Virtualization Education Environment
|
|
- Junior White
- 6 years ago
- Views:
Transcription
1 Virtualization Education Environment Project Plan Project Team: 15 Client: Dr. Daniels Advisor: Dr. Daniels Tasewell Fox Robert Goetz Jacob Phillips Submitted 3/1/2011
2 Table of Contents A. Executive Summary I. System Requirements 1. Problem Statement 2. Conceptual System 2.a) Concept Sketch 2.a-1: Fully Virtualized 2.a-2: Virtual Lab Virtualization Only 2.b) System Block Diagram 3. Functional Requirements 3.a) System Access 3.b) Open Source Technology 3.c) Creation/Configuration 3.d) Benchmarking 3.e) Hardware/Software Requirements 4. Non-functional Requirements 4.a) Hardware Access 4.b) Compatibility 4.c) Performance and Reliability 4.d) Security 4.e) Virtual Machines 5. Operating Environment and Constraints 5.a) Operating Hardware/Software 5.b) Nested Virtualization II. Project Management 1. Work breakdown and statement of work 1.a) Virtualization Education Environment statement of work 2. Project Schedule (Gantt Chart) 3. Resource Requirements (Budget) 4. Potential Risks and Mitigation 4.a) Delay of development hardware 4.b) Opensource possibilities and abilities 4.c) CSG Hardware 4.d) Unacceptable Performance III. Conclusion 1. End-product description and deliverables 1.a) Virtual Lab Implementation 1.b) Labs 1.c) Benchmarking Suite
3 2. References 3. Project Team Contact Information 3.a) Project Leader: Tasewell Fox 3.b) Web Master: Robert Goetz 3.c) Communications Officer: Jacob Phillips
4 A. Executive Summary The product is a virtualization lab environment (VLE) with a laboratory procedure for testing various systems related to virtualization. This project is needed because there is currently no lab for Cpr E 342 and the class cannot be taught to students until this is remedied. The proposed solution is to develop a VLE that can coexist either beside or on top of the current lab setup for Cpr E 308/489. This virtual lab environment will provide a virtual lab space for students to work as well as give them root access, something they would not have available to them in normal lab situations. At its core this project is a system integration, content development and deployment problem. At the conclusion of this project, there will be a complete VLE, benchmarking suite and a set of lab procedures to execute for the cpre 342 labs. The VLE will be provided to the Computer Service Group(CSG) to consider implementing throughout the lab.
5 I. System Requirements 1. Problem Statement A virtualization class has been created, but it is missing a lab portion. A series of labs must be developed, based around the existing lab infrastructure using nested virtualization. The labs require students to edit and create their own virtual machines. Some level of security must be present so an incorrectly configured virtual machine does not crash the session.
6 2. Conceptual System 2.a) Concept Sketch 2.a-1: Fully Virtualized In this system the operating system on the lab machines would be replaced with a type one hypervisor. This would allow the current lab configuration (308/489) to be moved to a virtual machine alongside the new virtual lab (Virt Lab). Inside the virtual lab would be a type two hypervisor which would provide access to the level two virtual machines.
7 2.a-2: Virtual Lab Virtualization Only In this system a type two hypervisor is used inside the current lab configuration (308/489). This allows the virtual lab (Virt Lab) to be virtualized inside the 308/489 configuration without modification.
8 2.b) System Block Diagram
9 3. Functional Requirements 3.a) System Access For this project system access must be restricted. Students will only be allowed root access on the Virt Lab virtual machine. Students will not be allowed root access on either the type one hypervisor or the 308/489 system. 3.b) Open Source Technology The second level of virtualization must be open source technology. 3.c) Creation/Configuration Students can create and configure multiple level 2 virtual machines, inside of the Virt Lab virtual machine. 3.d) Benchmarking Students must be able to run multi-level benchmarks. The benchmarks should include programs and techniques for the following: CPU\Memory Performance CPU Arithmetic Memory Access, Latency, and Bandwidth Disk Performance Read/Write speeds Data throughput Network Performance Network Status (can it reach outside the virtual environment) Network Latency Network Bandwidth [OPTIONAL]: If time allows, a unified system will be put in place that allows the benchmarks to be run from a single executable. This executable will have a graphical user interface, support for batch processing, and systems to view the results of a benchmark run. 3.e) Hardware/Software Requirements The system must run on Red Hat Enterprise Linux. The system must run on a PC using the Intel x86_64 architecture.
