Redefining Personal with

Size: px
Start display at page:

Download "Redefining Personal with"

Transcription

1 Redefining Personal with Monica S. Lam Stanford University MokaFive, Inc.

2 Trends Personal Shake up ager 25 years of PC dominance

3 Opportunity for a Clean Slate Approach mainframe mini workstation PC laptop phone 10x cheaper, 10x more users

4 Triple Play: Internet Access, TV, Telephone Media Communication Games Computation

5 Emerging Models In your pocket Always on Device independent Central management Rich legacy apps Locality of reference Offline execution

6 Emerging Models In your pocket Always on TV out Device independent Central management VDI Google Gears Native client Rich legacy apps Locality of reference Offline execution

7 Tian Di Ren (天地人) 3 Tier Architecture 天 Tian (Heaven) 人 Ren (Man) 地 Di (Earth) servers data My key, cache, window into my digital cloud: ID, personality, assets, and the internet Personalize the generic PC, borrow the power, display, keyboard, memory, etc PC,TV at home, on the road, in hotels, on the plane

8 How Do We Get There?

9 Laptops Today Ongoing Issues Security Zero day root kit vulnerability Data center security Data leakage Business Management cost Emerging trends Going green Working from home BYOPC Mac vs Windows Cell phones vs. PCs Agent-based management tools on corporate PCs 3/16/09 9

10 Convergence of Personal & Corporate Dilemma: How to empower individuals and provide security? 78% use personal computers for work 43% use work computers for personal use % of workers altering security secngs % of workers downloading personal applica@ons % of workers downloading personal pictures & videos 25% 31% 43%

11 Laptops Today Monolithic system every PC is different hard to manage by IT/users System Stack: HW, OS, apps Principals: HW owner, IT, user Security vs Choice

12 of Concerns of all intelligent thinking Focus on one, knowing that we are only occupying ourselves with one aspect It is being one and track minded simultaneously The only available technique for ordering of one's thoughts. On the Role of Thought, Edsger W. Dijkstra, 1974

13 3 Sets of Concerns User IT Ubiquity

14 SeparaCon of Concerns achieved through Modularity x86 virtualizacon separates Hardware instance: Dynamic binding of VM Hardware and OS: OSes Hardware config: Virtual device drivers Different user roles: Different VMs

15 Tian Di Ren (天地人) 3 Tier Architecture 天 Tian (Heaven) 人 Ren (Man) 地 Di (Earth) servers data My key, cache, window into my digital ID, digital personality, digital assets, and the internet Personalize the generic PC, borrow the power, display, keyboard, memory, etc PC,TV at home, on the road, in hotels, on the plane

16 1 st Approx: Desktop As a Service (DaaS) LivePCs User Data Stanford Collec@ve project, MokaFive LivePCs: managed virtual machines in the cloud PCs: generic compu@ng plalorm Phone: mobile access, write through cache, network accelerator

17 System Design and

18 3 Sets of Concerns Data Personal Apps User IT AAA Guest OS, AV Corporate Apps Ubiquity PCs, devices Host OSes Environment: printers, network Mobility, portability

19 System Anatomy User Data User Apps IT: Managed Apps User Content Services Guest Manager IT: Guest OS + An@ virus IT Services Virtual Machine Monitor LivePC Manager Flash Manager Host Manager Baremetal Windows Mac Linux Client PC + Devices LivePC Services

20 System Anatomy User Data User Apps IT: Managed Apps Guest Manager IT: Guest OS + An@ virus Virtual Machine Monitor LivePC Manager Flash Manager Host Manager Baremetal Windows Mac Linux Client PC + Devices Cross plalorm: Windows, Mac, Linux 3D graphics Printer

21 System Anatomy User Data User Apps IT: Managed Apps Guest Manager IT: Guest OS + An@ virus Virtual Machine Monitor LivePC Manager Flash Manager Host Manager Baremetal Windows Mac Linux Client PC + Devices Dynamic install Flash performance opt. Document access on mobile phones

22 System Anatomy User Data User Apps IT: Managed Apps Guest Manager IT: Guest OS + An@ virus Virtual Machine Monitor LivePC Manager Flash Manager Host Manager Baremetal Windows Mac Linux Client PC + Devices Authen@ca@on: LDAP Authoriza@on: revoca@on, offline access Accoun@ng: logging, dlp Role based customiza@on Encryp@on Storage Virtualiza@on: rejuvena@on, incremental & atomic system update, caching, prefetching, demand paging Mul@ tenancy

