benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al
|
|
- Michael Stewart
- 8 years ago
- Views:
Transcription
1 1/06/15 Benefits of virtualiza/on Virtualiza/on Which of the following is not a poten/al benefit of virtualiza/on? A. cost effec/ve B. applica/on migra/on is easy C. improve applica/on performance D. run legacy applica/ons E. support flexible sojware development F. support the opera/on of the Cloud 2 Requirements for Virtualiza/on An interpreter may not work! Hypervisors should score well in three dimensions: Safe to use but the performance sucks. 1. Safety: hypervisor should have full control of virtualized resources. 2. Fidelity: behavior of a program on a virtual machine should be iden/cal to same program running on bare hardware. 3. Efficiency: much of code in virtual machine should run without interven/on by hypervisor. In order to sa/sfy the performance criterion, most of the code should be executed directly. 3 Not easy, e.g. Intel x86 architecture Binary transla/on may be performed to mi/gate the hardware limita/on. 4 1
2 Quick discussion Should we re- write all sensi/ve instruc/ons? What s your argument? The difference between true virtualiza/on and paravirtualiza/on True virtualiza/on and paravirtualiza/on 5 Which are true about paravirtualiza/on? A. Paravirtualiza/on may make the guest system run faster. B. The guest system believes it has full control and direct access to the hardware. C. Paravirtualiza/on supports only process- level virtualiza/on. D. Paravirtualiza/on is a rela/vely new technology. Type 1 and Type 2 Hypervisors (1) Loca/on of type 1 and type 2 hypervisors. 7 2
3 Example hypervisors Trap- and- Emulate technology Examples of the various combina/ons of virtualiza/on type and hypervisor. Type 1 hypervisors always run on the bare metal whereas type 2 hypervisors use the services of an exis/ng host opera/ng system. When the opera/ng system in a virtual machine executes a kernel only instruc/on, it traps to the hypervisor if virtualiza/on technology is present. Virtualizing the Unvirtualizable Support for sensi/ve instruc/ons The basic technology is binary transla/on Do you s/ll remember basic block from NWEN242? The binary translates rewrites the guest opera/ng system running in ring 1, while the hypervisor runs in ring 0 What should we do when transla/ng a basic block? 12 3
4 Quick exercise Why dynamic code transla/on can be fast in prac/ce? An implementa/on preference Will hardware with VT support perform befer than the hardware without VT? A. Translated code can be cached. B. Computer hardware provides features that support fast transla/on. C. Transla/on is not needed for many basic blocks in the kernel. D. Transla/on is not needed for basic blocks in user programs. 13 Some/mes sojware beats hardware! Moreover, translated code can be faster than the original code. 14 Virtual machine interface An example of VMI Linux Memory virtualiza/on Virtualiza/on complicates memory management. Virtual machine 1 requires virtual pages 7, 4, and 3 to be mapped to physical frames 10, 11, and 12. Virtual machine 2 requires virtual pages 4, 5, and 6 to be mapped to physical frames 10, 11, and 12. What should the hypervisor do? A. Reject the request from virtual machine 2 B. Accept the request but map virtual pages to different physical frames. 16 4
5 Building the shallow page table How to keep shallow page table updated? Hardware Support For Nested Page Tables Guest virtual address, guest physical address, host physical address Solu/on 1: keep track of the page containing the page table. Solu/on 2: update page table in the event of a page fault. 17 Extended/nested page tables are walked every /me a guest physical address is accessed including the accesses for each level of the guest s page tables. Reclaiming memory Over- commitment of memory, why? A. Improve u/liza/on of hardware B. Enhance applica/on performance. C. Enable efficient resource sharing. D. Simplify management of physical resources. Virtual memory ballooning A technique for the hypervisor to reclaim memory back from the virtual machine How can we reclaim memory?
