Xen Project Overview and Update. Ian Pratt, Chairman of Xen.org, and Chief Scientist, Citrix Systems Inc.
|
|
- Blaise Bell
- 5 years ago
- Views:
Transcription
1 Xen Project Overview and Update Ian Pratt, Chairman of Xen.org, and Chief Scientist, Citrix Systems Inc.
2 Xen Community Story 2002 Oct Xen hypervisor development starts 2004 Xen 1.0 and 2.0 released, First Xen developer s summit 2005 XenSource founded, Xen 3.0 released 2006 CPU enhancements for virtualization ship; Linux distros ship Xen All x86 OSes enlightened : Vmware, Microsoft adopt paravirtualization First XenEnterprise release Amazon EC2 Launches 2007 XenSource acquired by Citrix 2008 Xen embedded in Flash on HP/Dell servers First embedded Xen on laptops 2
3 Xen Today ~17% enterprise server market share (Yankee, Aug 08) World's largest virtualization deployments are Xen based Community: over 50 Companies, 20 Universities, from 20 Countries, ~250 developers More than 10,000 code submissions since Xen 3.0 x86, IA64, ARM support In Severs, Laptops, Storage & Network Appliances, PDAs 3
4 Xen Powers the World s IT Infrastructure Clouds Xen is great. It s powerful and easy to use. But most important is the very active community around it. That was a very big reason for us in selecting Xen. Werner Vogels CTO, Amazon.com 4
5 Congratulations, and Thank You! 2008 Winner, Server Virtualization Best of Open Source Software Awards 5
6 Xen Project Mission Build the industry standard open source hypervisor Lead the industry in virtualization performance Ensure continued stability and high quality in the code base Support multiple CPU types; big and small systems Foster and sponsor innovation Drive toward vendor interoperability and compatibility 6
7 Xen: An Open Reference Standard Xen Citrix, Intel, AMD, VA Linux, Fujitsu, IBM, HP, Unisys, SGI, Samsung, Sun, Red Hat, Novell, DoD, NSA (over 50 orgs) 7
8 The Xen Project Advisory Board Represents major contributors and vendors that offers Xen based products. Current members: Defines and approves the Xen Trademark Policy ( What is Xen? ) Oversees community code practices and roadmap 8
9 Virtualization Benefits X Avoid planned downtime with VM Relocation Dynamically re-balance workload to meet app SLAs or to saver power 9
10 Virtualization Benefits X Restart-HA monitors hosts and VMs to keep apps running X Hardware Fault Tolerance with deterministic replay or checkpointing 10
11 Xen Hypervisor Leaders in OS Enlightenment First and Best to support new Intel VT & AMD-V, mart IO & chipset Technologies (Also Hyper-V compatib 11
12 Unlocking Hardware Innovation Enhanced Security TPM and secure boot (TXT) IOMMU to protect device DMA accesses Full Execute-Disable (NX/XD) Multi-core Processors More efficient utilization Hides complexity from guests Hardware Virtualization Support Nested Page Tables (VT2/VMI) FlexPriority, FlexMigrate Smart NICs (e.g. VT-C/VMDq) and HBAs Only a hypervisor can deliver the benefits of the new hardware 12
13 OS Paravirtualization (Enlightenment) Extending the OS to be aware it is running in a virtualized environment For performance and enhanced correctness IO, memory size, CPU, MMU, time In Xen <2.0, some paravirtulizations were compulsory to close x86 virtualization holes Intel VT / AMD-V allow incremental paravirtualization Paravirtualization is still very important for performance, and works along side enhancements to the hardware Higher-level paravirtualizations yield greatest benefit 13
14 SPECjbb2005 Comparison 1.2 RHEL5 guest / SPECjbb2005 Sun JVM Relative score to native vcpu 2-vcpu 4-vcpu Native ESX XenEnterprise