23 System Anatomy User Data User Apps IT: Managed Apps Guest Manager IT: Guest OS + An@ virus Virtual Machine Monitor VMware player Virtualbox LivePC Manager Flash Manager Host Manager Baremetal Windows Mac Linux Client PC + Devices

24 System Anatomy User Data User Apps IT: Managed Apps Guest Manager IT: Guest OS + An@ virus Virtual Machine Monitor LivePC Manager Single sign on VPN integra@on Uniquifica@on: Domain join, SID User installed apps Separa@on of system & user data Data & app backup Flash Manager Host Manager Baremetal Windows Mac Linux Client PC + Devices

25 Design Principles of Concerns rule: 90% of the code handles Re install the OS Outside the box management Only to zero day rootkit apacks Bootstrapping from a small trusted code base Baremetal LivePC Player IT managed base image: Windows + AV User apps & data

26 Desktop as a Service (DaaS) In your pocket Always on LivePCs Device independence Central management Rich, legacy apps Locality of reference Offline execution

27 Current Research Tian Di Ren ( ) applica@on infrastructure Users maintain ownership of personal data Distributed social networking applica@ons Part of Stanford POMI 2020 (Programmable Open Mobile Internet) An NSF Expedi@on, 2008

28 LivePCs

Mobile & Secure End-Point Computing with Managed Virtual Machines. Monica Lam Stanford University

Mobile & Secure End-Point Computing with Managed Virtual Machines. Monica Lam Stanford University Mobile & Secure End-Point Computing with Managed Virtual Machines Monica Lam Stanford University Pressing Problems Consumerization of IT: Using home computers Viruses on home computers attacking the data

More information

Personal Cloud CompuIng

Personal Cloud CompuIng Personal Cloud CompuIng Monica Lam, Stanford University Seok Won Seong, Sudheendra Hangal, Chris Brigham, Debangsu Sengupta, Greg Bayer, Jiwon Seo, MaEhew Nasielski, Michael Fischer, Ben Dobson Programmable

More information

Reclaiming Data Ownership with the Tian Di Ren Architecture

Reclaiming Data Ownership with the Tian Di Ren Architecture Reclaiming Data Ownership with the Tian Di Ren Architecture Monica Lam Stanford University with Dan Boneh, Jeff Heer, Hiroaki Kameyama, Ruven Chu, Ben Dodson, Bobby Georgescu, SudheendraHangal, Te Yuan

More information

Database Machine Administration v/s Database Administration: Similarities and Differences

Database Machine Administration v/s Database Administration: Similarities and Differences Database Machine Administration v/s Database Administration: Similarities and Differences IOUG Exadata Virtual Conference Vivek Puri Manager Database Administration & Engineered Systems The Sherwin-Williams

More information

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop

More information

Today s Objec4ves. Data Center. Virtualiza4on Cloud Compu4ng Amazon Web Services. What did you think? 10/23/17. Oct 23, 2017 Sprenkle - CSCI325

Today s Objec4ves. Data Center. Virtualiza4on Cloud Compu4ng Amazon Web Services. What did you think? 10/23/17. Oct 23, 2017 Sprenkle - CSCI325 Today s Objec4ves Virtualiza4on Cloud Compu4ng Amazon Web Services Oct 23, 2017 Sprenkle - CSCI325 1 Data Center What did you think? Oct 23, 2017 Sprenkle - CSCI325 2 1 10/23/17 Oct 23, 2017 Sprenkle -

More information

Understanding VDI End-to-End

Understanding VDI End-to-End Understanding VDI End-to-End Cloud Client-Computing Dario Gnaccarini Sales Engineer Cloud client-computing Matteo Mazzari Principal Consultant Services Compute continues to change 3 Billion people worldwide

More information

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....

More information

Leviathan redux. John L. Manferdelli Intel Science and Technology Center for Secure Compu;ng UC, Berkeley

Leviathan redux. John L. Manferdelli Intel Science and Technology Center for Secure Compu;ng UC, Berkeley Leviathan redux John L. Manferdelli Intel Science and Technology Center for Secure Compu;ng UC, Berkeley Joint work with Tom Roeder (Google), Fred Schneider (Cornell) And Kevin Walsh of Mt Holyoke College

More information

Unit A: Computer and Internet Basics

Unit A: Computer and Internet Basics Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.

