Runtime Application Self-Protection (RASP) Performance Metrics
|
|
- Blaise Hunt
- 5 years ago
- Views:
Transcription
1 Product Analysis June 2016 Runtime Application Self-Protection (RASP) Performance Metrics Virtualization Provides Improved Security Without Increased Overhead Highly accurate. Easy to install. Simple to operate. Nollaig Heffernan Director of Product Delivery
2 Table of Contents Executive Summary 3 Introduction 3 Defining and Measuring Performance 3 How Waratek Works 4 Performance Test Environment 5 Application Under Test 5 Workload Characteristics 5 Test Methodology 5 Test Environment Setup and Tuning 7 Results 8 Conclusion 10 2
3 Executive Summary It is widely accepted that all application runtime security controls introduce a performance overhead when providing protection for an application. In this test case, Waratek s Runtime Application Self Protection (RASP) technology was tested to measure the performance overhead it introduced while providing protection for an application. This paper demonstrates that the overhead of this solution is less than 3% when considering response time and throughput. Furthermore, when an application is under load with 12% attack traffic, memory consumption is improved by 4% compared to running the same Application on a standard unprotected JVM. Introduction In providing protection for applications it is important to understand the cost in terms of performance. Waratek s application security solution is a completely in-process technology that provides highly accurate detection and blocking of malicious application attacks at runtime. Waratek s solution protects applications from sophisticated attacks without having to install network devices or make code changes. Waratek embeds security into the Java run-time layer, not in the app itself. Pre-defined security rules immediately identify and optionally block compromised application behavior with minimal performance impact. A member of the RASP category of solutions, Waratek is uniquely able to secure enterprise applications because it possesses complete information about an application s behavior at a level of granularity network devices cannot. And, because it is tightly wrapped around the application, it seamlessly supports public or private cloud deployments. Defining and Measuring Performance Application architecture and dependences determines the way in which requests are processed. There are a number of factors like application load, file and network IO, and other application and system factors that impact application responsiveness. It is the characteristics of response that define performance. When considering the performance of an application we consider two key metrics here. Response time: This is the most widely used metric of performance and it is simply a direct measure of how long it takes to process a request. Throughput: A straightforward count of the number of requests that the application can process within a defined time interval. 3
4 For Web applications, a count of page impressions or requests per second is often used as a measure of throughput. Resource consumption is also an important consideration, even more important for applications deployed in elastic environments, such as the cloud. With these larger scale and geographically dispersed applications, scalability and performance become inextricably linked that can most easily be described from a resource-centric point of view. The purposes of this test we measure memory consumption for an application protected and unprotected when under load. How Waratek Works Ø Waratek is a simple.jar plug-in that, once installed, creates a secure, virtual container around your entire application stack. Ø A Java Container is a protected in-jvm container with built in application security and quarantine controls. Ø The Java container separates apart the vulnerable JRE code (where the insecure Java APIs reside) from the low-level JVM (the JIT compiler and GC). Ø Application security controls inserted between the Java Container and the JVM protect and quarantine the Java application. Business Logic 3 rd Party Components Platform & Java APIs Ø Every Java container is a completely isolated abstraction of a real JVM. Ø Each Java container has its own classpath, classloaders, namespace, environment variables, heap allocation and resource quotas. Ø All code running inside a Java container is essentially trapped and emulated in the same way as a hardware Virtual Machine Monitor. Ø Every container (guest) has its own JRE version that can be different from the host JVM version. 4