10 4. Non-functional Requirements 4.a) Hardware Access Since this hardware is owned by Iowa State and used as the primary laboratory for the Cpr E 308 and 489 courses, we will not have physical access to the machines. Any changes to the system must be pre-approved by CSG. 4.b) Compatibility The system must be compatible with the current CprE 308 / CprE 489 lab setup. Compatibility in this case means that both systems can coexist without interfering with the operation of the other. 4.c) Performance and Reliability Since this is a machine that will be used for education it is paramount that the system is stable and performance is acceptable. Performance shall be judged based upon the base hardware s performance vs. the virtual environment by using predetermined benchmarks. The parameters for acceptable performance are: For a system running a single level 1 virtual machine, that level 1 virtual machine shall not perform any less then 50% worse then the base hardware. A system running a single level 1 virtual machine and a single level 2 virtual machine, that level 2 virtual machine shall not perform any less then 70% worse then the base hardware. Stability shall be judged by these parameters: The VLE shall add no instabilities to the Cpr E 308/489 systems. A student that properly follows all instructions shall be able to complete the entire lab course without the system failing. 4.d) Security The VLE shall add no major security flaws to the current lab system. This requirement will be determined by CSG. 4.e) Virtual Machines The system must allow multiple nested (virtual machines inside virtual machines) virtual machines.
11 5. Operating Environment and Constraints 5.a) Operating Hardware/Software The operating environment is Red Hat Enterprise Linux on Intel_x86_64 with virtualization. We intend to boot the stuents/lab in a virtual machine, and then let the students create and edit the VM from within this sandbox. 5.b) Nested Virtualization No open source VM's have out of the box support for it Cascading memory access Context switching 5.c) Constraints Everything must conform to the Computer Service Group s standards and system in order to be approved. All software should be open source. It must run on Intel x86_64
12 6. Security, Safety, Intellectual Property, and Technology Considerations 6.a) Security Considerations Giving student the ability to recompile a kernel introduces some major security holes, even if it is in a vm. Student may have root access on the vm, thus introducing a whole set of ways they can introduce instabilities. Students will have full network access, as in 489. So the network must be secure Various unforeseen security issues that probably exist. 6.b) Safety Our software runs no critical systems. If, in the worst case, the network were to be compromised nobody would be physically injured. 6.c) Intellectual Property All software will be open source. (xen on kvm, xen on vbox) So, the intellectual property depends on the liscence. GPL is viral, so the whole project has to be gpl if even one piece of software is, I think. That means that IP belongs to the software developers, and we only own the labs. The setup of kvm on xen or whatever shouldn t be our IP. 6.d) Technology Considerations Many technologies and approaches can be used to analyze the usability and feasibility of our design of the virtualization lab. Tools are available to asses the performance of a nested virtualization system, but these can only be used after an initial design has been implemented. Testing is thus an important consideration, as we have many designs in consideration. Some of our methods may be considered new or innovative. Nesting a virtual machine appears to be a relatively new idea, or at least preliminary research yields few results on the subject. VMWare has only recently put forth a release capable of newsted virtualization.
