Group that stores authentication credentials in platform configuration registers (PCRs), which are issued by Intel Trusted Execution Technology Intel TXT-enabled BIOS, firmware, operating system, and hypervisor environments Figure 5: Intel TXT components 24
25 Intel TXT Capabilities The capabilities of Intel TXT include: Protected execution: Lets applications run in isolated environments so that no unauthorized software on the platform can observe or tamper with the operational information. Each of these isolated environments executes with the use of dedicated resources managed by the platform. Sealed storage: Provides the ability to encrypt and store keys, data, and other sensitive information within the hardware. This can only be decrypted by the same environment that encrypted it. Attestation: Enables a system to provide assurance that the protected environment has been correctly invoked and to take a measurement of the software running in the protected space. The information exchanged during this process is known as the attestation identity key credential and is used to establish mutual trust between parties. Protected launch: Provides the controlled launch and registration of critical system software components in a protected execution environment. Intel Xeon 5600 processor series support Intel TXT, which is designed to address such software-based attacks. For more information on Intel TXT, please visit Intel TXT: Principle of Operation Intel TXT works through the creation of a measured launch environment (MLE) that enables an accurate comparison of all the critical elements of the launch environment against a known good source. Intel TXT creates a cryptographically unique identifier for each approved launch-enabled component and then provides hardwarebased enforcement mechanisms to block the launch of the code that does not match that which is authenticated. This hardware-based solution provides the foundation on which IT administrators can build trusted platform solutions to protect against aggressive software-based attacks. Figure 6 illustrates two different scenarios. In the first, the measurements match the expected values, so the launch of the BIOS, firmware, and VMM are allowed. In the second, the system has been compromised by a root-kit hypervisor, which attempts to install itself below the hypervisor to gain access to the platform. In this case, the Intel TXT-enabled, MLE-calculated hash system measurements will differ from the expected value, due to the insertion of the root-kit. Therefore, the measured environment will not match the expected value and, based on the launch policy, Intel TXT could abort the launch of the hypervisor. Figure 6: How Intel TXT protects a virtualized environment 25
26 Disclaimers Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families. See products/processor_number for details. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROP- ERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or by visiting Intel s Web site at Copyright 2011 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon, Xeon inside, and Intel Intelligent Power Node Manager are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others.
Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms
Intel Cloud Builders Guide Intel Xeon Processor 5600 Series Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services Parallels, Inc. Intel Cloud Builders Guide: Cloud Design and
Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms
EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations
Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms
Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide
Intel Service Assurance Administrator. Product Overview
Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an
A Superior Hardware Platform for Server Virtualization
A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations
Evaluating Intel Virtualization Technology FlexMigration with Multi-generation Intel Multi-core and Intel Dual-core Xeon Processors.
Evaluating Intel Virtualization Technology FlexMigration with Multi-generation Intel Multi-core and Intel Dual-core Xeon Processors. Executive Summary: In today s data centers, live migration is a required
Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems
WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP
Preserving Performance While Saving Power Using Intel Intelligent Power Node Manager and Intel Data Center Manager
WHITE PAPER Intel Intelligent Power Node Manager Intel Data Center Manager Data Center Power Management Preserving Performance While Saving Power Using Intel Intelligent Power Node Manager and Intel Data
Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms
Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual
Intel Virtualization Technology (VT) in Converged Application Platforms
Intel Virtualization Technology (VT) in Converged Application Platforms Enabling Improved Utilization, Change Management, and Cost Reduction through Hardware Assisted Virtualization White Paper January
Cloud based Holdfast Electronic Sports Game Platform
Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online
How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1
How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1 Technical Brief v1.0 February 2013 Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED
Intel Embedded Virtualization Manager
White Paper Kelvin Lum Fee Foon Kong Platform Application Engineer, ECG Penang Intel Corporation Kam Boon Hee (Thomas) Marketing Development Manager, ECG Penang Intel Corporation Intel Embedded Virtualization
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.
Vendor Update Intel 49 th IDC HPC User Forum Mike Lafferty HPC Marketing Intel Americas Corp. Legal Information Today s presentations contain forward-looking statements. All statements made that are not
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)
新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV) 李 國 輝 客 戶 方 案 事 業 群 亞 太 區 解 決 方 案 架 構 師 美 商 英 特 爾 亞 太 科 技 有 限 公 司 Email: [email protected] 1 Legal
Different NFV/SDN Solutions for Telecoms and Enterprise Cloud
Solution Brief Artesyn Embedded Technologies* Telecom Solutions Intel Xeon Processors Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Networking solutions from Artesyn Embedded Technologies*
Improving OpenStack* Hybrid Cloud Security
SOLUTION BRIEF Intel Trusted Execution Technology Hybrid Security Improving OpenStack* Hybrid Security Together, Intel, Mirantis, and IBM SoftLayer demonstrate how Intel Trusted Execution Technology, attestation,
CLOUD SECURITY: Secure Your Infrastructure
CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study
Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study The adoption of cloud computing creates many challenges and opportunities in big data management and storage. To
One-Stop Intel TXT Activation Guide
One-Stop Intel TXT Activation Guide HP Gen8 Family Based Server Systems Intel Trusted Execution Technology (Intel TXT) for Intel Xeon processor-based servers is commonly used to enhance platform security
Control your corner of the cloud.
Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing
with PKI Use Case Guide
Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION
Leading Virtualization 2.0
Leading Virtualization 2.0 How Intel is driving virtualization beyond consolidation into a solution for maximizing business agility within the enterprise White Paper Intel Virtualization Technology (Intel
Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage
Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security
Citrix and Intel Deliver Client Virtualization
Citrix XenClient and Intel vpro Citrix and Intel Deliver Client Virtualization Citrix and Intel work together to deliver local virtual desktops, aiming to make virtualization ubiquitous on client devices.
How High Temperature Data Centers & Intel Technologies save Energy, Money, Water and Greenhouse Gas Emissions
Intel Intelligent Power Management Intel How High Temperature Data Centers & Intel Technologies save Energy, Money, Water and Greenhouse Gas Emissions Power savings through the use of Intel s intelligent
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Fast, Low-Overhead Encryption for Apache Hadoop*
Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software
IT@Intel. Comparing Multi-Core Processors for Server Virtualization
White Paper Intel Information Technology Computer Manufacturing Server Virtualization Comparing Multi-Core Processors for Server Virtualization Intel IT tested servers based on select Intel multi-core
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Technical Brief Networking Division (ND) August 2013 Revision 1.0 LEGAL INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
Intel Media SDK Library Distribution and Dispatching Process
Intel Media SDK Library Distribution and Dispatching Process Overview Dispatching Procedure Software Libraries Platform-Specific Libraries Legal Information Overview This document describes the Intel Media
Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.
Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V Technical Brief v1.0 September 2012 2 Intel Ethernet and Configuring SR-IOV on Windows*
VNF & Performance: A practical approach
VNF & Performance: A practical approach Luc Provoost Engineering Manager, Network Product Group Intel Corporation SDN and NFV are Forces of Change One Application Per System Many Applications Per Virtual
One-Stop Intel TXT Activation Guide
One-Stop Intel TXT Activation Guide DELL* PowerEdge 12G Server Systems Intel Trusted Execution Technology (Intel TXT) for Intel Xeon processor-based servers is commonly used to enhance platform security
Getting More Performance and Efficiency in the Application Delivery Network
SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency
The Case for Rack Scale Architecture
The Case for Rack Scale Architecture An introduction to the next generation of Software Defined Infrastructure Intel Data Center Group Pooled System Top of Rack Switch POD Manager Network CPU/Memory Storage
Intel Data Center Manager. Data center IT agility and control
Intel Data Center Manager Data center IT agility and control The Data Center Ecosystem 2 Why do we care about Data Center Management? attributed to devices connected to the Internet of Everything (up from
How High Temperature Data Centers and Intel Technologies Decrease Operating Costs
Intel Intelligent Management How High Temperature Data Centers and Intel Technologies Decrease Operating Costs and cooling savings through the use of Intel s Platforms and Intelligent Management features
Cloud Design and Deployment on Intel Xeon Processor-based Platforms
Intel Cloud Builders Guide Intel Xeon Processor-based Servers Huawei SingleCLOUD* Case Study Cloud Design and Deployment on Intel Xeon Processor-based Platforms Huawei SingleCLOUD* AUDIENCE AND PURPOSE
Simplified Private Cloud Management
BUSINESS PARTNER ClouTor Simplified Private Cloud Management ClouTor ON VSPEX by LOCUZ INTRODUCTION ClouTor on VSPEX for Enterprises provides an integrated software solution for extending your existing
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
COSBench: A benchmark Tool for Cloud Object Storage Services. [email protected] 2012.10
COSBench: A benchmark Tool for Cloud Object Storage Services [email protected] 2012.10 Updated June 2012 Self introduction COSBench Introduction Agenda Case Study to evaluate OpenStack* swift performance
Accelerating Business Intelligence with Large-Scale System Memory
Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness
Accelerating Business Intelligence with Large-Scale System Memory
Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness
System Event Log (SEL) Viewer User Guide
System Event Log (SEL) Viewer User Guide For Extensible Firmware Interface (EFI) and Microsoft Preinstallation Environment Part Number: E12461-001 Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
System Image Recovery* Training Foils
Intel-powered Classmate PC System Image Recovery* Training Foils Version 1.0 1 *Other names and brands may be claimed as the property of others. Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED
MS Exchange Server Acceleration
White Paper MS Exchange Server Acceleration Using virtualization to dramatically maximize user experience for Microsoft Exchange Server Allon Cohen, PhD Scott Harlin OCZ Storage Solutions, Inc. A Toshiba
Accelerate OpenStack* Together. * OpenStack is a registered trademark of the OpenStack Foundation
Accelerate OpenStack* Together * OpenStack is a registered trademark of the OpenStack Foundation Where are your workloads running Ensuring Boundary Control in OpenStack Cloud. Raghu Yeluri Principal Engineer,
Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms
Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network
Intel Identity Protection Technology with PKI (Intel IPT with PKI)
Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION
How To Get A Client Side Virtualization Solution For Your Financial Services Business
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008
Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010
Intel System Event Log (SEL) Viewer Utility
Intel System Event Log (SEL) Viewer Utility User Guide Document No. E12461-003 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS FOR THE GENERAL PURPOSE OF SUPPORTING
Intel Matrix Storage Console
Intel Matrix Storage Console Reference Content January 2010 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments
Solution Brief Telefonica NFV Reference Platform Intel Xeon Processors NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Summary This paper reviews Telefónica s vision and
How To Create A Cloud Based System For Aaas (Networking)
1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on
Intelligent Power Optimization for Higher Server Density Racks
Intelligent Power Optimization for Higher Server Density Racks A Baidu* Case Study with Intel Intelligent Power Technology White Paper Digital Enterprise Group Q1 2008 Intel Corporation Executive Summary
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Intel Cloud Builders Guide to Power Management in Cloud Design and Deployment using Supermicro* Platforms and NMView* Management Software
Intel Cloud Builders Guide Intel Xeon Processor-based Servers Supermicro* Platform and NMView* Management Software Intel Cloud Builders Guide to Power Management in Cloud Design and Deployment using Supermicro*
What s New with VMware Virtual Infrastructure
What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management
opportunity Mechanisms to Protect Data in the Open Cloud
Open Source on Intel white paper OpenStack* Intel Xeon processors Intel Trusted Execution Technology Intel Advanced Encryption Standard New Instructions Mechanisms to Protect Data in the Open Cloud Intel
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
Intel Simple Network Management Protocol (SNMP) Subagent v6.0
Intel Simple Network Management Protocol (SNMP) Subagent v6.0 User Guide March 2013 ii Intel SNMP Subagent User s Guide Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Lenovo Partner Pack for System Center Operations Manager
Lenovo Partner Pack for System Center Operations Manager Lenovo Enterprise Product Group Version 1.0 December 2013 2013 Lenovo. All rights reserved. Legal Disclaimers: First paragraph is required. Trademark
Enabling Intel Virtualization Technology Features and Benefits
WHITE PAPER Intel Virtualization Technology Enterprise Server Enabling Intel Virtualization Technology Features and Benefits Maximizing the benefits of virtualization with Intel s new CPUs and chipsets
Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms
Intel Cloud Builders Guide Intel Xeon Processor-based Servers NTT DATA BIZXAAS* Full OSS Cloud Solution Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms NTT DATA BIZXAAS* Full
Intel Solid-State Drives Increase Productivity of Product Design and Simulation
WHITE PAPER Intel Solid-State Drives Increase Productivity of Product Design and Simulation Intel Solid-State Drives Increase Productivity of Product Design and Simulation A study of how Intel Solid-State
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation
Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation This paper discusses how data centers, offering a cloud computing service, can deal
Intel Data Direct I/O Technology (Intel DDIO): A Primer >
Intel Data Direct I/O Technology (Intel DDIO): A Primer > Technical Brief February 2012 Revision 1.0 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
Accelerating High-Speed Networking with Intel I/O Acceleration Technology
White Paper Intel I/O Acceleration Technology Accelerating High-Speed Networking with Intel I/O Acceleration Technology The emergence of multi-gigabit Ethernet allows data centers to adapt to the increasing
Trusted Geolocation in The Cloud Technical Demonstration
Trusted Geolocation in The Cloud Technical Demonstration NIST Interagency Report 7904 - Trusted Geolocation in the Cloud: Proof of Concept Implementation Trusted Geolocation in the Cloud Business Business
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration
Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History
Servervirualisierung mit Citrix XenServer
Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH [email protected] Virtualization Wave is Just Beginning Only 6% of x86
Intel Trusted Platforms Overview
Intel Trusted Platforms Overview Greg Clifton Intel Customer Solutions Group Director, DoD & Intelligence 2006 Intel Corporation Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
Datasheet Fujitsu Cloud Infrastructure Management Software V1
Datasheet Fujitsu Cloud Infrastructure Management Software V1 Efficient infrastructure utilization, private cloud creation support, and reduced administration. Cloud Foundation for Iaas Fujitsu supports
IT@Intel. Memory Sizing for Server Virtualization. White Paper Intel Information Technology Computer Manufacturing Server Virtualization
White Paper Intel Information Technology Computer Manufacturing Server Virtualization Memory Sizing for Server Virtualization Intel IT has standardized on 16 gigabytes (GB) of memory for dual-socket virtualization
ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK
ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK KEY FEATURES LIFECYCLE MANAGEMENT OF VIRTUALIZATION TECHNOLOGIES MADE SIMPLE Automation of lifecycle management reduces costs and errors while improving
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
MaxDeploy Hyper- Converged Reference Architecture Solution Brief
MaxDeploy Hyper- Converged Reference Architecture Solution Brief MaxDeploy Reference Architecture solutions are configured and tested for support with Maxta software- defined storage and with industry