5 Performance Test Environment Application Under Test For the purposes of this test we used a purpose-built vulnerable web application called Spiracle. It can be accessed at This application is used to test and demonstrate Web Application security technologies and provides a good and comprehensive example of everyday requests that can be used to exploit any application. This application will run on any compatible Java EE Application Sever including Apache Tomcat, JBoss, Weblogic and WebSphere, etc. It also supports Oracle, MySql and MS SQL databases. Workload Characteristics Apache JMeter was used as the workload driver to send requests to the system under test and to measure the key metrics captured during the test phase: Response Time and Throughput. The workload was made up of 50 http requests. The Thread Group was composed with 20 threads to simulate 20 concurrent users where each thread performs 30 iterations. This makes a total of (20 x 50) x30 = 30,000 samples. We define this as 1 run. Within each run there are 6 malicious http requests that cover some of the most severe critical vectors as described in the OWASP and SANS Top Five. This represents 12% malicious attack traffic, which would be considered very high for normal application traffic. Test Methodology When determining the performance impact or overhead of the Waratek RASP solution, we re measuring the performance difference between running an application unprotected, vulnerable to exploits versus running protected by Waratek s RASP solution. To achieve a direct comparison, we run the test application on an unprotected standard Java Virtual Machine and also run the same application on Waratek s RASP solution under identical test conditions. As a base lined control, we execute the workload on a standard Hotspot Java Virtual Machine with no protection in place. We then compare the response time and throughput between the application running on a standard JVM and that same application under identical conditions when running protected on the Waratek Security solution. The first loop of the test iteration is a warm-up loop, which engages and warms up the compiler on both JVM s and is not considered part of the test results. Memory consumption was monitored and logged using pidstat. The pidstat command is used for monitoring individual tasks currently being managed by the Linux kernel. 5
6 Memory usage was logged at 3 second intervals from the point where the tomcat application server had started to where a run had completed. Note: On start-up a run was immediately kicked off. Fig.1 Application Stack Comparison, Waratek - Hotspot For the purposes of this test, we use a standard Hotspot Java Virtual Machine version 1.7. The Application will run in an unprotected state on this JVM. The Waratek solution is the bundled deployment option; see Option 2 above under Deployment Options. Spiracle will run on a version 1.7 Hotspot in the Guest Container. The Host Virtual machine of the bundled RASP solution is Hotspot 1.8. Note: this is an apples-to-apples comparison with the app running on identical Hotspot Virtual machine versions. Test Environment Setup and Tuning Apache JMeter is running on a client desktop machine with a default configuration. The JMeter memory allowance was set to Xms 512m Xmx512m. The System under test where the test application and Waratek s RASP solution are running is hosted on a Server instance deployed on a separate internal network. The Oracle database is also running on the same server instance. The Apache Tomcat application server had its memory allowance set to 1G i.e. -Xms1G Xmx1G. In addition, the G1 Garbage Collector was set as the primary Garbage Collector. The Garbage First Garbage Collector (G1 GC) is the low-pause, server-style generational garbage collector for Java Hotspot VM. -XX:+UseG1GC. Using the G1 C will allow us to see more predictable behaviour in the applications behaviour. No other tuning options were selected. 6
7 Fig 2. Test System - Environment Setup 7
8 Results Response Time (milliseconds) Overhead Runs Waratek (m/s) Hotspot (m/s) Average % 8
9 Throughput (Requests per second) - Overhead Runs Waratek (requests/sec) Hotspot (requests/sec) Average % 9