13 II. Project Management 1. Work breakdown and statement of work 1.a) Virtualization Education Environment statement of work Task 1 - Problem Definition, Project Goals Subtask 1.a) - Determine requirements Subtask 1.b) - Formulate initial research ideas Subtask 1.c) - Identify potential early risks Task 2 - Research / Technological Considerations Subtask 2.a) - Determine feasibility of Project given current technology Subtask 2.b) - Examine viability of existing technologies for nested virtualization Subtask 2.c) - Examine viability of existing technologies for benchmark suite Subtask 2.d) - Determine possible solutions Subtask 2.e) - Select software candidates Task 3 - Virtualized Lab Environment Design Subtask 3.a) - Choose implementation Subtask 3.b) - Design the Virtualization Lab Environment Subtask 3.c) - Implement nested virtualization prototype Subtask 3.d) - Implement Virtualization Lab Environment prototype Subtask 3.e) - Present Virtualization Lab Environment prototype to client, and CSG Task 4 - Benchmark Suite subtask 4.a) - Choose suitable benchmark utilities Subtask 4.b) - Bundle benchmark utilities into a single suite
14 Subtask 4.c) - Design benchmark suite graphical interface [optional] Task 5 - Lab Procedure Design Subtask 5.a) - Write lab procedures Subtask 5.b) - Go to client for lab verification Subtask 5.c) - Implement Lab Procedures Task 6 - Virtualization Testing Subtask 6.a) - Test initial virtualization software candidates Subtask 6.b) - Test nested virtualization prototype Subtask 6.c) - Test Virtualization Lab Environment prototype Subtask 6.d) - Test Lab procedures using Virtualized Lab Environment Task 7 - Project Reporting Subtask 7.a) - Project powerpoint presentation Subtask 7.b) - Project Plan Subtask 7.c) - Design Document Subtask 7.d) - Weekly Reporting
15 2. Project Schedule (Gantt Chart)
16 3. Resource Requirements (Budget) Item With Labor Without Labor Hardware 2 Test Machines $800 Subtotal $800 Labor at $20 / hour Fox, Tasewell $3000 Goetz, Robert $2960 Phillips, Jacob $2920 Subtotal $8880 Total $9680 $800
17 4. Potential Risks and Mitigation 4.a) Delay of development hardware There is a serious risk that we will have to wait quite some time for hardware to begin test implementation. This risk can be partially mitigated by doing what testing we can on machines without hardware virtualization and using Robert Goetz s laptop whenever possible because it supports hardware virtualization. 4.b) Opensource possibilities and abilities There are a plethora of opensource virtualization sofware available which can make choosing the correct combination a potential risk. This can be mitigated by researching each choice thoroughly before making any design decisions. There is also the potential risk that this project will be impossible to implement with opensource technology. The only mitigation to this is to test as much software as possible to find a successful combination. If no combination is found go to the client and revise requirements. 4.c) CSG Hardware The hardware that this will be deployed on is owned and administered by CSG. Any changes we hope to make to those systems must first be authorized by CSG administrators. The only way to avoid this risk is to establish early lines of communication with CSG admins so they can advise us on potential problems early in the development cycle. 4.d) Unacceptable Performance Even with a successful implementation performance may be to poor to use. There is very little we can do to mitigate this risk. Good choices of software and implementations can help though.
18 III. Conclusion 1. End-product description and deliverables 1.a) Virtual Lab Implementation An implementation of the virtual lab setup that satisfies all functional and nonfunctional requirements of the project. This virtual lab implementation will be working on one test machine and ready to be implemented lab wide pending approval. 1.b) Labs A set of lab procedures for students that demonstrate various principles of virtualization outlined by the Cpr E 342 curriculum. 1.c) Benchmarking Suite A suite of programs that provide methods to benchmark all of the requirements set down in the functional requirement found in Section I, 3.d. 2. References Project Team Contact Information 3.a) Project Leader: Tasewell Fox Phone: (515) tjfox@iastate.edu 3.b) Web Master: Robert Goetz Phone: (630) rdgoetz@iastate.edu 3.c) Communications Officer: Jacob Phillips
19 Phone: (319)
CPRE491 Team Dec11 08 Project Plan
CPRE491 Team Dec11 08 Project Plan Introduction Write blockers are devices that allow acquisition of hard disk data without the possibility of accidental contamination by modification. A write blocker
More information: XEN WORLDS: XEN AND THE ART OF COMPUTER ENGINEERING EDUCATION
2006-2300: XEN WORLDS: XEN AND THE ART OF COMPUTER ENGINEERING EDUCATION Benjamin Anderson, Iowa State University Thomas Daniels, Iowa State University Dr. Thomas E. Daniels is an Assistant Professor in
More informationvmoodle: Virtual Machine based Online Learning Environment
: Virtual Machine based Online Learning Environment CIS4911 - Senior Project Mentor - Dr. Ming Zhao Professor - Tiana Solis Group Members Jose Hernandez Gisselle Ginarte Junior Bazile Diana Serpa Darien
More informationDetailed Design. Java Problem Repository & Education Platform JPREP
Team Members: Luke Greiner Denis Kalic Abigail McCarthy Robert Tateo Nguyen Truong Patrick White Detailed Design Java Problem Repository & Education Platform JPREP Revision: 1.1 Date: 3/07/14 1 D e l t