15 w2k3 Terminal Server Concurrent Session test 15
16 Hypervisor Security hidden hypervisor attack is a myth, but exploitation of an installed hypervisor is a real and dangerous threat Hypervisors add more software and thus increase the attack surface Network-facing control stack VM containment Xen much smaller and defensible than an OS Xen s strength in depth approach Disaggregate, De-privilege, narrow interfaces Xen Security Modules from the NSA Measured launch: TPM/TXT/SKINIT 16
17 Improving Security with Hypervisors Hypervisors allow administrative policy enforcement outside the OS Firewalls, IDS, malware scanning etc More robust as not so easily disabled Provides protection within a network rather than just at borders Hardening OSes with immutable memory, taint tracking, logging and replay Backup policy, multi-path IO, HA, FT etc Availability and Reliability Xen Introspection API project (extending XenAccess library) 17
18 Xen Client : A Hypervisor for Client Devices Security, Manageability and Supportability Building Multi-level secure systems Run multiple guest VMs with very controlled information flow Enables Bring-Your-Own-PC model Corporate VM; VM for web browsing; VM for banking Migration of VMs between datacentre and laptops for offline use Seamless merging of VM displays Embedded IT virtual appliances IDS, Malware detection, remote access, backup etc. Security requires a true hypervisor architecture 18
19 Xen Client Initiative 12 Vendors Collaborating on architecture and implementation of Xen client hypervisor Security is a key requirement 19
20 From Laptops to Phones Smart phones and portable devices Xen ARM Smart phones now suffer from many of the same problems as PCs Simple restricted use cases: Three VMs running on one CPU: Real time VM for controlling the radio VM for vendor/operator -supplied s/w VM for user-downloaded software 20
21 Roadmap Current Projects XenClient Xen Introspection API Fault Tolerance Difference Engine memory optimizations Cloud infrastructure services 21
22 Closing Remarks Virtualization is destined to become ubiquitous Every machine, Every workload Built in to the platform Client devices as well as servers Xen offers the best performance and the most secure architecture Xen is powered by a growing community with a diverse range of products and services 22
Xen Project Status Ian Pratt 12/3/07 1
Xen Project Status Ian Pratt 12/3/07 1 Project Status xen.org and the Xen Advisory Board Xen project mission Ubiquitous virtualization Realizing Xen s architectural advantages From servers to clients Interoperability
More informationXen Community Update. Ian Pratt, Citrix Systems and Chairman of Xen.org
Xen Community Update Ian Pratt, Citrix Systems and Chairman of Xen.org 1 Outline Project Status Xen Client Initiative Xen Cloud Platform New Xen 4.0 Features 2 Announcement The Xen Advisory Board is excited
More informationA State of Xen: Virtualization from PDAs to Super Computers
FOR IMMEDIATE RELEASE For media inquiries: Julie Geer, Citrix Systems, Inc. (408) 790-8543 or julie.geer@citrix.com A State of Xen: Virtualization from PDAs to Super Computers New Xen 3.3 Hypervisor Features
More informationCloud computing and Citrix C3 Last update 28 July 2009 Feedback welcome -- Michael. IT in the Clouds. Dr Michael Harries Citrix Labs
Cloud computing and Citrix C3 Last update 28 July 2009 Feedback welcome -- Michael IT in the Clouds Dr Michael Harries Citrix Labs Just hot air? The term cloud computing has been much hyped in recent past.