10 Memory (RSS) Consumption - Overhead Runs Waratek (Kb) Hotspot (Kb) Average % Conclusion Waratek s RASP solution is a completely in-process technology that provides highly accurate detection and blocking of malicious application attacks at runtime. As a result of implementing runtime security protections through virtualization, this analysis has demonstrated that the performance overhead associated with providing accurate protection from malicious attack is negligible. Another key finding here; we can observe the benefits of running a legacy application on the Waratek solution whereby a legacy app benefits from the improvements and optimizations within the most current up-to-date version of Java (i.e. a Java 7 guest Application running on a Java 8 host JVM). This is specifically apparent in the memory consumption of the legacy application when under load compared to the baseline standard. 10
Waratek Runtime Protection Platform
Waratek Runtime Protection Platform Cirosec TrendTage - March 2018 Waratek Solves the Application Security Problems That No One Else Can Prateep Bandharangshi Director of Client Security Solutions March,
More informationSaving Time and Costs with Virtual Patching and Legacy Application Modernizing
Case Study Virtual Patching/Legacy Applications May 2017 Saving Time and Costs with Virtual Patching and Legacy Application Modernizing Instant security and operations improvement without code changes
More informationMODULE 1 JAVA PLATFORMS. Identifying Java Technology Product Groups
MODULE 1 JAVA PLATFORMS Identifying Java Technology Product Groups Java SE Platform Versions Year Developer Version (JDK) Platform 1996 1.0 1 1997 1.1 1 1998 1.2 2 2000 1.3 2 2002 1.4 2 2004 1.5 5 2006
More informationJava Performance Tuning and Optimization Student Guide
Java Performance Tuning and Optimization Student Guide D69518GC10 Edition 1.0 June 2011 D73450 Disclaimer This document contains proprietary information and is protected by copyright and other intellectual
More informationPrivate Cloud Management Manage and Operate Applications
Private Cloud Management Manage and Operate Applications Introduction Manage and Operate Applications PRODUCTIVE INFRASTRUCTURE PREDICTABLE APPLICATIONS YOUR CLOUD Heterogeneous support Process automation
More informationJVM Performance Study Comparing Oracle HotSpot and Azul Zing Using Apache Cassandra
JVM Performance Study Comparing Oracle HotSpot and Azul Zing Using Apache Cassandra Legal Notices Apache Cassandra, Spark and Solr and their respective logos are trademarks or registered trademarks of
More informationOptimising Multicore JVMs. Khaled Alnowaiser
Optimising Multicore JVMs Khaled Alnowaiser Outline JVM structure and overhead analysis Multithreaded JVM services JVM on multicore An observational study Potential JVM optimisations Basic JVM Services
More informationOS-caused Long JVM Pauses - Deep Dive and Solutions
OS-caused Long JVM Pauses - Deep Dive and Solutions Zhenyun Zhuang LinkedIn Corp., Mountain View, California, USA https://www.linkedin.com/in/zhenyun Zhenyun@gmail.com 2016-4-21 Outline q Introduction
More informationCertified Core Java Developer VS-1036
VS-1036 1. LANGUAGE FUNDAMENTALS The Java language's programming paradigm is implementation and improvement of Object Oriented Programming (OOP) concepts. The Java language has its own rules, syntax, structure
More informationAn Introduction to the Waratek Application Security Platform
Product Analysis January 2017 An Introduction to the Waratek Application Security Platform The Transformational Application Security Technology that Improves Protection and Operations Highly accurate.
More informationZing Vision. Answering your toughest production Java performance questions
Zing Vision Answering your toughest production Java performance questions Outline What is Zing Vision? Where does Zing Vision fit in your Java environment? Key features How it works Using ZVRobot Q & A
More informationDynamic Vertical Memory Scalability for OpenJDK Cloud Applications
Dynamic Vertical Memory Scalability for OpenJDK Cloud Applications Rodrigo Bruno, Paulo Ferreira: INESC-ID / Instituto Superior Técnico, University of Lisbon Ruslan Synytsky, Tetiana Fydorenchyk: Jelastic
More informationJVM Performance Study Comparing Java HotSpot to Azul Zing Using Red Hat JBoss Data Grid
JVM Performance Study Comparing Java HotSpot to Azul Zing Using Red Hat JBoss Data Grid Legal Notices JBoss, Red Hat and their respective logos are trademarks or registered trademarks of Red Hat, Inc.
More informationJVM Memory Model and GC
JVM Memory Model and GC Developer Community Support Fairoz Matte Principle Member Of Technical Staff Java Platform Sustaining Engineering, Copyright 2015, Oracle and/or its affiliates. All rights reserved.