More informationProject Name System Critical Design Review
Insert project logo Project Name System Critical Design Review Class Number Title Date Location This Critical Design Review assumes that the design team will be following a formalized design process. This
More informationMySQL Development Cycle
Abstract This document explains the MySQL Server development cycle. The purpose of the document is to facilitate community involvement, for example by providing feedback on pre-releases and making contributions
More information10 Steps to Virtualization
AN INTEL COMPANY 10 Steps to Virtualization WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Virtualization the creation of multiple virtual machines (VMs) on a single piece of hardware, where
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationElastic Compute Service. Quick Start for Windows
Overview Purpose of this document This document describes how to quickly create an instance running Windows, connect to an instance remotely, and deploy the environment. It is designed to walk you through
More informationVMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5
Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5 VMware Infrastructure 3 Primer Revision: 20090313 Item: EN-000021-02 You can find the most up-to-date technical documentation
More informationVirtual Machines Measure Up
Virtual Machines Measure Up Graduate Operating Systems, Fall 2005 Final Project Presentation John Staton Karsten Steinhaeuser University of Notre Dame December 15, 2005 Outline Problem Description Virtual
More informationprovides easy monitoring of kvm
provides easy monitoring of kvm plug and play it monitoring of kvm virtualization platform 2012 Author: Andreas Månsson op5 Contents Executive Summary...1 Overview...2 The background...2 The solution...2
More informationSimplifying IT through Virtualization
E X E C U T I V E S U M M A R Y G E T T E C H N O L O G Y R I G H T C U S T O M P U B L I S H I N G Microsoft-powered virtualization offers tremendous potential to help IT executives drive innovation while
More informationF5 BIG-IQ Centralized Management andlinux KVM: Setup. Version 5.0
F5 BIG-IQ Centralized Management andlinux KVM: Setup Version 5.0 Table of Contents Table of Contents Getting Started with BIG-IQ Virtual Edition...5 What is BIG-IQ Virtual Edition?...5 About BIG-IQ VE
More informationPrinted Circuit Board Development Automation
Printed Circuit Board Development Automation Project Plan Date Submitted: February 11, 2003 Project/Team Number: Dec 03-09 Team Members Colin Burnett Advisor Client Khawaja-Shahzad Butt Christopher Rieck
More informationVirtualization. Michael Tsai 2018/4/16
Virtualization Michael Tsai 2018/4/16 What is virtualization? Let s first look at a video from VMware http://www.vmware.com/tw/products/vsphere.html Problems? Low utilization Different needs DNS DHCP Web
More informationVIRTUALIZATION PERFORMANCE: VMWARE VSPHERE 5 VS. RED HAT ENTERPRISE VIRTUALIZATION 3
VIRTUALIZATION PERFORMANCE: VMWARE VSPHERE 5 VS. RED HAT ENTERPRISE VIRTUALIZATION 3 When you invest in a virtualization platform, you can maximize the performance of your applications and the overall
More informationVMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions
VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop
More informationThe Road to a Secure, Compliant Cloud
The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation
More informationSpring It takes a really bad school to ruin a good student and a really fantastic school to rescue a bad student. Dennis J.
Operating Systems * *Throughout the course we will use overheads that were adapted from those distributed from the textbook website. Slides are from the book authors, modified and selected by Jean Mayo,
More informationXen Summit Spring 2007
Xen Summit Spring 2007 Platform Virtualization with XenEnterprise Rich Persaud 4/20/07 Copyright 2005-2006, XenSource, Inc. All rights reserved. 1 Xen, XenSource and XenEnterprise
More informationVMware vsphere: Install, Configure, Manage (vsphere ICM 6.7)
VMware vsphere: Install, Configure, Manage (vsphere ICM 6.7) COURSE OVERVIEW: This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vsphere
More informationXen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila
Xen and the Art of Virtualization Nikola Gvozdiev Georgian Mihaila Outline Xen and the Art of Virtualization Ian Pratt et al. I. The Art of Virtualization II. Xen, goals and design III. Xen evaluation
More informationENGINEERING AND TECHNOLOGY MANAGEMENT
Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU
More informationAbout Us. Innovating proven technology for practical security solutions
Rethink Security About Us Innovating proven technology for practical security solutions Virtualization Security Application Security Platform Security Cross Domain Security Desktop Consolidation Case Study
More informationVirtualization Food Fight. Rik van Riel
Virtualization Food Fight Rik van Riel May 11, 2007 Virtualization Food Fight Upstream technologies are in flux Xen, KVM, paravirt_ops, VMI,... Technological differences, advantages and disadvantages What
More informationHP SDN Document Portfolio Introduction
HP SDN Document Portfolio Introduction Technical Solution Guide Version: 1 September 2013 Table of Contents HP SDN Document Portfolio Overview... 2 Introduction... 2 Terms and Concepts... 2 Resources,
More informationMODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 644-651 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION Lochan.B 1, Divyashree B A 2 1
More informationMcAfee Network Security Platform 8.3
8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationThe only open-source type-1 hypervisor
Monika Danikáková What is Xen? The only open-source type-1 hypervisor For Unix and Unix-like OS Linux, NetBSD and OpenSolaris From ancient greek term Xenos (ξένος), guest-friends Developed by the University
More informationMaintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS
Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and
More informationConnecting with Computer Science Chapter 13 Review: Chapter Summary:
Connecting with Computer Science Chapter 13 Review: Chapter Summary: Software engineering involves many different steps to create an application that meets end user s needs. The process of building an
More informationDan Noé University of New Hampshire / VeloBit
Dan Noé University of New Hampshire / VeloBit A review of how the CPU works The operating system kernel and when it runs User and kernel mode Device drivers Virtualization of memory Virtual memory Paging
More informationHPC learning using Cloud infrastructure
HPC learning using Cloud infrastructure Florin MANAILA IT Architect florin.manaila@ro.ibm.com Cluj-Napoca 16 March, 2010 Agenda 1. Leveraging Cloud model 2. HPC on Cloud 3. Recent projects - FutureGRID
More informationPrivilege Escalation
Privilege Coleman Kane Coleman.Kane@ge.com February 9, 2015 Security Vulnerability Assessment Privilege 1 / 14 root, or Privilege or Elevation is the act of gaining access to resources which were intended
More informationISEAGE Network Specification and Report System
ISEAGE Network Specification and Report System Project Plan Client ISU Information Assurance Center Faculty Adviser Dr. Douglas W. Jacobson Team May 05_25 David C. N. Rodgers Lijin Varghese Derek J. Light
More informationChapter 5. The Database Life Cycle. Class 04: Topic 3.1: The Database Life Cycle
Chapter 5 The Database Life 1 Database Design Life Database Life : all the events from the time the database is first proposed to the time it is retired from service Work is typically divided into project
More informationCertification Report
Certification Report McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Issued by: Communications
More informationVess A2000 Series NVR Storage Appliance
Vess A2000 Series NVR Storage Appliance Genetec Surveillance Solution www.promise.com www.promise.com www.promise.com Version 1.0 Version 1.0 Vess A2000 NVR Storage Appliance Promise Technology Contents
More informationIBM Emulex 16Gb Fibre Channel HBA Evaluation
IBM Emulex 16Gb Fibre Channel HBA Evaluation Evaluation report prepared under contract with Emulex Executive Summary The computing industry is experiencing an increasing demand for storage performance
More informationF5 iworkflow and Linux KVM: Setup. Version 2.0.2
F5 iworkflow and Linux KVM: Setup Version 2.0.2 Table of Contents Table of Contents Getting Started with iworkflow Virtual Edition... 5 What is iworkflow Virtual Edition?... 5 About iworkflow VE compatibility
More informationINNOV-4: Fun With Virtualization. Or, How I learned to love computers that don t really exist...
1 INNOV-4: Fun With Virtualization Or, How I learned to love computers that don t really exist... President, BravePoint, Inc. About Unix user since 1982 Progress developer since 1984 Linux Desktop and
More informationEngineering Design Notes I Introduction. EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering
Engineering Design Notes I Introduction EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering Topics Overview Analysis vs. Design Design Stages Systems Engineering Integration
More informationIntroducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led
Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led Course Description Introducing Cisco Cloud Administration (CLDADM) is a new 5-day ILT course designed to help students prepare
More informationRed Hat Enterprise Virtualization and KVM Roadmap. Scott M. Herold Product Management - Red Hat Virtualization Technologies
Red Hat Enterprise Virtualization and KVM Roadmap Scott M. Herold Product Management - Red Hat Virtualization Technologies INTRODUCTION TO RED HAT ENTERPRISE VIRTUALIZATION RED HAT ENTERPRISE VIRTUALIZATION
More informationAn Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform
An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform A B M Moniruzzaman, StudentMember, IEEE Kawser Wazed Nafi Syed Akther Hossain, Member, IEEE & ACM Abstract Cloud
More informationThe LUCID Design Framework (Logical User Centered Interaction Design)
The LUCID Design Framework (Logical User Centered Interaction Design) developed by Cognetics Corporation LUCID Logical User Centered Interaction Design began as a way of describing the approach to interface
More informationObjectives. Connecting with Computer Science 2
Objectives Learn how software engineering is used to create applications Learn some of the different software engineering process models Understand what a design document is and how it should be used during
More informationTRINITY PROJECT PROPOSAL. James DeBolt Valiant Tsang
TRINITY PROJECT PROPOSAL James DeBolt Valiant Tsang SYST 699 Spring 2017 Table of Contents 1. Introduction... 2 1.1. Background... 2 1.2. Problem Statement... 2 1.3. Scope... 2 1.4. Assumptions... 2 1.5.
