Introduction to virtualisation, hardware, cloud, containers, unikernels, microkernels. and everything else
|
|
- Tyrone Maxwell
- 6 years ago
- Views:
Transcription
1
2 Introduction to virtualisation, hardware, cloud, containers, unikernels, microkernels. and everything else
3 What s driving us? Smaller Faster Efficient Secure
4 Cloud, infrastructure and virtualisation Smaller, faster, efficient and secure needed Cloud era needed The hardware era The virtualisation era Operating Systems have remained constant
5 Containment and segregation (the start)
6 Micro-segmentation and immutable infrastructure (where we re heading)
7 Micro-segmentation and immutable infrastructure Containers Shared host kernel or operating system, includes many services and facilities by default Convenience of shared development and deployment environment on the same kernel Containers typically always share the same operating system (Linux or Windows containers) Compatible across most applications or pre-existing environments Uni-kernels Everything is off-by-default. Components only included as dependencies Can isolate down to the hypervisor level rather than kernel level Enables deep application specialisation and segmentation Duplication of functionality (such as networking) and no compatibility with operating systems
8 Introduction to Vorteil Eco System
9 The ultimate pretty good OS If there is no operating system what is left to secure? If the application can be available in less than 100 ms do we need to over-provision our resources? If the user interaction exists only once EVER what is left to hack? If we can run hundreds of tiny applications for a specific task at peak times why can t re-use our resources for something else? It supports every application our there in the world!!!! Fire this sales person
10 Introducing Vorteil eco system Public Cloud
11 Introducing Vorteil OS Sisa-tech developed operating system built from scratch Architected and developed for rapid deployment, scalability, efficiency and absolute security It s SMALL: minimum footprint of 8MB memory and 300KB of disk space It s SECURE: there is not user or kernel space and no shell! It s FAST: boots in <100ms It s EFFICIENT: Management platform to compile, build, deploy and scale manually / automatic
12 Introducing Vorteil OS It s the Fort Knox of secure operating systems: There is NO user access to Vorteil (no shell, no user space, no command space and no console) There is NO users, no user rights and no access management to breach There is NO user or kernel space In place updates using virtual memory re-mapping Vorteil OS has non-blocking memory access? So what?
13 Introducing Vorteil OS Shared storage capability / mountable storage capability Management, security auditing and SIEM via libvirt (collection of software that provides a convenient way to manage virtual machines and other virtualization functionality, such as storage and network interface management) or optional via SYSLOG, SNMP Traps
14 Introducing Vorteil Management Platform Compile, deploy, manage and revise Compile - fully integrated run-time compile and development environment Deployment to private via well-known element managers (vcenter) or directly into public cloud (AWS, Azure, Rackspace, Google) Manage scalability, performance and ongoing deployment from a single interface Revise, using built-in version control and in-place OS/firmware updates within the managed environment API driven management engine, fully supportive of a DevOps environment
15 Introducing Vorteil Management Platform 1. Install Vorteil CLI 2. Build a Go app 3. Create a virtual machine (VMDK) using Vorteil CLI 4. Deploy to Virtual Box (30 MB memory, 5. Start the virtual machine!!!
16 Introducing Vorteil Management Platform 1. Start Vorteil management platform 2. Import images built previously 3. Manage images in Vorteil management platform
17 Real-world application of Vorteil
18 Example 1: Hyper secure online banking Using Vorteil OS: User logon to online banking instantiates a Vorteil OS + online banking application instance (<100ms for OS startup) User interaction occurs, all audit and log files written to shared storage environment User disconnection / logoff - Vorteil OS and application destroyed after appropriate logging and SIEM
19 Example 1: Hyper secure online banking Common attack types: External: Session replay / hi-jack Negated using Vorteil OS: Online session no longer exists (technically the virtual machine does not exist)! Internal: OS services / open ports The Vorteil OS has no user access, rights or any /user/kernel space to access Internal: External OS libraries compromised Vorteil does not use any external libraries, all dependencies pre-compiled as part of the application (and even then there is not shell, user or kernel space to access)!! Only 3 examples there are MANY more