More informationSystem Requirements for ConSol CM Version Architectural Overview
System Requirements for ConSol CM Version 6.11.1 Architectural Overview ConSol CM is built upon a Java EE web architecture, containing the following core components: JEE Application Server running the
More informationAn Introduction to Runtime Application Self-Protection (RASP)
Product Analysis June 2016 An Introduction to Runtime Application Self-Protection (RASP) The Transformational Application Security Technology that Improves Protection and Operations Highly accurate. Easy
More informationJava Without the Jitter
TECHNOLOGY WHITE PAPER Achieving Ultra-Low Latency Table of Contents Executive Summary... 3 Introduction... 4 Why Java Pauses Can t Be Tuned Away.... 5 Modern Servers Have Huge Capacities Why Hasn t Latency
More informationApplication Security Using Runtime Protection
Application Security Using Runtime Protection How RASP can secure your web applications with point & click protection Waratek Solves the Application Security Problems That No One Else Can Application Security
More informationVirtualizing JBoss Enterprise Middleware with Azul
Virtualizing JBoss Enterprise Middleware with Azul Shyam Pillalamarri VP Engineering, Azul Systems Stephen Hess Sr. Director, Product Management, Red Hat June 25, 2010 Agenda Java Virtualization Current
More informationCisco Integration Platform
Data Sheet Cisco Integration Platform The Cisco Integration Platform fuels new business agility and innovation by linking data and services from any application - inside the enterprise and out. Product
More informationIBM Maximo Anywhere Version 7 Release 6. Planning, installation, and deployment IBM
IBM Maximo Anywhere Version 7 Release 6 Planning, installation, and deployment IBM Note Before using this information and the product it supports, read the information in Notices on page 65. This edition
More informationWhite Paper. Major Performance Tuning Considerations for Weblogic Server
White Paper Major Performance Tuning Considerations for Weblogic Server Table of Contents Introduction and Background Information... 2 Understanding the Performance Objectives... 3 Measuring your Performance
More informationAn Open Architecture for Hybrid Delivery
An Open Architecture for Hybrid Delivery Rajmohan Rajagopalan #Interop #CCEvent April 2014 Hybrid Cloud What & Why? IaaS + PaaS AWS + Azure Private + Public + Managed Reasons for Hybrid Cloud Lower TCO
More informationEnabling Java-based VoIP backend platforms through JVM performance tuning
Enabling Java-based VoIP backend platforms through JVM performance tuning (Bruno Van Den Bossche, Filip De Turck, April 3rd 2006) 3 April, 2006, 1 Outline Introduction Java 4 Telecom Evaluation Setup Hardware
More informationCS5015 Object-oriented Software Development. Lecture: Overview of Java Platform. A. O Riordan, 2010 Most recent revision, 2014 updated for Java 8
CS5015 Object-oriented Software Development Lecture: Overview of Java Platform A. O Riordan, 2010 Most recent revision, 2014 updated for Java 8 Java Programming Language Java is an object-oriented programming
More informationAdvanced Object-Oriented Programming Introduction to OOP and Java
Advanced Object-Oriented Programming Introduction to OOP and Java Dr. Kulwadee Somboonviwat International College, KMITL kskulwad@kmitl.ac.th Course Objectives Solidify object-oriented programming skills
More informationPulse Secure Application Delivery
DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,
More informationProtect your apps and your customers against application layer attacks
Protect your apps and your customers against application layer attacks Development 1 IT Operations VULNERABILITY DETECTION Bots, hackers, and other bad actors will find and exploit vulnerabilities in web
More informationImprove Web Application Performance with Zend Platform
Improve Web Application Performance with Zend Platform Shahar Evron Zend Sr. PHP Specialist Copyright 2007, Zend Technologies Inc. Agenda Benchmark Setup Comprehensive Performance Multilayered Caching
More informationORACLE DATA SHEET KEY FEATURES AND BENEFITS ORACLE WEBLOGIC SUITE
ORACLE WEBLOGIC SERVER KEY FEATURES AND BENEFITS ORACLE WEBLOGIC SUITE Oracle WebLogic Server Enterprise Edition, plus Oracle Coherence Enterprise Edition Scale-out for data intensive applications Active
More informationTop five Docker performance tips
Top five Docker performance tips Top five Docker performance tips Table of Contents Introduction... 3 Tip 1: Design design applications as microservices... 5 Tip 2: Deployment deploy Docker components
More informationTRASH DAY: COORDINATING GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS
TRASH DAY: COORDINATING GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS Martin Maas* Tim Harris KrsteAsanovic* John Kubiatowicz* *University of California, Berkeley Oracle Labs, Cambridge Why you should care
More informationOracle Developer Studio 12.6
Oracle Developer Studio 12.6 Oracle Developer Studio is the #1 development environment for building C, C++, Fortran and Java applications for Oracle Solaris and Linux operating systems running on premises
More informationJava On Steroids: Sun s High-Performance Java Implementation. History
Java On Steroids: Sun s High-Performance Java Implementation Urs Hölzle Lars Bak Steffen Grarup Robert Griesemer Srdjan Mitrovic Sun Microsystems History First Java implementations: interpreters compact
More informationTypical Issues with Middleware
Typical Issues with Middleware HrOUG 2016 Timur Akhmadeev October 2016 About Me Database Consultant at Pythian 10+ years with Database and Java Systems Performance and Architecture OakTable member 3 rd
More informationInstalling on WebLogic Server
155 Chapter 11 Installing on WebLogic Server This chapter provides instructions for performing a new installation of TIBCO Collaborative Information Manager on WebLogic Application Server in a non-clustered
More informationSolution overview VISUAL COBOL BUSINESS CHALLENGE SOLUTION OVERVIEW BUSINESS BENEFIT
BUSINESS CHALLENGE There is an increasing demand from users of business software for easier to use applications which integrate with other business systems. As a result IT organizations are being asked
More informationSupported Operating Environment. Java Support
Supported Operating Environment Java Support 9/10/2018 Java Support Find information about supported versions of Java across all products. eservices eservices Knowledge Manager (Legacy) Knowledge Manager
More informationDiplomado Certificación
Diplomado Certificación Duración: 250 horas. Horario: Sabatino de 8:00 a 15:00 horas. Incluye: 1. Curso presencial de 250 horas. 2.- Material oficial de Oracle University (e-kit s) de los siguientes cursos:
More informationSamsung SDS Enterprise Cloud
Samsung SDS Enterprise Cloud Middleware JBoss EAP/WS WildFly Apache Tomcat JEUS WebLogic Enterprise Cloud Middleware JBoss EAP/WS Open source-based, enterprise-class Java web application server JBoss EAP
More informationIBM Cognos ReportNet and the Java Heap
Proven Practice IBM Cognos ReportNet and the Java Heap Product(s): IBM Cognos ReportNet, IBM Cognos 8 Area of Interest: Performance 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
More informationJVM and application bottlenecks troubleshooting
JVM and application bottlenecks troubleshooting How to find problems without using sophisticated tools Daniel Witkowski, EMEA Technical Manager, Azul Systems Daniel Witkowski - About me IT consultant and
More informationRoadmap to Cloud with Cloud Application Foundation
Roadmap to Cloud with Cloud Application Foundation Maciej Gruszka Oracle FMW PM, EMEA Copyright 2014, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The preceding is intended
More informationOracle JD Edwards EnterpriseOne Object Usage Tracking Performance Characterization Using JD Edwards EnterpriseOne Object Usage Tracking
Oracle JD Edwards EnterpriseOne Object Usage Tracking Performance Characterization Using JD Edwards EnterpriseOne Object Usage Tracking ORACLE WHITE PAPER NOVEMBER 2017 Disclaimer The following is intended
More informationVIProf: A Vertically Integrated Full-System Profiler
VIProf: A Vertically Integrated Full-System Profiler NGS Workshop, April 2007 Hussam Mousa Chandra Krintz Lamia Youseff Rich Wolski RACELab Research Dynamic software adaptation As program behavior or resource
More informationJitterbit is comprised of two components: Jitterbit Integration Environment
Technical Overview Integrating your data, applications, and other enterprise systems is critical to the success of your business but, until now, integration has been a complex and time-consuming process
More informationEnd-to-End Java Security Performance Enhancements for Oracle SPARC Servers Performance engineering for a revenue product
End-to-End Java Security Performance Enhancements for Oracle SPARC Servers Performance engineering for a revenue product Luyang Wang, Pallab Bhattacharya, Yao-Min Chen, Shrinivas Joshi and James Cheng
More informationDeploying Liferay Digital Experience Platform in Amazon Web Services
Deploying Liferay Digital Experience Platform in Amazon Web Services Table of Contents Introduction................................. 1 Reference Architecture........................ 1 Overview..................................