More informationVirtualization Introduction
Virtualization Introduction Simon COTER Principal Product Manager Oracle VM & VirtualBox simon.coter@oracle.com https://blogs.oracle.com/scoter November 21 st, 2016 Safe Harbor Statement The following
More informationThe only open-source type-1 hypervisor
Monika Danikáková What is Xen? The only open-source type-1 hypervisor For Unix and Unix-like OS Linux, NetBSD and OpenSolaris From ancient greek term Xenos (ξένος), guest-friends Developed by the University
More informationXen Summit Spring 2007
Xen Summit Spring 2007 Platform Virtualization with XenEnterprise Rich Persaud 4/20/07 Copyright 2005-2006, XenSource, Inc. All rights reserved. 1 Xen, XenSource and XenEnterprise
More informationModule 1: Virtualization. Types of Interfaces
Module 1: Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform
More informationChapter 5 C. Virtual machines
Chapter 5 C Virtual machines Virtual Machines Host computer emulates guest operating system and machine resources Improved isolation of multiple guests Avoids security and reliability problems Aids sharing
More informationVirtualization. Michael Tsai 2018/4/16
Virtualization Michael Tsai 2018/4/16 What is virtualization? Let s first look at a video from VMware http://www.vmware.com/tw/products/vsphere.html Problems? Low utilization Different needs DNS DHCP Web
More informationDr. Song Fu 3/22/2010
CSE 589/489 Virtualization Security Dr. Song Fu song@cs.nmt.edunmt http://www.cs.nmt.edu/~song/ song/ 3/22/2010 Outline Overview of computer systems Why virtualization Virtualization techniques Virtual
More informationSUSE Linux Enterprise Server: Supported Virtualization Technologies
Technical White Paper Enterprise Linux SUSE Linux Enterprise Server: Supported Virtualization Technologies Table of Contents page Comprehensive Virtualization Support Overview... 2 Upgrade Guidelines...4
More informationUsing MySQL in a Virtualized Environment. Scott Seighman Systems Engineer Sun Microsystems
Using MySQL in a Virtualized Environment Scott Seighman Systems Engineer Sun Microsystems 1 Agenda Virtualization Overview > Why Use Virtualization > Options > Considerations MySQL & Virtualization Best
More informationVirtual Machines. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University
Virtual Machines Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today's Topics History and benefits of virtual machines Virtual machine technologies
More informationSecuring your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008
Securing your Virtualized Datacenter Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Agenda VMware Virtualization Technology How Virtualization Affects Datacenter Security Keys to
More informationDistributed Systems COMP 212. Lecture 18 Othon Michail
Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and
More informationCHAPTER 16 - VIRTUAL MACHINES
CHAPTER 16 - VIRTUAL MACHINES 1 OBJECTIVES Explore history and benefits of virtual machines. Discuss the various virtual machine technologies. Describe the methods used to implement virtualization. Show
More informationCLOUD COMPUTING IT0530. G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University
CLOUD COMPUTING IT0530 G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University What is virtualization? Virtualization is way to run multiple operating systems and user applications on the same
More informationLINUX Virtualization. Running other code under LINUX
LINUX Virtualization Running other code under LINUX Environment Virtualization Citrix/MetaFrame Virtual desktop under Windows NT. aka Windows Remote Desktop Protocol VNC, Dameware virtual console. XWindows
More informationSUSE Linux Enterprise 11
SUSE Linux Enterprise 11 Singapore OSS Community Launch 22 nd April 2009 Kam, Han Wen ( 甘汉文 ) Senior Technology Specialist Global Strategic Partners (Asia Pacific) Why Choose SUSE Linux Enterprise Server
More informationBUILDING A PRIVATE CLOUD. By Mark Black Jay Muelhoefer Parviz Peiravi Marco Righini
BUILDING A PRIVATE CLOUD By Mark Black Jay Muelhoefer Parviz Peiravi Marco Righini HOW PLATFORM COMPUTING'S PLATFORM ISF AND INTEL'S TRUSTED EXECUTION TECHNOLOGY CAN HELP 24 loud computing is a paradigm
More informationThe Road to a Secure, Compliant Cloud
The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation
More informationHow it can help your organisation
How it can help your organisation History Types of Virtualisation & Hypervisors Virtualisation Features Why Virtualisation? Virtualising Oracle Performance Licensing Support Cloud 1998 VMware founded by
More informationCS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives
CS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives Virtual Machines Resource Virtualization Separating the abstract view of computing resources from the implementation of these resources
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationVirtual Machine Security
Virtual Machine Security CSE443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ 1 Operating System Quandary Q: What is the primary goal
More informationWhat is KVM? KVM patch. Modern hypervisors must do many things that are already done by OSs Scheduler, Memory management, I/O stacks
LINUX-KVM The need for KVM x86 originally virtualization unfriendly No hardware provisions Instructions behave differently depending on privilege context(popf) Performance suffered on trap-and-emulate
More informationCSE543 - Computer and Network Security Module: Virtualization
CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationADVANCING THE DEVELOPMENT OF open virtualization solutions
Open Source on Intel solution brief Igniting Sparks of Innovation As a member of the open-source community, Intel s contributions to open virtualization and cloud projects such as KVM, Xen, and OpenStack
More informationCSE543 - Computer and Network Security Module: Virtualization
CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 1 Operating System Quandary Q: What is the primary goal of
More informationVirtualization. ...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania.