More information

Now? Ron LaPedis, CISSP-ISSAP, ISSMP, MBCP, MBCI SPYRUS, Inc. Michael F. Angelo, CSA NetIQ Corporation

Now? Ron LaPedis, CISSP-ISSAP, ISSMP, MBCP, MBCI SPYRUS, Inc. Michael F. Angelo, CSA NetIQ Corporation Bring Your Own Computer To Title Work of - Presentation What Now? Ron LaPedis, CISSP-ISSAP, ISSMP, MBCP, MBCI SPYRUS, Inc Michael F. Angelo, CSA NetIQ Corporation Bring your own computer BYOC is Consumerization

More information

CCW Workshop Technical Session on Mobile Cloud Compu<ng

CCW Workshop Technical Session on Mobile Cloud Compu<ng CCW Workshop Technical Session on Mobile Cloud Compu

More information

Symantec Endpoint Protection

Symantec Endpoint Protection Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,

More information

Service Description VMware Horizon Cloud Service on Microsoft Azure

Service Description VMware Horizon Cloud Service on Microsoft Azure VMware Horizon Cloud Service on Microsoft Azure Effective: October 12, 2017 The product described in this Service Description is protected by U.S. and international copyright and intellectual property

More information

VMware Virtual SAN Technology

VMware Virtual SAN Technology VMware Virtual SAN Technology Today s Agenda 1 Hyper-Converged Infrastructure Architecture & Vmware Virtual SAN Overview 2 Why VMware Hyper-Converged Software? 3 VMware Virtual SAN Advantage Today s Agenda

More information

Module 1: Virtualization. Types of Interfaces

Module 1: Virtualization. Types of Interfaces Module 1: Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform

More information

Transform to Your Cloud

Transform to Your Cloud Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to

More information

CS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following:

CS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following: CS 470 Spring 2018 Mike Lam, Professor Virtualization and Cloud Computing Content taken from the following: A. Silberschatz, P. B. Galvin, and G. Gagne. Operating System Concepts, 9 th Edition (Chapter

More information

A U.S. based so,ware development and technical consul9ng company. Technical Capabilities Overview

A U.S. based so,ware development and technical consul9ng company. Technical Capabilities Overview A U.S. based so,ware development and technical consul9ng company Technical Capabilities Overview Overview Team Software Engineers, supported by full QA team authoring automated tests All located in single

More information

Service Description VMware Horizon Cloud Service on Microsoft Azure

Service Description VMware Horizon Cloud Service on Microsoft Azure VMware Horizon Cloud Service on Microsoft Azure Last Updated: 15 October 2018 The product described in this is protected by U.S. and international copyright and intellectual property laws, and is covered

More information

Distributed Systems COMP 212. Lecture 18 Othon Michail

Distributed Systems COMP 212. Lecture 18 Othon Michail Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and

More information

Hypervisors at Hyperscale

Hypervisors at Hyperscale Hypervisors at Hyperscale ARM, Xen, Servers and Evolution of the Data Center Larry Wikelius Co-Founder & VP Software 1 Overview l Market Dynamics l Technology Trends l Roadmaps Where are we today l Use

More information

IT User Experience Governance Committee

IT User Experience Governance Committee IT User Experience Governance Committee Desktop Virtualization ( VDI ) Current and Future State Agenda: James Duncan Information Technology james.duncan@ What is VDI? What are the benefits of VDI? Current

More information

Install Apache Manually Windows Server 2008 R2 On Vmware Player

Install Apache Manually Windows Server 2008 R2 On Vmware Player Install Apache Manually Windows Server 2008 R2 On Vmware Player You can use the VMXNET driver included with VMware Tools for a Windows NT guest. However, VMware Tools cannot install the VMXNET driver automatically.

More information

VMware Enterprise Desktop Solutions: What s NEW with VMware View 3. John Hinkle Professional Services Practice principal February 18 th, 2009

VMware Enterprise Desktop Solutions: What s NEW with VMware View 3. John Hinkle Professional Services Practice principal February 18 th, 2009 VMware Enterprise Desktop Solutions: What s NEW with VMware View 3 John Hinkle Professional Services Practice principal February 18 th, 2009 Agenda What is VMware View 3 Market Momentum What s new with

More information

VIRTUALBOX UBUNTU EBOOK

VIRTUALBOX UBUNTU EBOOK 17 March, 2018 VIRTUALBOX UBUNTU EBOOK Document Filetype: PDF 277.47 KB 0 VIRTUALBOX UBUNTU EBOOK It installs on your existing Intel or AMD-based computers, whether they are running Windows, Mac, Linux

More information

Cyber Security Capabilities

Cyber Security Capabilities Cyber Security Capabilities Informa:on Assurance ü Vulnerability Assessment ü Penetra8on Tes8ng ü Informa8on Security Assessment ü Applica8on Security Evalua8on ü Network Traffic Assessment ü Cri8cality

More information

Virtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons.

Virtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons. Virtualization Yifu Rong Introduction Virtualiza5on provide an abstract environment to run applica5ons. Virtualiza5on technologies have a long trail in the history of computer science. Why we interested?

More information

Standalone to SQL Server HA Clusters in Minutes.

Standalone to SQL Server HA Clusters in Minutes. Standalone to SQL Server HA Clusters in Minutes Connor.Cox@DH2i.com Failover Cluster Instances Instance- level failover Applica:on, OS, and infrastructure protec:on Fast, automated failover Free hdps://technet.microsog.com/en-

More information

Uninstalling And Manually Install Vmware Tools Ubuntu Server 11.04

Uninstalling And Manually Install Vmware Tools Ubuntu Server 11.04 Uninstalling And Manually Install Vmware Tools Ubuntu Server 11.04 Installing VMware Tools in an Ubuntu virtual machine (1022525) Manually Building VMware Tools Kernel Modules in Ubuntu Guests VMware GSX

More information

CLOUD SERVICES. Cloud Value Assessment.

CLOUD SERVICES. Cloud Value Assessment. CLOUD SERVICES Cloud Value Assessment www.cloudcomrade.com Comrade a companion who shares one's ac8vi8es or is a fellow member of an organiza8on 2 Today s Agenda! Why Companies Should Consider Moving Business

More information

Learning Outcomes. Extended OS. Observations Operating systems provide well defined interfaces. Virtual Machines. Interface Levels

Learning Outcomes. Extended OS. Observations Operating systems provide well defined interfaces. Virtual Machines. Interface Levels Learning Outcomes Extended OS An appreciation that the abstract interface to the system can be at different levels. Virtual machine monitors (VMMs) provide a lowlevel interface An understanding of trap

More information

NVIDIA GRID. Ralph Stocker, GRID Sales Specialist, Central Europe

NVIDIA GRID. Ralph Stocker, GRID Sales Specialist, Central Europe NVIDIA GRID Ralph Stocker, GRID Sales Specialist, Central Europe rstocker@nvidia.com GAMING AUTO ENTERPRISE HPC & CLOUD TECHNOLOGY THE WORLD LEADER IN VISUAL COMPUTING PERFORMANCE DELIVERED FROM THE CLOUD

More information

Horizon Cloud with On-Premises Infrastructure Administration Guide. VMware Horizon Cloud Service Horizon Cloud with On-Premises Infrastructure 1.

Horizon Cloud with On-Premises Infrastructure Administration Guide. VMware Horizon Cloud Service Horizon Cloud with On-Premises Infrastructure 1. Horizon Cloud with On-Premises Infrastructure Administration Guide VMware Horizon Cloud Service Horizon Cloud with On-Premises Infrastructure 1.3 Horizon Cloud with On-Premises Infrastructure Administration

More information

Applica'on-level protocols, AAA, Management, Security

Applica'on-level protocols, AAA, Management, Security LP-WAN BOF Applica'on-level protocols, AAA, Management, Security Rafa Mar'n Lopez (rafa@um.es) Dan García Carrillo (dan.garcia@um.es) LP-WAN network access control Only authen'cated and authorized nodes

More information

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice

More information

DaaS. Contents. Overview. Overview Features DaaS Clients What is DaaS FAQ s Migration Services. Benefits. 1 P a g e

DaaS. Contents. Overview. Overview Features DaaS Clients What is DaaS FAQ s Migration Services. Benefits. 1 P a g e DaaS Contents Overview Features DaaS Clients What is DaaS FAQ s Migration Services Overview DaaS or Virtual Desktop (Desktop-as-a-Service) Our Virtual Desktop put ends to the endless process of buying,

More information

INTRODUCTION TO COMPUTERS AND WINDOWS 10

INTRODUCTION TO COMPUTERS AND WINDOWS 10 INTRODUCTION TO COMPUTERS AND WINDOWS 10 Pam Stephens, Instructor email: pamela.stephens890@gmail.com Sign in: Take one of each handout. Please sit at a computer that is already turned on. Thank you! WHAT