More informationReal Time: Understanding the Trade-offs Between Determinism and Throughput
Real Time: Understanding the Trade-offs Between Determinism and Throughput Roland Westrelin, Java Real-Time Engineering, Brian Doherty, Java Performance Engineering, Sun Microsystems, Inc TS-5609 Learn
More informationOracle JD Edwards EnterpriseOne Object Usage Tracking Performance Characterization Using JD Edwards EnterpriseOne Object Usage Tracking
Oracle JD Edwards EnterpriseOne Object Usage Tracking Performance Characterization Using JD Edwards EnterpriseOne Object Usage Tracking ORACLE WHITE PAPER JULY 2017 Disclaimer The following is intended
More informationPrzyspiesz tworzenie aplikacji przy pomocy Openshift Container Platform. Jarosław Stakuń Senior Solution Architect/Red Hat CEE
Przyspiesz tworzenie aplikacji przy pomocy Openshift Container Platform Jarosław Stakuń Senior Solution Architect/Red Hat CEE jstakun@redhat.com Monetize innovation http://www.forbes.com/innovative-companies/list/
More informationIBM Maximo Anywhere Version 7 Release 6. Planning, installation, and deployment IBM
IBM Maximo Anywhere Version 7 Release 6 Planning, installation, and deployment IBM Note Before using this information and the product it supports, read the information in Notices on page 71. This edition
More informationPause-Less GC for Improving Java Responsiveness. Charlie Gracie IBM Senior Software charliegracie
Pause-Less GC for Improving Java Responsiveness Charlie Gracie IBM Senior Software Developer charlie_gracie@ca.ibm.com @crgracie charliegracie 1 Important Disclaimers THE INFORMATION CONTAINED IN THIS
More informationDistributed Systems COMP 212. Lecture 18 Othon Michail
Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and
More informationBest Practices for Validating the Performance of Data Center Infrastructure. Henry He Ixia
Best Practices for Validating the Performance of Data Center Infrastructure Henry He Ixia Game Changers Big data - the world is getting hungrier and hungrier for data 2.5B pieces of content 500+ TB ingested
More informationJava Performance: The Definitive Guide
Java Performance: The Definitive Guide Scott Oaks Beijing Cambridge Farnham Kbln Sebastopol Tokyo O'REILLY Table of Contents Preface ix 1. Introduction 1 A Brief Outline 2 Platforms and Conventions 2 JVM
More informationOracle 1Z0-161 Exam. Volume: 67 Questions
Volume: 67 Questions Question: 1 You want to use an Integrated Development Environment (IDE.to deploy an application to an Oracle Java Cloud Service Instance. Which two tasks must you accomplish for establishing
More informationIBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion.
Please note Copyright 2018 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM IBM s statements
More informationHow to Use a Tomcat Stack on vcloud to Develop Optimized Web Applications. A VMware Cloud Evaluation Reference Document
How to Use a Tomcat Stack on vcloud to Develop Optimized Web Applications A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach to computing that pools
More informationKony MobileFabric. Deployment Guide. Release 7.3. Document Relevance and Accuracy
Kony MobileFabric Deployment Guide Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated on the Revision
More informationEtanova Enterprise Solutions
Etanova Enterprise Solutions Networking» 2018-02-24 http://www.etanova.com/technologies/networking Contents HTTP Web Servers... 6 Apache HTTPD Web Server... 6 Internet Information Services (IIS)... 6 Nginx
More informationIncreasing Cloud Power Efficiency through Consolidation Techniques
Increasing Cloud Power Efficiency through Consolidation Techniques Antonio Corradi, Mario Fanelli, Luca Foschini Dipartimento di Elettronica, Informatica e Sistemistica (DEIS) University of Bologna, Italy
More informationTUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS
TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3
More informationSentences Installation Guide. Sentences Version 4.0
Sentences Installation Guide Sentences Version 4.0 A publication of Lazysoft Ltd. Web: www.sentences.com Lazysoft Support: support@sentences.com Copyright 2000-2012 Lazysoft Ltd. All rights reserved. The
More informationCisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.
Cisco Enterprise Cloud Suite Overview 2015 Cisco and/or its affiliates. All rights reserved. 1 CECS Components End User Service Catalog SERVICE PORTAL Orchestration and Management UCS Director Application
More informationAnalyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst
Executive Summary Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst December 2014 This ESG White Paper
More informationLearning Outcomes. Extended OS. Observations Operating systems provide well defined interfaces. Virtual Machines. Interface Levels
Learning Outcomes Extended OS An appreciation that the abstract interface to the system can be at different levels. Virtual machine monitors (VMMs) provide a lowlevel interface An understanding of trap
More informationOracle WebLogic Server 12c on AWS. December 2018
Oracle WebLogic Server 12c on AWS December 2018 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationMurray Goldschmidt. Chief Operating Officer Sense of Security Pty Ltd. Micro Services, Containers and Serverless PaaS Web Apps? How safe are you?