Virtualization...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania April 6, 2009 (CIS 399 Unix) Virtualization April 6, 2009 1 / 22 What
More informationCOMPUTER ARCHITECTURE. Virtualization and Memory Hierarchy
COMPUTER ARCHITECTURE Virtualization and Memory Hierarchy 2 Contents Virtual memory. Policies and strategies. Page tables. Virtual machines. Requirements of virtual machines and ISA support. Virtual machines:
More informationVirtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018
Virtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018 Today s Papers Disco: Running Commodity Operating Systems on Scalable Multiprocessors, Edouard
More informationMultiprocessor Scheduling. Multiprocessor Scheduling
Multiprocessor Scheduling Will consider only shared memory multiprocessor or multi-core CPU Salient features: One or more caches: cache affinity is important Semaphores/locks typically implemented as spin-locks:
More informationRed Hat enterprise virtualization 3.1 feature comparison
Red Hat enterprise virtualization 3.1 feature comparison at a glance Red Hat Enterprise Virtualization 3.1 is first fully open source, enterprise ready virtualization platform Compare functionality of
More informationTransforming XenServer into a proper open-source project
Transforming XenServer into a proper open-source project James Bulpin CTO, XenServer, Citrix About the speaker James Bulpin Head of technology for XenServer group in Citrix; member of the Citrix CTO office
More informationVirtualization. Starting Point: A Physical Machine. What is a Virtual Machine? Virtualization Properties. Types of Virtualization
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
More informationSecuring the Data Center against
Securing the Data Center against vulnerabilities & Data Protection Agenda Virtual Virtualization Technology How Virtualization affects the Datacenter Security Keys to a Secure Virtualized Deployment and
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 27 Virtualization Slides based on Various sources 1 1 Virtualization Why we need virtualization? The concepts and
More informationVirtualization. ! Physical Hardware Processors, memory, chipset, I/O devices, etc. Resources often grossly underutilized
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
More informationVirtual Leverage: Server Consolidation in Open Source Environments. Margaret Lewis Commercial Software Strategist AMD
Virtual Leverage: Server Consolidation in Open Source Environments Margaret Lewis Commercial Software Strategist AMD What Is Virtualization? Abstraction of Hardware Components Virtual Memory Virtual Volume
More informationProtecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R
Protecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R Table of Contents Fault Tolerance and Virtualization... 3 Fault Tolerance in the Physical World... 3 VMware Fault Tolerance...
More informationA Road Map to the Future of Linux in the Enterprise. Timothy D. Witham Lab Director Open Source Development Lab
A Road Map to the Future of Linux in the Enterprise Timothy D. Witham Lab Director Open Source Development Lab 1 Agenda Introduction Why Linux Current Linux Uses Roadmap for the Future Process 2 Open Source
More informationBuild your own Cloud on Christof Westhues
Build your own Cloud on Christof Westhues chwe@de.ibm.com IBM Big Data & Elastic Storage Tour Software Defined Infrastructure Roadshow December 2 4, 2014 New applications and IT are being built for Cloud
More informationCSE 120 Principles of Operating Systems
CSE 120 Principles of Operating Systems Spring 2018 Lecture 16: Virtual Machine Monitors Geoffrey M. Voelker Virtual Machine Monitors 2 Virtual Machine Monitors Virtual Machine Monitors (VMMs) are a hot
More informationLinux and Xen. Andrea Sarro. andrea.sarro(at)quadrics.it. Linux Kernel Hacking Free Course IV Edition
Linux and Xen Andrea Sarro andrea.sarro(at)quadrics.it Linux Kernel Hacking Free Course IV Edition Andrea Sarro (andrea.sarro(at)quadrics.it) Linux and Xen 07/05/2008 1 / 37 Introduction Xen and Virtualization
More informationCSE543 - Computer and Network Security Module: Virtualization
CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system