6 Clouds Na/onal Ins/tute of Standards and Technology defines characteris/cs of cloud 1. On- demand self- service 2. Broad network access 3. Resource pooling 4. Rapid elas/city 5. Measured service Quick exercise Which of the following isn't an advantage of cloud? A. No worries about running out of storage B. Highly reliable access to compu/ng resources C. Easy access to informa/on D. Paying only for what you use Quick exercise What is the name of the organiza/on helping to foster security standards for cloud compu/ng? A. Cloud Security Standards Working B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance 23 6
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
More informationx86 Virtualization Hardware Support Pla$orm Virtualiza.on
x86 Virtualization Hardware Support Pla$orm Virtualiza.on Hide the physical characteris.cs of computer resources from the applica.ons Not a new idea: IBM s CP- 40 1967, CP/CMS, VM Full Virtualiza.on Simulate
More informationVirtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
More informationUses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
More informationData Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM
Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute
More informationVirtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
More informationCloud Compu)ng: Overview & challenges. Aminata A. Garba
Cloud Compu)ng: Overview & challenges Aminata A. Garba Outline I. Introduc*on II. Virtualiza*on III. Resources Op*miza*on VI. Challenges 2 A Historical Note 1960, the idea of organizing computa)on as a
More informationEverything You Need to Know about Cloud BI. Freek Kamst
Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to
More informationVirtual Pla*orms Hypervisor Methods to Improve Performance and Isola7on proper7es of Shared Mul7core Servers
Virtual Pla*orms Hypervisor Methods to Improve Performance and Isola7on proper7es of Shared Mul7core Servers Priyanka Tembey Ada Gavrilovska, Karsten Schwan [School of CS, Georgia Tech] 1 Applica7on Consolida7on
More informationSUMMIT. November 2010
SUMMIT November 2010 Why Summit? Comprehensive Summit provides a unified approach to IT enterprise management following a prescriptive, ITIL based framework Rapid Deployment Summit is developed for and
More informationAIS TECHNOLOGY SOLUTIONS GUIDE
AIS TECHNOLOGY SOLUTIONS GUIDE WHAT IS AIS AT TECH DATA? Advanced Infrastructure Solutions provide resellers with everything they need to keep their data centers up-to-date with the latest technology.
More informationTrus%ng your Cloud Provider s System
Trus%ng your Cloud Provider s System Retaining Control over Private Virtual Machines Hosted by a Cloud Provider Using Mandatory Access Control, Trusted Boot and A>esta?on Vorarlberg University of Applied
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
More informationkvm: Kernel-based Virtual Machine for Linux
kvm: Kernel-based Virtual Machine for Linux 1 Company Overview Founded 2005 A Delaware corporation Locations US Office Santa Clara, CA R&D - Netanya/Poleg Funding Expertise in enterprise infrastructure
More informationSo#ware- based CyberSecurity. Michael Butler Gennaro Parlato Electronic and So.ware Systems (ESS)
So#ware- based CyberSecurity Michael Butler Gennaro Parlato Electronic and So.ware Systems (ESS) Security is mul;- faceted Confiden;ality Authen;ca;on Authorisa;on / Access Control Trust / Reputa;on Anonymity
More informationBest Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance
Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance CON7484 Jeff Savit Senior Technical Product Manager Oracle VM Product Management October 1, 2014 Safe Harbor Statement The following
More informationCloud Computing CS 15-319
Cloud Computing CS 15-319 Virtualization Case Studies : Xen and VMware Lecture 20 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Resource Virtualization Today s session Virtualization
More informationCOS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
More informationCloud Compu)ng in Educa)on and Research
Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research
More informationChapter 3. Database Architectures and the Web Transparencies
Week 2: Chapter 3 Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objec
More informationBasics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
More informationCloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE!
Cloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE! Simple Showcase 2 Cloud compu1ng has been envisioned as the next- genera1on architecture
More informationCloud Computing #6 - Virtualization
Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current
More informationCloud Security Prac0ces and Principles
Cloud Security Prac0ces and Principles Joan Pepin Director of Security The Public Cloud Is:! An opportunity to simplify and increase security! Misunderstood! A vic0m of FUD Take 0me to examine it? Or DOOM?!