20 Example 2: High-volume transaction / trading Using Vorteil OS: At time of low volume, deployment of application on any infrastructure at low cost (no cost or resource overhead) At time of high volume, deployment of guaranteed Class of Service (CoS) on private infrastructure and best-effort on public infrastructure Ability to scale at cost (low memory overhead, low storage requirement and extremely fast scaling) When volumes and frequency dissipates - destroy the environment Guaranteed Remember, we talk about destroying the environment and reclaiming resources for other use not merely spinning down while resources still have to be reserved Best-effort
21 What the future holds
22 Next 6-12 months Open-source Vorteil OS end of June 2016 (build a community of developers and contributors) Up till this point a self-funded venture - seeking sponsorship and support to grow at pace Grow the team from 4 developers to 8 rapidly! Currently Sisa-tech has an head-start advantage, critical that this is not lost in the next 8 months (development time of a similar OS)
23 Sisa-tech In-depth Vorteil
24 Vorteil inside The important things to remember: Small footprint (consumes B MHz of processing power, C MBs of memory and D MBs of disk space) Deployment time (boots in A ms) Scalability (management ecosystem for rapid development and deployment across private and public cloud) Resource cost (reclaim resources when not in use) SECURITY (there is not OS to hack it s just an application stack)
25 Vorteil inside We built an OS from scratch on the unikernel concept multi CPU support in 64bit mode Non-blocking memory mechanism (12-20% gain on same hardware) Stateless and State full (supporting VMDK - mountable on other OS) Super secure (close to un-hackable - just because there is nothing to hack) Since we do not have kernel/user space and have multi-core, we implement mtcp natively (millions of connections per sec) Using current language(s) without deviating from the standard libraries
26 Vorteil: operating system / uni-kernel /? Private Cloud / Infrastructure Compiled as a VMDK (example) User applications Boot loader Operating System Memory Management Module ELF Loader Public Cloud / Infrastructure Kernel Network Driver Network Virtual File System Interrupt Handler External File System
27 Vorteil: 1. Image repository (applications and Vorteil) 2. Revision management 3. Application bundling 1. Availability monitoring 2. Performance monitoring 3. Master / slave / IP / DNS / proxy management + Vorteil build file Provisioning De-provisioning Gateway management Configuration store 1. Scaling Use vcli to build go app Boot loader Memory Management Module ELF Loader Kernel Operating Network Driver Virtual File System API gateways. Interrupt Handler
FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS
WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.
More informationThe Balabit s Privileged Session Management 5 F5 Azure Reference Guide
The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity
More information64-bit ARM Unikernels on ukvm
64-bit ARM Unikernels on ukvm Wei Chen Senior Software Engineer Tokyo / Open Source Summit Japan 2017 2017-05-31 Thanks to Dan Williams, Martin Lucina, Anil Madhavapeddy and other Solo5
More informationCLOUD WORKLOAD SECURITY
SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly
More information[Docker] Containerization
[Docker] Containerization ABCD-LMA Working Group Will Kinard October 12, 2017 WILL Kinard Infrastructure Architect Software Developer Startup Venture IC Husband Father Clemson University That s me. 2 The
More informationMerging Enterprise Applications with Docker* Container Technology
Solution Brief NetApp Docker Volume Plugin* Intel Xeon Processors Intel Ethernet Converged Network Adapters Merging Enterprise Applications with Docker* Container Technology Enabling Scale-out Solutions
More informationLogging, Monitoring, and Alerting
Logging, Monitoring, and Alerting Logs are a part of daily life in the DevOps world In security, we focus on particular logs to detect security anomalies and for forensic capabilities A basic logging pipeline
More informationOS and Computer Architecture. Chapter 3: Operating-System Structures. Common System Components. Process Management
Last class: OS and Architecture OS and Computer Architecture OS Service Protection Interrupts System Calls IO Scheduling Synchronization Virtual Memory Hardware Support Kernel/User Mode Protected Instructions
More informationGetting Started with AWS Security
Getting Started with AWS Security Tomas Clemente Sanchez Senior Consultant Security, Risk and Compliance September 21st 2017 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Move
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationIntroduction to Virtualization
Introduction to Virtualization Module 2 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks Configuring
More informationWhat s New in VMware vsphere 5.1 Platform
vsphere 5.1 Platform VMware vsphere 5.1 TECHNICAL MARKETING DOCUMENTATION V 2.0 / UPDATED JUNE 2012 Table of Contents Introduction... 3 vsphere Platform Enhancements... 3 User Access... 3 Auditing....