More informationRed Hat Enterprise Virtualization Hypervisor Roadmap. Bhavna Sarathy Senior Technology Product Manager, Red Hat
Red Hat Enterprise Virtualization Hypervisor Roadmap Bhavna Sarathy Senior Technology Product Manager, Red Hat RHEV Hypervisor 1 RHEV Hypervisor Themes & 2 Architecture & Use cases 3 Q&A 4 Future 5 } HYPERVISOR
More informationCS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following:
CS 470 Spring 2018 Mike Lam, Professor Virtualization and Cloud Computing Content taken from the following: A. Silberschatz, P. B. Galvin, and G. Gagne. Operating System Concepts, 9 th Edition (Chapter
More informationCSC 5930/9010 Cloud S & P: Virtualization
CSC 5930/9010 Cloud S & P: Virtualization Professor Henry Carter Fall 2016 Recap Network traffic can be encrypted at different layers depending on application needs TLS: transport layer IPsec: network
More informationIntel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms
EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Novell* Cloud Manager Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Novell* Cloud Manager Intel
More informationVirtualisation: The KVM Way. Amit Shah
Virtualisation: The KVM Way Amit Shah amit.shah@qumranet.com foss.in/2007 Virtualisation Simulation of computer system in software Components Processor Management: register state, instructions, exceptions
More informationMission-Critical Enterprise Linux. April 17, 2006
Mission-Critical Enterprise Linux April 17, 2006 Agenda Welcome Who we are & what we do Steve Meyers, Director Unisys Linux Systems Group (steven.meyers@unisys.com) Technical Presentations Xen Virtualization
More informationIntroduction to Virtual Machines. Carl Waldspurger (SB SM 89 PhD 95) VMware R&D
Introduction to Virtual Machines Carl Waldspurger (SB SM 89 PhD 95) VMware R&D Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O Virtualization Typesof Virtualization Process
More informationHyper-V Innovations for the SMB. IT Pro Camp, Northwest Florida State College, Niceville, FL, October 5, 2013
Hyper-V Innovations for the SMB IT Pro Camp, Northwest Florida State College, Niceville, FL, October 5, 2013 Ben Jones Systems Engineer 7 years of experience Microsoft Certified Solutions Expert: Server
More informationFAIM 14. Cloud Computing. Paul Rad Rackspace, Inc. VP Technology
FAIM 14 Flexible Automation & Intelligent Manufacturing 24th International Conference San Antonio Texas U.S.A. Cloud Computing Paul Rad Rackspace, Inc. VP Technology 1 Organizations are building clouds
More informationCloud Builders. Billy Cox. Director Cloud Strategy Software and Services Group
Cloud Builders Billy Cox Director Cloud Strategy Software and Services Group From Vision to Action IT & Service Providers Products & Technologies Intel Cloud Builders Define and Prioritize IT Requirements
More informationIT as a Service (Internally or Externally Provisioned) Efficiency. Control. Choice. VMware vsphere 4.0
1 VMware vsphere 4.0 The best platform for building cloud infrastructures The Problem Where the IT Budget Goes 5% Infrastructure Investment 23% Application Investment 42% Infrastructure Maintenance Overwhelming
More informationVirtualization Overview
VMware W Hwhite I T E Ppaper A P E R Virtualization Overview Table of Contents Introduction... 3 Virtualization in a Nutshell... 3 Virtualization Approaches... 4 Virtualization for Server Consolidation
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu Virtualization Definition Framework or methodology of dividing the resources of a computer into multiple execution environments. Types Platform Virtualization: Simulate a
More informationIntel, OpenStack, & Trust in the Open Cloud. Intel Introduction
Intel, OpenStack, & Trust in the Open Cloud Intel Introduction 1 Intel enables OpenStack Cloud Deployments 2 Intel Contributions to OpenStack Telemetry (Ceilometer) Object Store (Swift) Erasure Code Metrics
More informationIntel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey May 13, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey torreyj@ainfosec.com
More informationThe Future of Virtualization Desktop to the Datacentre. Raghu Raghuram Vice President Product and Solutions VMware