More informationAppLogic and the Mainframe: The Ul7mate Private Cloud
MODERNIZE AND OPTIMIZE YOUR MAINFRAME S510 AppLogic and the Mainframe: The Ul7mate Private Cloud Sco@ Fagen Dis7nguished Engineer Chief Architect: Mainframe Abstract Mainframers have been using virtual
More informationVirtualization Technology. Zhiming Shen
Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became
More informationCSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records
electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of
More informationHow the ersa Problem became the ersa Solu3on. Why a network and network security is impera3ve for ersa s NeCTAR cloud. Paul Bartczak Infrastructure
How the ersa Problem became the ersa Solu3on. Why a network and network security is impera3ve for ersa s NeCTAR cloud. Paul Bartczak Infrastructure Manager About ersa eresearch SA is a collabora3ve joint
More informationVirtual machines and operating systems
V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota lichota@mimuw.edu.pl A g e n d a Virtual machines and operating systems interactions
More informationOverview on Modern Accelerators and Programming Paradigms Ivan Giro7o igiro7o@ictp.it
Overview on Modern Accelerators and Programming Paradigms Ivan Giro7o igiro7o@ictp.it Informa(on & Communica(on Technology Sec(on (ICTS) Interna(onal Centre for Theore(cal Physics (ICTP) Mul(ple Socket
More informationUAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
More informationUbuntu, FEAP, and Virtualiza3on. Jonathan Wong Lab Mee3ng 11/08/10
Ubuntu, FEAP, and Virtualiza3on Jonathan Wong Lab Mee3ng 11/08/10 Mo3va3on Compiling and opera3ng FEAP requires knowledge of Unix/ Posix systems Being comfortable using command- line Naviga3ng the file
More informationData Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
More informationHardware enhanced Security in Cloud Compu8ng. Cloud Compu8ng (Public IaaS)
Hardware enhanced Security in Cloud Compu8ng Ruby B. Lee Princeton University ARO workshop on Cloud Security, March 11, 2013 Cloud Compu8ng (Public IaaS) End Users Cloud Provider Guest VMs Cloud Customer
More information10 Steps to Preparedness
10 Steps to Preparedness Key Take- Aways Review basics of disaster recovery and con2nuity of opera2ons. Understand what you can do to prepare your pool and its members for an unplanned interrup2on. Ini2ate
More informationQubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management
Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationProject Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
More informationOffice of Business and Financial Services. Department Budget Presenta0on
Office of Business and Financial Services Department Budget Presenta0on Office of Business and Financial Services Overview Office of Business and Financial Services Overview Fund for Budgetary Purposes General
More informationFull and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
More informationProtec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
More informationB2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity
B2B Offerings Helping businesses op2mize Infolob s amazing b2b offerings helps your company achieve maximum produc2vity What is B2B? B2B is shorthand for the sales prac4ce called business- to- business
More informationOS/Run'me and Execu'on Time Produc'vity
OS/Run'me and Execu'on Time Produc'vity Ron Brightwell, Technical Manager Scalable System SoAware Department Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation,
More informationRPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY Syamsul Anuar Abd Nasir Fedora Ambassador Malaysia 1 ABOUT ME Technical Consultant for Warix Technologies - www.warix.my Warix is a Red Hat partner Offers
More informationVirtual Machines. Virtualization
Virtual Machines Marie Roch Tanenbaum 8.3 contains slides from: Tanenbaum 3 rd ed. 2008 1 Virtualization Started with the IBM System/360 in the 1960s Basic concept simulate multiple copies of the underlying
More informationModernizing EDI: How to Cut Your Migra6on Costs by Over 50%
Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &
More informationLinux Clusters Ins.tute: Turning HPC cluster into a Big Data Cluster. A Partnership for an Advanced Compu@ng Environment (PACE) OIT/ART, Georgia Tech
Linux Clusters Ins.tute: Turning HPC cluster into a Big Data Cluster Fang (Cherry) Liu, PhD fang.liu@oit.gatech.edu A Partnership for an Advanced Compu@ng Environment (PACE) OIT/ART, Georgia Tech Targets
More informationVirtualization. Explain how today s virtualization movement is actually a reinvention
Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.