More informationSeven Decision Points When Considering Containers
Market Guide Seven Decision Points When Considering Containers A Continuum of Deployment Choices More than ever, developers and systems architects have a range of choices when it comes to deploying applications,
More informationFast and Easy Persistent Storage for Docker* Containers with Storidge and Intel
Solution brief Intel Storage Builders Storidge ContainerIO TM Intel Xeon Processor Scalable Family Intel SSD DC Family for PCIe*/NVMe Fast and Easy Persistent Storage for Docker* Containers with Storidge
More informationLast class: OS and Architecture. OS and Computer Architecture
Last class: OS and Architecture OS and Computer Architecture OS Service Protection Interrupts System Calls IO Scheduling Synchronization Virtual Memory Hardware Support Kernel/User Mode Protected Instructions
More informationLast class: OS and Architecture. Chapter 3: Operating-System Structures. OS and Computer Architecture. Common System Components
Last class: OS and Architecture Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation
More informationWHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction
WHITE PAPER RedHat OpenShift Container Platform Abstract Benefits: Applications are designed around smaller independent components called microservices. Elastic resources: Scale up or down quickly and
More informationTransition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution
Solution Overview Transition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution Microsoft support for all versions of Windows Server 2003 and Windows Server 2003 R2 ends on
More informationWhat s New in VMware vsphere 5.1 Platform
vsphere 5.1 Platform VMware vsphere 5.1 TECHNICAL MARKETING DOCUMENTATION V 2.0 / UPDATED JUNE 2012 Table of Contents Introduction.................................................................. 3 vsphere
More informationCopyright 2011, Oracle and/or its affiliates. All rights reserved.
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationCLUSTERING HIVEMQ. Building highly available, horizontally scalable MQTT Broker Clusters
CLUSTERING HIVEMQ Building highly available, horizontally scalable MQTT Broker Clusters 12/2016 About this document MQTT is based on a publish/subscribe architecture that decouples MQTT clients and uses
More informationChapter 2: Operating-System Structures
Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls (important!) Types of System Calls (important!) System
More informationThink Small to Scale Big
Think Small to Scale Big Intro to Containers for the Datacenter Admin Pete Zerger Principal Program Manager, MVP pete.zerger@cireson.com Cireson Lee Berg Blog, e-mail address, title Company Pete Zerger
More informationAspirin as a Service: Using the Cloud to Cure Security Headaches
SESSION ID: CSV-T10 Aspirin as a Service: Using the Cloud to Cure Security Headaches Bill Shinn Principle Security Solutions Architect Amazon Web Services Rich Mogull CEO Securosis @rmogull Little. Cloudy.
More informationOperating-System Structures
Operating-System Structures Chapter 2 Operating System Services One set provides functions that are helpful to the user: User interface Program execution I/O operations File-system manipulation Communications
More informationEmbracing a Secure Cloud. Cloud & Network Virtualisation India 2017
Embracing a Secure Cloud Cloud & Network Virtualisation India 2017 Cloud Computing Group of computing resources providing services such as servers, storage, databases, software, applications, networks
More informationUnikernels? Thomas [Twitter]
Unikernels? Thomas Gazagnaire @samoht [GitHub] @eriangazag [Twitter] http://gazagnaire.org/pub/2015.12.loops.pdf About me... PhD at INRIA in Distributed Systems Citrix on Xen/Xenserver OCamlPro on Opam
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationCLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY
CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY ORGANIZATIONS NEED VISIBILITY TO SECURE AND MONITOR THEIR CLOUD ENVIRONMENTS Organizations are migrating workloads to the cloud because it offers
More informationPrivate Cloud Database Consolidation Name, Title
Private Cloud Database Consolidation Name, Title Agenda Cloud Introduction Business Drivers Cloud Architectures Enabling Technologies Service Level Expectations Customer Case Studies Conclusions
More informationDelivering Nexenta Software-Based File Services to Cisco HyperFlex
Delivering Nexenta Software-Based File White Paper March 2019 1 Copyright 2019 Nexenta Systems, ALL RIGHTS RESERVED Notice: No part of this publication may be reproduced or transmitted in any form or by
More informationImplementing Your BYOD Mobility Strategy An IT Checklist and Guide
Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...
More informationOpenNebula on VMware: Cloud Reference Architecture
OpenNebula on VMware: Cloud Reference Architecture Version 1.2, October 2016 Abstract The OpenNebula Cloud Reference Architecture is a blueprint to guide IT architects, consultants, administrators and
More informationFeature Comparison Summary
Feature Comparison Summary,, and The cloud-ready operating system is the cloud-ready operating system that delivers new layers of security and Azure-inspired innovation for the applications and infrastructure
More informationMaking Immutable Infrastructure simpler with LinuxKit. Justin Cormack
Making Immutable Infrastructure simpler with LinuxKit Justin Cormack Who am I? Engineer at Docker in Cambridge, UK. Work on security, operating systems, LinuxKit, containers @justincormack 3 Some history
More informationQuestion: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.)