More information

Copyright 2012 EMC Corporation. All rights reserved. EMC VSPEX. Christian Stein

Copyright 2012 EMC Corporation. All rights reserved. EMC VSPEX. Christian Stein 1 EMC VSPEX Christian Stein Christian.stein@emc.com 2 Cloud A New Architecture Old World Physical New World Virtual Dedicated, Vertical Stacks Dynamic Pools Of Compute & Storage Three Paths To The Private

More information

Virtualization. Michael Tsai 2018/4/16

Virtualization. Michael Tsai 2018/4/16 Virtualization Michael Tsai 2018/4/16 What is virtualization? Let s first look at a video from VMware http://www.vmware.com/tw/products/vsphere.html Problems? Low utilization Different needs DNS DHCP Web

More information

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation Whitepaper Endpoint Strategy: Debunking Myths about Isolation May 2018 Endpoint Strategy: Debunking Myths about Isolation Endpoints are, and have always been, a major cyberattack vector. Attackers, aiming

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 3.1: OS Security Basics of secure design Endadul Hoque Slide Acknowledgment Contents are based on slides from Ninghui Li (Purdue), John Mitchell (Stanford), Dan Boneh (Stanford)

More information

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted

More information

Stanford University. Programmable Open Mobile Internet. pomi.stanford.edu. Expeditions in Computing PI Meeting May 14-16, 2013

Stanford University. Programmable Open Mobile Internet. pomi.stanford.edu. Expeditions in Computing PI Meeting May 14-16, 2013 Stanford University POMI 2020 Programmable Open Mobile Internet POMI 2020 pomi.stanford.edu Expeditions in Computing PI Meeting May 14-16, 2013 PI Nick McKeown nickm@stanford.edu Presenters Monica Lam

More information

2013 InterWorks, Page 1

2013 InterWorks, Page 1 2013 InterWorks, Page 1 The BYOD Phenomenon 68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets. IT organizations

More information

Red Hat Atomic Details Dockah, Dockah, Dockah! Containerization as a shift of paradigm for the GNU/Linux OS

Red Hat Atomic Details Dockah, Dockah, Dockah! Containerization as a shift of paradigm for the GNU/Linux OS Red Hat Atomic Details Dockah, Dockah, Dockah! Containerization as a shift of paradigm for the GNU/Linux OS Daniel Riek Sr. Director Systems Design & Engineering In the beginning there was Stow... and

More information

Network Virtualization Business Case

Network Virtualization Business Case SESSION ID: GPS2-R01 Network Virtualization Business Case Arup Deb virtual networking & security VMware NSBU adeb@vmware.com I. Data center security today Don t hate the player, hate the game - Ice T,

More information

Software-defined Media Processing

Software-defined Media Processing Software-defined Media Processing Matthew Goldman SVP Technology, TV & Media agenda Media Processing Challenges Value of Virtualization Software Defined Media Processing Moving to the Cloud Ericsson 2017

More information

The Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36

The Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization X86 operating systems are designed to run directly on the bare-metal hardware,

More information

Enterprise Architectures The Pace Accelerates Camberley Bates Managing Partner & Analyst

Enterprise Architectures The Pace Accelerates Camberley Bates Managing Partner & Analyst Enterprise Architectures The Pace Accelerates Camberley Bates Managing Partner & Analyst Change is constant in IT.But some changes alter forever the way we do things Inflections & Architectures Solid State

More information

ProfileUnity with FlexApp Technology

ProfileUnity with FlexApp Technology ProfileUnity with FlexApp Technology Guide for Upgrading Versions Prior to 5.5 Introduction This guide has been authored by experts at Liquidware in order to provide information and guidance concerning

More information

Redefine Data Protection: Next Generation Backup And Business Continuity

Redefine Data Protection: Next Generation Backup And Business Continuity Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen

More information

Chapter 5 C. Virtual machines

Chapter 5 C. Virtual machines Chapter 5 C Virtual machines Virtual Machines Host computer emulates guest operating system and machine resources Improved isolation of multiple guests Avoids security and reliability problems Aids sharing

More information

Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)

Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Trusted Computing Hardware What can you do if you have

More information

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor

More information

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced

More information

Smartphone Mobile Compu9ng CSEP590B/F Winter 2011 (first offering) 7 th Lecture, 28 February 2011

Smartphone Mobile Compu9ng CSEP590B/F Winter 2011 (first offering) 7 th Lecture, 28 February 2011 Smartphone Mobile Compu9ng CSEP590B/F Winter 2011 (first offering) 7 th Lecture, 28 February 2011 Instructor: Gaetano Borriello Teaching Assistants: Temitope Oluwafemi and Cary Anderson CSEP590B/F Winter

More information

Download vm virtualbox in virtualbox.org/. How to Install OSX on Virtualbox.