More informationNVIDIA GRID. Ralph Stocker, GRID Sales Specialist, Central Europe
NVIDIA GRID Ralph Stocker, GRID Sales Specialist, Central Europe rstocker@nvidia.com GAMING AUTO ENTERPRISE HPC & CLOUD TECHNOLOGY THE WORLD LEADER IN VISUAL COMPUTING PERFORMANCE DELIVERED FROM THE CLOUD
More informationHigh-performance aspects in virtualized infrastructures
SVM 21 High-performance aspects in virtualized infrastructures Vitalian Danciu, Nils gentschen Felde, Dieter Kranzlmüller, Tobias Lindinger SVM 21 - HPC aspects in virtualized infrastructures 1/29/21 Niagara
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationCan "scale" cloud applications "on the edge" by adding server instances. (So far, haven't considered scaling the interior of the cloud).
Recall: where we are Wednesday, February 17, 2010 11:12 AM Recall: where we are Can "scale" cloud applications "on the edge" by adding server instances. (So far, haven't considered scaling the interior
More informationRe-configurable Ad-hoc Network to Track Points of Interest
Re-configurable Ad-hoc Network to Track Points of Interest Project Plan May 2012-07 September 28, 2011 Project Client: Jessica Miller Lockheed Martin, Advanced Development Programs Members: Benjamin J.
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationCLASSROOM REQUIREMENTS 7/26/2016
CLASSROOM REQUIREMENTS 7/26/2016 INTRODUCTION Fast Facts Meeting classroom requirements is critical for successful training events. Usually 1 PC per student with extra PCs for the instructor are required,
More informationIntroducing ServerView Resource Orchestrator Express/Cloud Edition XOC Pack V1
Introducing ServerView Resource Orchestrator Express/Cloud Edition XOC Pack V1 Version 1.1.2 August 2014 Fujitsu Limited Product Overview Integrated monitoring of a virtualized collection of virtual machines
More informationHPE ProLiant DL360 Gen P 16GB-R P408i-a 8SFF 500W PS Performance Server (P06453-B21)
Digital data sheet HPE ProLiant DL360 Gen10 4110 1P 16GB-R P408i-a 8SFF 500W PS Performance Server (P06453-B21) ProLiant DL Servers What's new Innovative design with greater flexibility to mix and match
More information"Charting the Course... MOC 6294 A Planning and Managing Windows 7 Desktop Deployments and Environments Course Summary
Course Summary Description This course is intended for desktop administrators who want to specialize in desktop deployment, configuration, and management. In this course, students will learn how to plan
More informationMulti-tenancy Virtualization Challenges & Solutions. Daniel J Walsh Mr SELinux, Red Hat Date
Multi-tenancy Virtualization Challenges & Solutions Daniel J Walsh Mr SELinux, Red Hat Date 06.28.12 What is Cloud? What is IaaS? IaaS = Infrastructure-as-a-Service What is PaaS? PaaS = Platform-as-a-Service
More informationPolicy-Sealed Data: A New Abstraction for Building Trusted Cloud Services
Max Planck Institute for Software Systems Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services 1, Rodrigo Rodrigues 2, Krishna P. Gummadi 1, Stefan Saroiu 3 MPI-SWS 1, CITI / Universidade
More informationRed Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization
Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking
More informationEE 660: Computer Architecture Cloud Architecture: Virtualization
EE 660: Computer Architecture Cloud Architecture: Virtualization Yao Zheng Department of Electrical Engineering University of Hawaiʻi at Mānoa Based on the slides of Prof. Roy Campbell & Prof Reza Farivar
More informationBIG-IP Virtual Edition and Linux KVM: Setup. Version 12.1
BIG-IP Virtual Edition and Linux KVM: Setup Version 12.1 Table of Contents Table of Contents Getting Started with BIG-IP Virtual Edition on KVM...5 Steps to deploy BIG-IP VE...5 Prerequisites for BIG-IP
More informationQuickSpecs. HPE Workload Aware Security for Linux. Overview
Overview (WASL) is a one-click security compliance tool designed to secure Operating System and Applications. It is based on open architecture supplemented by years of security expertise and HPE Intellectual
More informationMilestone Solution Partner IT Infrastructure Components Certification Report
Milestone Solution Partner IT Infrastructure Components Certification Report Dell MD3860i Storage Array Multi-Server 1050 Camera Test Case 4-2-2016 Table of Contents Executive Summary:... 3 Abstract...