Murray Goldschmidt Chief Operating Officer Sense of Security Pty Ltd Micro Services, Containers and Serverless PaaS Web Apps? How safe are you? A G E N D A 1 2 3 Serverless, Microservices and Container
More informationXen and CloudStack. Ewan Mellor. Director, Engineering, Open-source Cloud Platforms Citrix Systems
Xen and CloudStack Ewan Mellor Director, Engineering, Open-source Cloud Platforms Citrix Systems Agenda What is CloudStack? Move to the Apache Foundation CloudStack architecture on Xen The future for CloudStack
More informationClearPath Secure Java Overview For ClearPath Libra and Dorado Servers
5/18/2007 Page 1 ClearPath Secure Java Overview For ClearPath Libra and Dorado Servers Technical Presentation 5/18/2007 Page 2 Agenda ClearPath Java for Core Business Transformation Overview Architectural
More informationHyperion System 9 Strategic Finance release
Hyperion System 9 Strategic Finance release 9.2.0.3 The Hyperion System 9 Strategic Finance release 9.2.0.3.0 Matrix includes support information for the following areas: Operating Systems o Server o Client
More informationHyperion System 9 BI+ Analytic Services
Hyperion System 9 BI+ Analytic The Hyperion System 9 BI+ Analytic release 9.3 Support Matrix includes support information for the following areas: Operating Systems o Server o Client Web / Application
More informationA Side-channel Attack on HotSpot Heap Management. Xiaofeng Wu, Kun Suo, Yong Zhao, Jia Rao The University of Texas at Arlington
A Side-channel Attack on HotSpot Heap Management Xiaofeng Wu, Kun Suo, Yong Zhao, Jia Rao The University of Texas at Arlington HotCloud 18 July 9, 2018 1 Side-Channel Attack Attack based on information
More informationSupported Platforms and Servers for Performance Management 4.4
Supported Platforms and Servers for Performance Management 4.4 Powered by Foglight and PerformaSure Publish Date: Wednesday, September 05, 2007 About Quest Performance Management 4.4 Quest s Performance
More informationJava Embedded on ARM
Java Embedded on ARM The Embedded Market Evolving Rapidly Internet of Things 2.3B Internet Users Cloud for Embedded Devices Med-Large Embedded Multi-function Devices Enterprise Data and Applications Up
More informationBorland Optimizeit Enterprise Suite 6
Borland Optimizeit Enterprise Suite 6 Feature Matrix The table below shows which Optimizeit product components are available in Borland Optimizeit Enterprise Suite and which are available in Borland Optimizeit
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationCaching Use Cases in the Enterprise
terracotta whitepaper: Caching Use Cases in the Enterprise What You Can Learn from Hundreds of Ehcache Users Around the Globe Eric J. Bruno Allure Technology, Inc www.alluretechnology.com I was recently
More informationNew Java performance developments: compilation and garbage collection
New Java performance developments: compilation and garbage collection Jeroen Borgers @jborgers #jfall17 Part 1: New in Java compilation Part 2: New in Java garbage collection 2 Part 1 New in Java compilation
More informationEvolution of Virtual Machine Technologies for Portability and Application Capture. Bob Vandette Java Hotspot VM Engineering Sept 2004
Evolution of Virtual Machine Technologies for Portability and Application Capture Bob Vandette Java Hotspot VM Engineering Sept 2004 Topics Virtual Machine Evolution Timeline & Products Trends forcing
More informationBe a VDI hero with Nutanix
Be a VDI hero with Nutanix Francis O Haire Director, Technology & Strategy DataSolutions Evolution of Enterprise Infrastructure 1990s Today App App App App Virtualization Server Server Server Server Scale-Out
More information<Insert Picture Here> Oracle Policy Automation System Requirements
Oracle Policy Automation 10.4.0 System Requirements March 2012 Version 1.00 Oracle Policy Automation Products Version 10.4.0 Overview Product Oracle Policy Modeling Oracle Policy
More information<Insert Picture Here> Oracle Policy Automation System Requirements
Oracle Policy Automation 10.2.0 System Requirements March 2011 Version 1.01 Oracle Policy Automation Products Version 10.2 Overview Product Oracle Policy Modeling Oracle Policy Automation
More informationJava Application Performance Tuning for AMD EPYC Processors
Java Application Performance Tuning for AMD EPYC Processors Publication # 56245 Revision: 0.70 Issue Date: January 2018 Advanced Micro Devices 2018 Advanced Micro Devices, Inc. All rights reserved. The
More informationValidate Pre-Deployment and Live Networks and Applications
IxChariot 8 Validate Pre-Deployment and Live Networks and Applications Key Features New HTML5-based web interface zero client installation; browser-based IxChariot 8 is a new version of the industry's
More informationActiveSpaces Transactions. Quick Start Guide. Software Release Published May 25, 2015
ActiveSpaces Transactions Quick Start Guide Software Release 2.5.0 Published May 25, 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED
More informationJDK 9/10/11 and Garbage Collection
JDK 9/10/11 and Garbage Collection Thomas Schatzl Senior Member of Technical Staf Oracle JVM Team May, 2018 thomas.schatzl@oracle.com Copyright 2017, Oracle and/or its afliates. All rights reserved. 1
More informationTowards High Performance Processing in Modern Java-based Control Systems. Marek Misiowiec Wojciech Buczak, Mark Buttner CERN ICalepcs 2011
Towards High Performance Processing in Modern Java-based Control Systems Marek Misiowiec Wojciech Buczak, Mark Buttner CERN ICalepcs 2011 Performance with soft real time Distributed system - Monitoring
More informationIs Runtime Application Self Protection (RASP) too good to be true?