Volume: 91 Questions Question: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.) A. Oracle Cloud Infrastructure Desktop Client B. Oracle Cloud Infrastructure
More informationto know how and when to apply which Microsoft technology. In many cases, you can combine multiple
Overview of Microsoft Virtualization Microsoft offers a number of virtualization technologies that administrators and infrastructure architects can use to create and administer a virtual environment. To
More informationFeature Comparison Summary
Feature Comparison Summary, and The cloud-ready operating system Thanks to cloud technology, the rate of change is faster than ever before, putting more pressure on IT. Organizations demand increased security,
More informationHow Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server
How Parallels RAS Enhances Microsoft RDS White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Overview of Microsoft Remote Desktop Services... 3 Microsoft RDS Pain Points...
More informationWhen (and how) to move applications from VMware to Cisco Metacloud
White Paper When (and how) to move applications from VMware to Cisco Metacloud What You Will Learn This white paper will explain when to migrate various applications running in VMware virtual machines
More informationTable of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2
Table of Contents Introduction Overview of vsphere Integrated Containers 1.1 1.2 2 Overview of vsphere Integrated Containers This document provides an overview of VMware vsphere Integrated Containers.
More informationSecurity Considerations for Cloud Readiness
Application Note Zentera Systems CoIP Platform CoIP Defense-in-Depth with Advanced Segmentation Advanced Segmentation is Essential for Defense-in-Depth There is no silver bullet in security a single solution
More informationChapter 2: Operating-System Structures. Chapter 2: Operating-System Structures. Objectives. Operating System Services
Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More informationBuild Cloud like Rackspace with OpenStack Ansible
Build Cloud like Rackspace with OpenStack Ansible https://etherpad.openstack.org/p/osa-workshop-01 Jirayut Nimsaeng DevOps & Cloud Architect 2nd Cloud OpenStack-Container Conference and Workshop 2016 Grand
More informationCLOUD COMPUTING. Rajesh Kumar. DevOps Architect.
CLOUD COMPUTING Rajesh Kumar DevOps Architect @RajeshKumarIN www.rajeshkumar.xyz www.scmgalaxy.com 1 Session Objectives This session will help you to: Introduction to Cloud Computing Cloud Computing Architecture
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
More informationOracle Solaris 11: No-Compromise Virtualization
Oracle Solaris 11: No-Compromise Virtualization Oracle Solaris 11 is a complete, integrated, and open platform engineered for large-scale enterprise environments. Its built-in virtualization provides a
More informationSTREAMLINED CERTIFICATION PATHS
STREAMLINED CERTIFICATION PATHS MOBILITY Windows 10 Mobility CLOUD PLATFORM & INFRASTRUCTURE Cloud Platform Cloud Platform & Infrastructure Linux on Azure PRODUCTIVITY Productivity Office 365 APP BUILDER
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.
More informationOne year of Deploying Applications for Docker, CoreOS, Kubernetes and Co.
One year of Deploying Applications for Docker, CoreOS, Kubernetes and Co thomas@endocode.com HI! Thomas Fricke thomas@endocode.com CTO Endocode System Automation DevOps Cloud, Database and Software Architect
More information6 Key Use Cases for Securing Your Organization s Cloud Workloads. 6 Key Use Cases for Securing Your Organization s Cloud Workloads
6 Key Use Cases for Securing Your Organization s Cloud Workloads 1 6 Key Use Cases for Securing Your Organization s Cloud Workloads Table of Contents Introduction: The Continuing Rise of Cloud Adoption
More informationHorizont HPE Synergy. Matt Foley, EMEA Hybrid IT Presales. October Copyright 2015 Hewlett Packard Enterprise Development LP
Horizont 2016 HPE Synergy Matt Foley, EMEA Hybrid IT Presales Copyright 2015 Hewlett Packard Enterprise Development LP October 2016 Where we started Remember this? 2 Strategy, circa 2007 3 Change-ready
More informationIBM Spectrum Protect Plus
IBM Spectrum Protect Plus Simplify data recovery and data reuse for VMs, files, databases and applications Highlights Achieve rapid VM, file, database, and application recovery Protect industry-leading
More informationCloud Computing Lecture 4
Cloud Computing Lecture 4 1/17/2012 What is Hypervisor in Cloud Computing and its types? The hypervisor is a virtual machine monitor (VMM) that manages resources for virtual machines. The name hypervisor
More informationAutomating the Software-Defined Data Center with vcloud Automation Center