More informationPerformance evaluation of private cloud computing with Eucalyptus
SCIS & ISIS 2010, Dec. 8-12, 2010, Okayama Convention Center, Okayama, Japan Performance evaluation of private cloud computing with Eucalyptus Kei Hirata 1, Akihiro Yamashita 1, Takayuki Tanaka 2, Masaya
More informationVMware vsan 6.6. Licensing Guide. Revised May 2017
VMware 6.6 Licensing Guide Revised May 2017 Contents Introduction... 3 License Editions... 4 Virtual Desktop Infrastructure... 5 Upgrades... 5 Remote Office / Branch Office... 5 Stretched Cluster... 7
More informationSymantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure
Symantec Discovery Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure OVERVIEW Symantec Discovery helps ensure Client Resilience by identifying and
More informationWelcome to Linux Foundation Virtual Training
Welcome to Linux Foundation Virtual Training by The Linux Foundation 06/04/2018 Version 7.3. All rights reserved. Connection information for class You will receive an email containing the specific login
More informationAdministering VMware vsphere and vcenter 5
Administering VMware vsphere and vcenter 5 Course VM-05 5 Days Instructor-led, Hands-on Course Description This 5-day class will teach you how to master your VMware virtual environment. From installation,
More informationVMware Virtual SAN Technology
VMware Virtual SAN Technology Today s Agenda 1 Hyper-Converged Infrastructure Architecture & Vmware Virtual SAN Overview 2 Why VMware Hyper-Converged Software? 3 VMware Virtual SAN Advantage Today s Agenda
More informationMaintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS
Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and VMware s Distributed
More informationGUI Computer Simulator
Comp145 Client Contract I Team #8 GUI Computer Simulator Client: Dr. Frederick P. Brooks Jr. February 6, 2001 Team Members: Chris Bailey Ed Goode Andy Hans Cary Hall John Ehrhardt Preface: Note that this
More informationZdeněk Kubala Senior QA
(Kernel) Isolation PV, HVM, OS-V technologies in Linux Introduction and description of the isolation diferences between HM, PV and OS-level virt. technologies. Zdeněk Kubala Senior QA Engineer zkubala@suse.com
More informationVMware BCDR Accelerator Service
AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution
More informationAdvanced Systems Security: Virtual Machine Systems
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
More informationGoliath Performance Monitor Frequently Asked Questions: Citrix XenServer
Goliath Performance Monitor Frequently Asked Questions: Citrix XenServer Document Date: May 2015 www.goliathtechnologies.com Legal Notices Inc. All rights reserved. www.goliathtechnologies.com Goliath
More informationInstalling or Upgrading to 6.6 on a Virtual Appliance
Installing or Upgrading to 6.6 on a Virtual Appliance Tech Note Copyright Copyright 2017 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General
More informationWindows Server Discussion with BCIU. Kevin Sullivan Management TSP US Education
Windows Server 2008 Discussion with BCIU Kevin Sullivan Management TSP US Education Kevin.sullivan@microsoft.com 1 Web Internet Information Services 7.0 Powerful Web Application and Services Platform Manage
More informationComputer Network Protocols: Myths, Missteps, and Mysteries. Dr. Radia Perlman, Intel Fellow
Computer Network Protocols: Myths, Missteps, and Mysteries Dr. Radia Perlman, Intel Fellow It s not what you don t know that s the problem. It s what you do know that ain t true.mark Twain (?) 2 Network
More informationITSS Model Curriculum. - To get level 3 -
ITSS Model Curriculum - To get level 3 - (Corresponding with ITSS V3) IT Skill Standards Center IT Human Resources Development Headquarters Information-Technology Promotion Agency (IPA), JAPAN Company
More informationPentaho and Microsoft Azure
Pentaho and Microsoft Azure Change log (if you want to use it): Date Version Author Changes Contents Overview... 1 Before You Begin... 1 Terms You Should Know... 1 Other Prerequisites... 1 Best Practices
More informationDBaaS (Oracle and Open Source)