The Future of Virtualization Desktop to the Datacentre Raghu Raghuram Vice President Product and Solutions VMware Virtualization- Desktop to the Datacentre VDC- vcloud vclient With our partners, we are
More informationThe Future of Virtualization. Jeff Jennings Global Vice President Products & Solutions VMware
The Future of Virtualization Jeff Jennings Global Vice President Products & Solutions VMware From Virtual Infrastructure to VDC- Windows Linux Future Future Future lication Availability Security Scalability
More informationOriginally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison
Virtualization Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison I. Introduction to Virtualization II. Virtual liances III. Benefits to Virtualization IV. Example
More informationVirtualization Food Fight. Rik van Riel
Virtualization Food Fight Rik van Riel May 11, 2007 Virtualization Food Fight Upstream technologies are in flux Xen, KVM, paravirt_ops, VMI,... Technological differences, advantages and disadvantages What
More informationGUIDE. MetaDefender Kiosk Deployment Guide
GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect
More informationThe vsphere 6.0 Advantages Over Hyper- V
The Advantages Over Hyper- V The most trusted and complete virtualization platform SDDC Competitive Marketing 2015 Q2 VMware.com/go/PartnerCompete 2015 VMware Inc. All rights reserved. v3b The Most Trusted
More informationVMware ESX Server 3i. December 2007
VMware ESX Server 3i December 2007 ESX Server 3i Exec Summary What is it? What does it do? What is unique? Who can use it? How do you use it? Next generation, thin hypervisor integrated in server hardware
More informationEnterprise Cloud Computing. Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur
1 Enterprise Cloud Computing Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur Agenda 2 Fundamentals of Enterprise Cloud Computing IT & Cloud Computing Requirements
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationEMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers Support Matrix
EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.2 Version 9.4.2.0 302-003-122 REV 01 Abstract Smarts 9.4.2 Suite can be installed in a typical or a fully distributed, multi-machine production
More informationImplementing Virtual NVMe for Flash- Storage Class Memory
Implementing Virtual NVMe for Flash- Storage Class Memory Jinpyo Kim, Sr. Staff Engineer, VMware Murali Rajagopal, Storage Architect, VMware Santa Clara, CA 1 Virtual NVMe: Motivations (1) Increasing demands
More informationPotpuna virtualizacija od servera do desktopa. Saša Hederić Senior Systems Engineer VMware Inc.
Potpuna virtualizacija od servera do desktopa Saša Hederić Senior Systems Engineer VMware Inc. VMware ESX: Even More Reliable than a Mainframe! 2 The Problem Where the IT Budget Goes 5% Infrastructure
More informationSecure Partitioning (s-par) for Enterprise-Class Consolidation
Secure Partitioning (s-par) for Enterprise-Class Consolidation How Partitioning Technology Delivers Consolidation Without Compromising Performance, Security, or Isolation White Paper The enterprise clients
More informationENTERPRISE HYPERVISOR COMPARISON
ENTERPRISE HYPERVISOR COMPARISON Version 5.0 A feature comparison of the hypervisors from Citrix, Microsoft, RedHat and VMware. Updated to the latest version, 6.1, Microsoft Hyper-V 2012, 3.1 and VMware
More informationWhat is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet.
1 INTRODUCTION What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. Cloud computing encompasses any Subscriptionbased or pay-per-use
More informationVirtual Machines. To do. q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm?
Virtual Machines To do q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm? *Partially based on notes from C. Waldspurger, VMware, 2010 and Arpaci-Dusseau s Three
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationExtended Page Tables (EPT) A VMM must protect host physical memory Multiple guest operating systems share the same host physical memory VMM typically implements protections through page-table shadowing
More informationNovell SLES 10/Xen. Roadmap Presentation. Clyde R. Griffin Manager, Xen Virtualization Novell, Inc. cgriffin at novell.com.