Download vm virtualbox in virtualbox.org/. How to Install OSX on Virtualbox. Manual Java Installing Mac Os X Lion On Pc Virtualbox To create a virtual machine, open up Virtualbox and click New on the upper left. Give your new virtual machine a name, and choose Mac OS X for the

More information

Transforming IT: From Silos To Services

Transforming IT: From Silos To Services Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 BUILDING AN EFFICIENT AND FLEXIBLE VIRTUAL INFRASTRUCTURE Storing and Protecting Wouter Kolff Advisory Technology Consultant EMCCAe 2 Waves Of Change Mainframe Minicomputer PC/ Microprocessor Networked/

More information

S5005 VIRTUALIZATION AN INTRO TO VIRTUALIZATION. Jeremy Main Senior Solution Architect - GRID

S5005 VIRTUALIZATION AN INTRO TO VIRTUALIZATION. Jeremy Main Senior Solution Architect - GRID S5005 VIRTUALIZATION 101 - AN INTRO TO VIRTUALIZATION Jeremy Main Senior Solution Architect - GRID Virtualization 101 AGENDA 1 Why virtualize 2 Why NVIDIA cares about virtualization 3 How to get started

More information

Manual Java Install Mac Os X Mountain Lion On Pc Vmware

Manual Java Install Mac Os X Mountain Lion On Pc Vmware Manual Java Install Mac Os X Mountain Lion On Pc Vmware Mac OS X Tiger, Leopard, Snow Leopard, Lion, Mountain Lion, and Maverick. These can be installed either manually or using the Java installer.. definition

More information

Making Cloud Easy: Components of a Distributed. Design Considerations and First. Operating System for Cloud

Making Cloud Easy: Components of a Distributed. Design Considerations and First. Operating System for Cloud Making Cloud Easy: Design Considerations and First Components of a Distributed Operating System for Cloud James Kempf for the Nefele Development Team ER RACSP July 09, 2018 James Kempf ER RACSP 2018-07-09

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme NET1949BU Seamless Network Connectivity for Virtual and Bare-metal s with NSX Suresh Thiru Sridhar Subramanian VMworld 2017 Content: Not for publication VMworld 2017 - NET1949BU Disclaimer This presentation

More information

EMC Strategy Overview: Journey To The Private Cloud

EMC Strategy Overview: Journey To The Private Cloud EMC Strategy Overview: Journey To The Private Cloud Chuck Hollis VP Global Marketing CTO The Private Cloud... What is it? Why now? The Private Cloud: Why now? IT infrastructure Complex Inefficient Inflexible

More information

Red Hat Container Strategy Ahmed El-Rayess

Red Hat Container Strategy Ahmed El-Rayess Red Hat Container Strategy Ahmed El-Rayess I.T. Organiza,ons Under Pressure CONCRETE SHOES OF LEGACY AND RIGID PROCESSES CURRENT STATE Manual processes Inconsistent environments Dependency hell Legacy

More information

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company

More information

1) People: People are end users who use computers to make them- selves more productive.

1) People: People are end users who use computers to make them- selves more productive. 1 An information system has 5 parts: 1People: 1) People: People are end users who use computers to make themselves more productive. 2) Procedures: The rules or guidelines for people to follow when using

More information

REMOTE DESKTOP CLIENT FREE REMOTE DESKTOP CLIENT FREE PDF REMOTE DESKTOP SERVICES - WIKIPEDIA REMOTE DESKTOP SOFTWARE - WIKIPEDIA

REMOTE DESKTOP CLIENT FREE REMOTE DESKTOP CLIENT FREE PDF REMOTE DESKTOP SERVICES - WIKIPEDIA REMOTE DESKTOP SOFTWARE - WIKIPEDIA PDF REMOTE DESKTOP SERVICES - WIKIPEDIA REMOTE DESKTOP SOFTWARE - WIKIPEDIA 1 / 5 2 / 5 3 / 5 remote desktop client free pdf Remote Desktop Services (RDS), known as Terminal Services in Windows Server

More information

EMC FORUM Vic Bhagat. Executive Vice President & Chief Information Officer EMC Corporation