Is Runtime Application Self Protection (RASP) too good to be true? An introduction to the power of runtime protection: patch, secure, and upgrade your applications without source code changes or downtime
More informationUSE CASE - HYBRID CLOUD IZO MANAGED CLOUD FOR AWS
USE CASE - HYBRID IZO MANAGED FOR AWS 1. LET S UNDERSTAND THE MARKET DYNAMICS In this era of digitisation, the cloud debate is over enterprises have already moved a sizeable portion of their business workloads
More informationSPECjAppServer2002 Statistics. Methodology. Agenda. Tuning Philosophy. More Hardware Tuning. Hardware Tuning.
Scaling Up the JBoss Application Server. Peter Johnson JBoss World 2005 March 1, 2005 Conclusion Configuration. 8-CPU ES7000 (32-bit) SPECjAppServer 2002 JBoss Application Server 3.2.6 Unisys JVM 1.4.1_07
More informationINTRODUCTION TO Object Oriented Systems BHUSHAN JADHAV
INTRODUCTION TO Object Oriented Systems 1 CHAPTER 1 Introduction to Object Oriented Systems Preview of Object-orientation. Concept of distributed object systems, Reasons to distribute for centralized objects.
More informationHyper-V - VM Live Migration
Hyper-V - VM Live Migration Hyper-V Live Migration is first introduced in Windows Server 2008 R2 and enhanced lot in later versions. Hyper-V live migration moves running virtual machines from one physical
More informationAzul Pauseless Garbage Collection
TECHNOLOGY WHITE PAPER Azul Pauseless Garbage Collection Providing continuous, pauseless operation for Java applications Executive Summary Conventional garbage collection approaches limit the scalability
More informationPerformance and Scalability of EJB Applications
Performance and Scalability of EJB Applications Emmanuel Cecchet Julie Marguerite Willy Zwaenepoel Rice University/INRIA 655, avenue de l Europe 3833 Montbonnot, France Rice University 61 Main Street,
More information1Z Oracle Application Grid 11g Essentials Exam Summary Syllabus Questions
1Z0-523 Oracle Application Grid 11g Essentials Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-523 Exam on Oracle Application Grid 11g Essentials... 2 Oracle 1Z0-523 Certification
More informationAS Stallion. Security for Virtual Server Environments. Urmas Püss
AS Stallion 110311 Security for Virtual Server Environments Urmas Püss 1 Trend 1: Threat Evolution & Perimeter Porosity Trend 2: Challenges of Dynamic Datacenter Deep Security: Make Servers Self-Defending
More informationFiji VM Safety Critical Java
Fiji VM Safety Critical Java Filip Pizlo, President Fiji Systems Inc. Introduction Java is a modern, portable programming language with wide-spread adoption. Goal: streamlining debugging and certification.
More informationThe Z Garbage Collector Low Latency GC for OpenJDK
The Z Garbage Collector Low Latency GC for OpenJDK Per Lidén & Stefan Karlsson HotSpot Garbage Collection Team Jfokus VM Tech Summit 2018 Safe Harbor Statement The following is intended to outline our
More information