More informationThe Role of Nutanix in the Public /Private / Hybrid Cloud Spectrum
The Role of Nutanix in the Public /Private / Hybrid Cloud Spectrum Chris Howard Vice President, Nutanix Federal Phil Ditzel Senior SE Public Cloud Let s start with the definition NIST s Defini-on: A model
More informationThe Development of Cloud Interoperability
NSC- JST Workshop The Development of Cloud Interoperability Weicheng Huang Na7onal Center for High- performance Compu7ng Na7onal Applied Research Laboratories 1 Outline Where are we? Our experiences before
More informationExperiments on cost/power and failure aware scheduling for clouds and grids
Experiments on cost/power and failure aware scheduling for clouds and grids Jorge G. Barbosa, Al0no M. Sampaio, Hamid Harabnejad Universidade do Porto, Faculdade de Engenharia, LIACC Porto, Portugal, jbarbosa@fe.up.pt
More informationRESTful or RESTless Current State of Today's Top Web APIs
RESTful or RESTless Current State of Today's Top Web APIs Frederik Buelthoff, Maria Maleshkova AIFB, Karlsruhe Ins-tute of Technology (KIT), Germany [1] Growing Number of Web APIs Challenges Scalability
More informationInforma.on Systems in Organiza.ons
Informa.on Systems in Organiza.ons MIS 2101 Week 7 / Chapter 7 Enhancing Business Processes Using Enterprise Informa.on Systems Photo: Objet Mathema+que by Man Ray, 1934 Chapter 7 Learning Objec.ves Core
More informationMTD Keystone s Multiple Service Platforms
MTD s Multiple Service Platforms uses the Microso/ Office pla5orm and is an MS Access applica:on with integra:on to the common Microso/ Office applica:ons, namely Excel, Word, and Outlook. may be installed
More informationCharacteris*cs and Principles of Quality Management in So:ware Development
Characteris*cs and Principles of Quality Management in So:ware Development So#ware Quality Quality Audit and Cer*fica*on Master in Computer Engineering Roberto García (rgarcia@diei.udl.cat) Quality Characteris*cs
More informationCS 91: Cloud Systems & Datacenter Networks Failures & Replica=on
CS 91: Cloud Systems & Datacenter Networks Failures & Replica=on Types of Failures fail stop : process/machine dies and doesn t come back. Rela=vely easy to detect. (oien planned) performance degrada=on:
More informationCompromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
More informationDiscovering Computers Fundamentals, 2010 Edition. Living in a Digital World
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on
More informationCloud Infrastructure Services Survey: Key UK Takeaways. Survey conducted by
Cloud Infrastructure Services Survey: Key UK Takeaways Survey conducted by Despite Understanding the Benefits of Cloud Compu7ng, UK IT Teams are Taking a Staged Approach with Migra7on NaviSite Europe Limited,
More informationData Backup and Recovery. Heng Sovannarith heng_sovannarith@yahoo.com
Data Backup and Recovery Heng Sovannarith heng_sovannarith@yahoo.com Introduc=on Because data is the heart of the enterprise, it's crucial for you to protect it. And to protect your organiza=on's data,
More informationVoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
More informationUnderstanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...
Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique
More informationevm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
More informationVirtual Machines Fact Sheet
Terms Virtual Machines Fact Sheet T1: Host The underlying hardware systems that runs a virtual machine. T2: Virtual Machine Manager (VMM) Also known as a hypervisor, the VMM provides an interface that
More informationMobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future
Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD
More informationConnec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
More informationBig Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas
Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that
More informationTelephone Related Queries (TeRQ) IETF 85 (Atlanta)
Telephone Related Queries (TeRQ) IETF 85 (Atlanta) Telephones and the Internet Our long- term goal: migrate telephone rou?ng and directory services to the Internet ENUM: Deviated significantly from its
More informationOutline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
More informationIntroduction to Virtualization & KVM
Introduction to Virtualization & KVM By Zahra Moezkarimi ICT Research Institute Software Platform Laboratory Outline Virtualization History Overview Advantages and Limitations Types of virtualization Virtualization
More informationCan Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure?
Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Housekeeping Welcome to Align s Webinar Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Informa+on for
More informationPrivileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
More informationVirtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/
Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This
More informationGyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
More informationBroadband Success & Struggles in Healthcare
Broadband Success & Struggles in Healthcare Broadband is important to providing telehealth in rural healthcare facili9es Telehealth requires reliable broadband connec9on Healthcare facili9es seeing a change
More informationFrom Big Data to Value
From Big Data to Value The Power of Master Data Management 2.0 Sergio Juarez SVP Elemica EMEA & LATAM Reveal Oct 2014 Agenda Master Data Management Why Now? What To Do? How To Do It? What s Next? Today
More informationCHOOSING THE RIGHT RED HAT ENTERPRISE LINUX SUBSCRIPTION. Gerry Riveros Senior Manager Server Solutions, Red Hat May 6, 2011
CHOOSING THE RIGHT RED HAT ENTERPRISE LINUX SUBSCRIPTION Gerry Riveros Senior Manager Solutions, Red Hat May 6, 2011 Subscription refresher What is it? It's how Red Hat sells it products. How does it work?
More informationGUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:
More informationBPO. Accerela*ng Revenue Enhancements Through Sales Support Services
BPO Accerela*ng Revenue Enhancements Through Sales Support Services What is BPO? Business Process Outsorcing (BPO) is the process of outsourcing specific business func6ons to a third- party service provider
More informationHow To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
More informationTim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015
Tim Blevins Execu;ve Director Labor and Revenue Solu;ons FTA Technology Conference August 4th, 2015 Governance and Organiza;onal Strategy PaIerns of Fraud and Abuse in Government What tools can we use
More informationOVA KVM THE SOLUTION. Virtually Unmatched. Get to know KVM. Low cost, super secure and infinitely scalable. JOIN WHAT IS GET SECURITY LOW COST
OVERVIEW SCALABILITY SECURITY LOW COST WHAT WE DO WHAT IS THE SOLUTION JOIN OVA OUR MISSION JOIN US OPEN SOURCE OVIRT USE CASES MEMBERS GET LINUX HYPERVISOR Virtually Unmatched. Get to know. Low cost,
More informationA R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g
RM-C A R o a d t o y o u r C l o u d Professional Service C R M a n d C l o u d C o n s u l t i n g CRM-C Highlights! A Unique Cloud CRM Consulting service firm! Specializing in cloud CRM and Office Collaboration
More informationDistributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors Benoit Boissinot E.N.S Lyon directed by Christine Morin IRISA/INRIA Rennes Liviu Iftode Rutgers University Phenix
More informationVirtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
More informationVirtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
More informationCloud Compu?ng & Big Data in Higher Educa?on and Research: African Academic Experience
3 rd SG13 Regional Workshop for Africa on ITU- T Standardiza?on Challenges for Developing Countries Working for a Connected Africa (Livingstone, Zambia, 23-24 February 2015) Cloud Compu?ng & Big Data in
More informationVirtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16
Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating
More informationSolving today's integra@on challenges with Oracle SOA Suite, and Oracle Coherence
Solving today's integra@on challenges with Oracle SOA Suite, and Oracle Coherence Asaf Lev Sales Consul@ng asaf.lev@oracle.com Agenda Industry Trends Oracle SOA Suite Oracle Coherence Oracle Service Bus
More informationCS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013
CS5460: Operating Systems Lecture: Virtualization 2 Anton Burtsev March, 2013 Paravirtualization: Xen Full virtualization Complete illusion of physical hardware Trap _all_ sensitive instructions Virtualized
More informationData Center 2020. DC planning for the next 5 10 years. Copyright 2004-2013 Experture and Robert Frances Group, all rights reserved
DC planning for the next 5 10 years Topics to be Discussed Introduc=on Indirect Drivers Technology Direct Drivers Data Center DC Management DC Opera=ons s and Disaster Recovery 2 Introduc=on The future
More informationFive Factors Driving Businesses to Rethink EDI on IBM i
Simplify and Accelerate e- Business Integra6on Five Factors Driving Businesses to Rethink EDI on IBM i EDI Change Drivers External Loca6ons, Partners, and Services Customers Suppliers / Service Providers
More informationClouds Burst Horizon. J.Crowcro(/S.Hand, University of Cambridge
Clouds Burst Horizon J.Crowcro(/S.Hand, University of Cambridge Cloud Compu1ng? Q: What is Cloud Compu1ng, exactly? A: It depends but a rough defini1on might be on- demand internet- based compu1ng i.e.
More informationVirtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
More informationVirtualization. Pradipta De pradipta.de@sunykorea.ac.kr
Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
More information2008- CEO Pawn Promotion 2004- Senior Project Manager PDC/KTH 2003- Co-founder Numeri
Åke Edlund, PhD 2008- CEO Pawn Promotion 2004- Senior Project Manager PDC/KTH 2003- Co-founder Numeri 2003-2004 Core Application Architect, Sony Ericsson Mobile Communications AB 2001 Solution Manager,
More informationLegacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
More informationCONTENTS. Introduc on 2. Undergraduate Program 4. BSC in Informa on Systems 4. Graduate Program 7. MSC in Informa on Science 7
1 1 2 CONTENTS Introducon 2 Undergraduate Program 4 BSC in Informaon Systems 4 Graduate Program 7 MSC in Informaon Science 7 MSC in Health Informacs 13 2 3 Introducon The School of Informaon Science at
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
More information