EMC FORUM Vic Bhagat. Executive Vice President & Chief Information Officer EMC Corporation Copyright 20132012 EMC Corporation. EMC Corporation. All rights reserved. All rights reserved. 1 EMC FORUM 2013 Vic Bhagat Executive Vice President & Chief Information Officer EMC Corporation 2 BILLIONS

More information

CTERA Sharing and Protecting User Data on the Cloud. Your Cloud Your Network Your Controls

CTERA Sharing and Protecting User Data on the Cloud. Your Cloud Your Network Your Controls CTERA Sharing and Protecting User Data on the Cloud Your Cloud Your Network Your Controls CTERA Networks Our Focus Backup Private Sync & Share Gateways Hybrid Public Enabling OrganizaDons To Securely and

More information

VMware Horizon FLEX 1.5 WHITE PAPER

VMware Horizon FLEX 1.5 WHITE PAPER WHITE PAPER Table of Contents What Is VMware Horizon FLEX?... 3 Terminology for Horizon FLEX.... 4 Key Benefits of Horizon FLEX... 4 Deploying Horizon FLEX.... 5 Tested Host Operating Systems for Horizon

More information

VMware Hybrid Cloud Solution

VMware Hybrid Cloud Solution VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach

More information

Xen Community Update. Ian Pratt, Citrix Systems and Chairman of Xen.org

Xen Community Update. Ian Pratt, Citrix Systems and Chairman of Xen.org Xen Community Update Ian Pratt, Citrix Systems and Chairman of Xen.org 1 Outline Project Status Xen Client Initiative Xen Cloud Platform New Xen 4.0 Features 2 Announcement The Xen Advisory Board is excited

More information

DC: Le Converged Infrastructure per Software Defined e Cloud Cisco NetApp - Softway. Luigi MARCOCCHIA SOFTWAY

DC: Le Converged Infrastructure per Software Defined e Cloud Cisco NetApp - Softway. Luigi MARCOCCHIA SOFTWAY DC: Le Converged Infrastructure per Software Defined e Cloud Cisco NetApp - Softway Luigi MARCOCCHIA SOFTWAY Today s Businesses Require Greater Agility Focus on increasing speed of business Customers expect

More information

Introduction. Assessment Test. Part I

Introduction. Assessment Test. Part I Contents Introduction Assessment Test xxix lvii Part I 220 901 1 Chapter 1 Motherboards, Processors, and Memory 3 Identifying Components of Motherboards 5 System Board Form Factors 6 System Board Components

More information

Lotus Protector for Mail Security

Lotus Protector for Mail Security Lotus Protector for Mail Security A Consultant in your Pocket series webinar Presented by: Victor Toal Lotus Protector for Mail Security What we will cover in this Webinar 1 Lotus Protector for Mail Security

More information

Is your business future ready?

Is your business future ready? Is your business future ready? Does your organization have this user type? On-the-Go-Pro Convenience: Connectivity: Comfort: Be more mobile with lightweight, portable devices. Stay connected, and even

More information

Oracle Virtual Desktop Infrastructure

Oracle Virtual Desktop Infrastructure Oracle Virtual Desktop Infrastructure Best Practice and Unit Selling Points Thomas Assum and Rolf-Per Thulin Sales Consultants Europe VDI Global Business Unit Agenda Oracle Desktop Virtualization Introduction

More information

Cisco NAC Network Module for Integrated Services Routers

Cisco NAC Network Module for Integrated Services Routers Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco

More information

Technical Overview. Jack Smith Sr. Solutions Architect

Technical Overview. Jack Smith Sr. Solutions Architect Technical Overview Jack Smith Sr. Solutions Architect Liquidware Labs Methodology Production Environments Assess Design POCs/Pilots Stratusphere FIT Stratusphere UX Validate Migrate ProfileUnity FlexApp

More information

Desktop as a Service (DaaS)

Desktop as a Service (DaaS) Desktop as a Service (DaaS) Service Description Last Updated: May 18, 2018 The information in this document may not be reproduced in whole, or in part, nor may any of the information contained therein

More information

RED HAT ENTERPRISE VIRTUALIZATION 3.0

RED HAT ENTERPRISE VIRTUALIZATION 3.0 RED HAT ENTERPRISE VIRTUALIZATION 3.0 YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE John Rinehart, Product Marke3ng Manager Mark St. Laurent, Senior Solu3on Architect Email: msl@redhat.com March 28, 2012 AGENDA