DBaaS (Oracle and Open Source) Vess Natchev vess@us.ibm.com Power Cloud Team Leader Systems Lab Services IBM Systems Lab Services Proven IT Infrastructure Expertise 1 Agenda Definition Life Cycle of Database
More informationEXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION
EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION Timothy Bower Kansas State University at Salina 785-826-2920 tim@ksu.edu ABSTRACT This paper describes how virtualization technology was used to
More informationCitrix Ready Setup for XenDesktop on Datrium DVX
Citrix Ready Setup for XenDesktop on Datrium DVX 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction This document covers the setup and use of Citrix XenDesktop
More informationTeam Amadeus: MAD Assembly Builder Design Review
Team Amadeus: MAD Assembly Builder Design Review Members: Wyatt Evans, Kyle Krueger, Melody Pressley, Evan Russell Mentor: Austin Sanders Sponsors: Dr. Hélène Coullon & Frédéric Loulergue 1 Team Introductions
More informationEE/CprE/SE 491 Senior Design I and Professionalism. Design Document
EE/CprE/SE 491 Senior Design I and Professionalism Design Document Joseph Zambreno Electrical and Computer Engineering Iowa State University www.ece.iastate.edu/~zambreno rcl.ece.iastate.edu Always design
More informationGoal 1: Maintain Security of ITS Enterprise Systems
INFORMATION TECHNOLOGY SERVICES University Technology Administration, Infrastructure and Support Open Systems Infrastructure Calendar Year 2018 Overview The primary mission of Open Systems Infrastructure
More informationarcserve r16.5 Hybrid data protection
arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
More informationRonny L. Bull & Dr. Jeanna Matthews. DerbyCon 4.0. Sept 27th, 2014
Layer 2 Network Security in Virtualized Environments Ronny L. Bull & Dr. Jeanna Matthews DerbyCon 4.0 Sept 27th, 2014 The Researchers Ronny Bull Computer Science Ph.D. Graduate Student at Clarkson University
More informationVMware vsphere 6.5 Boot Camp
Course Name Format Course Books 5-day, 10 hour/day instructor led training 724 pg Study Guide fully annotated with slide notes 243 pg Lab Guide with detailed steps for completing all labs 145 pg Boot Camp
More informationI.R.SNApp Image Reconstruction and Segmentation for Neurosurgery Applications
SENIOR DESIGN PROJECT PLAN I.R.SNApp Image Reconstruction and Segmentation for Neurosurgery Applications May09 10 MEMBERS: William Lim Aaron Logan Dylan Reid Kyungchul Song Bill Zimmerman CLIENT AND FACULTY
More informationDistributed File System Support for Virtual Machines in Grid Computing
Distributed File System Support for Virtual Machines in Grid Computing Ming Zhao, Jian Zhang, Renato Figueiredo Advanced Computing and Information Systems Electrical and Computer Engineering University
More informationFlex System FC port 16Gb FC Adapter Lenovo Press Product Guide
Flex System FC5022 2-port 16Gb FC Adapter Lenovo Press Product Guide The network architecture on the Flex System platform has been specifically designed to address network challenges, giving you a very
More informationInstallation Prerequisites
This chapter includes the following sections: Supported Platforms, page 1 Supported Web Browsers, page 2 Required Ports, page 2 System Requirements, page 3 Important Prerequisites for Installing Cisco
More informationCUBE. Configuration Management Report. Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu
CUBE Configuration Management Report Configuration Management Report Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu 2010 C U B E C O N F I G U R A T I O N M A N A G E M E N T R E P O R T Table
More informationGUI Computer Simulator
Comp145 UNC Chapel Hill Contract II GUI Computer Simulator Team #8 Client: Dr. Frederick P. Brooks Jr. and Prof. Greg Welch February 13, 2001 Dr. Frederick P. Brooks Jr. Chris Bailey [Admin] Ed Goode [Librarian]
More informationNetwork Behavior Analysis
N E T W O R K O P E R AT I O N S. S I M P L I F I E D. FORWARD ENTERPRISE HIGHLIGHTS Forward Networks is the leader in Intent-based Networking and network assurance to automate the analysis and verification
More information