Novell SLES 10/Xen Roadmap Presentation Clyde R. Griffin Manager, Xen Virtualization Novell, Inc. cgriffin at novell.com September 8, 2006 SUSE Linux Enterprise Server 10 SLES 10 w/xen 3.0.2 is now available
More informationDELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing
DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing Steve Orrin - Federal Chief Technologist, Intel Steve Forage - Senior Director, Cloud Solutions, Red Hat
More informationVirtualization. Application Application Application. MCSN - N. Tonellotto - Distributed Enabling Platforms OPERATING SYSTEM OPERATING SYSTEM
Virtualization lication lication lication lication lication lication OPERATING SYSTEM OPERATING SYSTEM VIRTUALIZATION 1 Basic Idea Observation Hardware resources are typically under-utilized Hardware resources
More informationVirtual Machine Virtual Machine Types System Virtual Machine: virtualize a machine Container: virtualize an OS Program Virtual Machine: virtualize a process Language Virtual Machine: virtualize a language
More informationCHAPTER 16 - VIRTUAL MACHINES
CHAPTER 16 - VIRTUAL MACHINES 1 OBJECTIVES Explore history and bene ts of virtual machines. Discuss the various virtual machine technologies. Describe the methods used to implement virtualization. Show
More informationNested Virtualization and Server Consolidation
Nested Virtualization and Server Consolidation Vara Varavithya Department of Electrical Engineering, KMUTNB varavithya@gmail.com 1 Outline Virtualization & Background Nested Virtualization Hybrid-Nested
More informationUnderstanding the Endianess and the benefits Red Hat Enterprise Linux for Power, little endian
Filipe Miranda Global Lead for Red Hat Products on IBM z Systems and Power Systems Red Hat Inc. Understanding the Endianess and the benefits Red Hat Enterprise Linux for Power, little
More informationMcAfee Endpoint Security for Servers Product Guide
McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More information[Docker] Containerization
[Docker] Containerization ABCD-LMA Working Group Will Kinard October 12, 2017 WILL Kinard Infrastructure Architect Software Developer Startup Venture IC Husband Father Clemson University That s me. 2 The
More informationReal-Time Systems and Intel take industrial embedded systems to the next level
Solution brief Industrial IoT (IIoT) Embedded Software and Systems Real-Time Systems and Intel take industrial embedded systems to the next level Innovative hypervisor and partitioning software increases
More informationVirtual Machine Monitors (VMMs) are a hot topic in
CSE 120 Principles of Operating Systems Winter 2007 Lecture 16: Virtual Machine Monitors Keith Marzullo and Geoffrey M. Voelker Virtual Machine Monitors Virtual Machine Monitors (VMMs) are a hot topic
More information4th Generation Intel Core vpro Processors with Intel VMCS Shadowing
white paper 4th Generation Intel Core vpro Processors with Intel VMCS Shadowing Enhancing the Performance of Citrix XenClient and McAfee Deep Defender* Contents Executive Summary... 1 Hardware-Assisted
More informationRed Hat enterprise virtualization 3.0
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
More informationSymantec and VMWare why 1+1 makes 3
Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores
More informationA Cloud WHERE PHYSICAL ARE TOGETHER AT LAST
A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT
More informationDirections in Data Centre Virtualization and Management
Directions in Data Centre Virtualization and Management Peter West Product Marketing Manager, Product Marketing EMEA, VMware, Inc. New Approach To Data Centre Scalability Simplify the containers Add Hardware
More informationStreamlining User, Data and Network Defense in a Multi-Level Environment Steve Stratton Sr. Director Product Management
Streamlining User, Data and Network Defense in a Multi-Level Environment Steve Stratton Sr. Director Product Management Copyright 2016 Forcepoint. All rights reserved. CYBER TRENDS Increasing Connectivity
More informationOpen-source library and tools to support the OVF.
Open OVF Proposal Open-source library and tools to support the OVF http://xml.coverpages.org/ni2007-09-11-a.html IBM will be donating code and invites all to form an open community around OVF Eclipse Public
More informationAcronis Backup. Acronis, All rights reserved. Dual headquarters in Switzerland and Singapore. Dual headquarters in Switzerland and Singapore
Acronis Backup 1 Acronis Backup Guards Against Modern Threats Cybercrimes will cost $6 trillion per year worldwide by 2021 50% of hard drives die within 5 years Keeps Business Running Data is growing 33
More information