More information

AWS Iden)ty And Access Management (IAM) Manohar Rapolu

AWS Iden)ty And Access Management (IAM) Manohar Rapolu AWS Iden)ty And Access Management (IAM) Manohar Rapolu Topics Introduc5on Principals Authen5ca5on Authoriza5on Other Key Feature -> Mul5 Factor Authen5ca5on -> Rota5ng Keys -> Resolving Mul5ple Permissions

More information

USING A FREE VIRTUAL MACHINE TO SIMILATE A SPECIFIC MODEL OF COMPUTER

USING A FREE VIRTUAL MACHINE TO SIMILATE A SPECIFIC MODEL OF COMPUTER USING A FREE VIRTUAL MACHINE TO SIMILATE A SPECIFIC MODEL OF COMPUTER 1 Web location for this presentation: http://aztcs.org Click on Meeting Notes 2 SUMMARY From inside your existing computer, you can

More information

Windows Xp Mode Manually Publish Applications

Windows Xp Mode Manually Publish Applications Windows Xp Mode Manually Publish Applications To install on Microsoft Windows Vista or Windows 7, you must run the Oracle set the compatibility mode manually before running the installer, or let Windows

More information

efolder BDR for Quest Rapid Recovery / VMware Continuity Cloud Guide

efolder BDR for Quest Rapid Recovery / VMware Continuity Cloud Guide efolder BDR for Quest Rapid Recovery / VMware Continuity Cloud Guide Accessing Continuity Cloud via VSphere Restore Your VM/Point in time restore Setting up Virtual Standby efolder BDR Guide for Veeam

More information

IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security

IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security WE, 09:00-10:00 IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security Paul Murgatroyd Principal Product Manager Chip Epps Principal Product Manager 1 Agenda 1 The Virtual

More information

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers

More information

Lesson 1 Parts are adapted from Windows 98 by Mark Twain Media, Inc.

Lesson 1 Parts are adapted from Windows 98 by Mark Twain Media, Inc. Parts are adapted from Windows 98 by Mark Twain Media, Inc. A Computer is an electronic machine. Even though they seem powerful and mysterious, computers are just machines. When we think of machines, we

More information

What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet.

What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. 1 INTRODUCTION What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. Cloud computing encompasses any Subscriptionbased or pay-per-use

More information

Networks with Cisco NAC Appliance primarily benefit from:

Networks with Cisco NAC Appliance primarily benefit from: Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,

More information

Why Upgrade to Liferay Digital Experience Platform? The Right Solution for Your Future Challenges

Why Upgrade to Liferay Digital Experience Platform? The Right Solution for Your Future Challenges Why Upgrade to Liferay Digital Experience Platform? The Right Solution for Your Future Challenges Table of Contents Transform Your Business With a Modern Platform.............. 1 The Evolving Role of IT

More information

Blackbird Strategic Rationale

Blackbird Strategic Rationale EXHIBIT 15 Blackbird Strategic Rationale February 26 th, 2009 ****Draft**** 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Itanium

More information

Lab 0 Getting Started. Sistemas Operativos: Práctica 0 1

Lab 0 Getting Started. Sistemas Operativos: Práctica 0 1 Lab 0 Getting Started Sistemas Operativos: Práctica 0 1 Session Index Preparation: Lab & Virtualization Assignment 1: Course VM Assignment 2: Snapshots Sistemas Operativos: Práctica 0 2 Preparation: Lab

More information

Oracle VM Workshop Applica>on Driven Virtualiza>on

Oracle VM Workshop Applica>on Driven Virtualiza>on Oracle VM Workshop Applica>on Driven Virtualiza>on Simon COTER Principal Product Manager Oracle VM & VirtualBox simon.coter@oracle.com hnps://blogs.oracle.com/scoter November 25th, 2015 Copyright 2014

More information

CHAPTER 16 - VIRTUAL MACHINES

CHAPTER 16 - VIRTUAL MACHINES CHAPTER 16 - VIRTUAL MACHINES 1 OBJECTIVES Explore history and benefits of virtual machines. Discuss the various virtual machine technologies. Describe the methods used to implement virtualization. Show

More information

Create a Virtual Test Environment

Create a Virtual Test Environment Create a Virtual Test Environment Step by Step Exercises Hans-Petter Halvorsen, M.Sc. Why Do We Need a Test Environment? Why cant we just use our own PC? Why Test Environment? It works on my PC says the

More information