Automating the Software-Defined Data Center with vcloud Automation Center 10 June 2014 Chris Alleaume Senior Systems Engineer 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of
More informationVirtualization, Xen and Denali
Virtualization, Xen and Denali Susmit Shannigrahi November 9, 2011 Susmit Shannigrahi () Virtualization, Xen and Denali November 9, 2011 1 / 70 Introduction Virtualization is the technology to allow two
More informationDeploying and Operating Cloud Native.NET apps
Deploying and Operating Cloud Native.NET apps Jenny McLaughlin, Sr. Platform Architect Cornelius Mendoza, Sr. Platform Architect Pivotal Cloud Native Practices Continuous Delivery DevOps Microservices
More informationDell EMC. VxRack System FLEX Architecture Overview
Dell EMC VxRack System FLEX Architecture Overview Document revision 1.6 October 2017 Revision history Date Document revision Description of changes October 2017 1.6 Editorial updates Updated Cisco Nexus
More information@unterstein #bedcon. Operating microservices with Apache Mesos and DC/OS
@unterstein @dcos @bedcon #bedcon Operating microservices with Apache Mesos and DC/OS 1 Johannes Unterstein Software Engineer @Mesosphere @unterstein @unterstein.mesosphere 2017 Mesosphere, Inc. All Rights
More informationFour Components of a Computer System
Four Components of a Computer System Operating System Concepts Essentials 2nd Edition 1.1 Silberschatz, Galvin and Gagne 2013 Operating System Definition OS is a resource allocator Manages all resources
More informationopennebula and cloud architecture
opennebula and cloud architecture Stefano Bagnasco INFN Torino OpenNebula Cloud Architecture- 1/120 outline Recap from yesterday OpenNebula Open Cloud Reference Architecture OpenNebula internal achitecture
More informationConsulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Planning Guide: Hosted VM-Based Resource Allocation
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Planning Guide: Hosted VM-Based Resource Allocation www.citrix.com Overview One of the first things that must be determined with designing
More informationAdvanced Continuous Delivery Strategies for Containerized Applications Using DC/OS
Advanced Continuous Delivery Strategies for Containerized Applications Using DC/OS ContainerCon @ Open Source Summit North America 2017 Elizabeth K. Joseph @pleia2 1 Elizabeth K. Joseph, Developer Advocate
More informationPuppet on the AWS Cloud
Puppet on the AWS Cloud Quick Start Reference Deployment AWS Quick Start Reference Team March 2016 This guide is also available in HTML format at http://docs.aws.amazon.com/quickstart/latest/puppet/. Contents
More informationModule Day Topic. 1 Definition of Cloud Computing and its Basics
Module Day Topic 1 Definition of Cloud Computing and its Basics 1 2 3 1. How does cloud computing provides on-demand functionality? 2. What is the difference between scalability and elasticity? 3. What
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationSimple custom Linux distributions with LinuxKit. Justin Cormack
Simple custom Linux distributions with LinuxKit Justin Cormack Who am I? Engineer at Docker in Cambridge, UK. @justincormack 3 Tools for building custom Linux Tools for building custom Linux Existing
More informationAWS Lambda: Event-driven Code in the Cloud
AWS Lambda: Event-driven Code in the Cloud Dean Bryen, Solutions Architect AWS Andrew Wheat, Senior Software Engineer - BBC April 15, 2015 London, UK 2015, Amazon Web Services, Inc. or its affiliates.
More informationHybrid Cloud 1. ebookiness created by the HPE Europe Division of Ingram Micro
Hybrid Cloud 1 contents 3 Hybrid IT: the path to the Cloud HPE & Microsoft: the strongest commitment to the Hybrid cloud 4 5 Accelerate your business with the hybrid cloud offered by HPE and Azure Why
More informationHow CloudEndure Works
How Works How Works THE TECHNOLOGY BEHIND CLOUDENDURE S DISASTER RECOVERY AND LIVE MIGRATION SOLUTIONS offers Disaster Recovery and Live Migration Software-as-a-Service (SaaS) solutions. Both solutions
More informationIntroduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More informationOverview of Microsoft Virtualization
Overview of Microsoft Virtualization Microsoft offers a number of virtualization technologies that administrators and infrastructure architects can use to create and administer a virtual environment. To
More informationDefine Your Future with SUSE
Define Your Future with SUSE SUSE Linux Enterprise and more Bo Jin Sales Engineer bo.jin@suse.com SUSE auf einen Blick 25+ +8% Jahre Erfahrung in der Open-SourceEntwicklung SUSE-Wachstum vgl. mit anderen
More informationRapid Bare-Metal Provisioning and Image Management Service. Presenters: Apoorve Mohan Ravi Santosh Gudimetla (Northeastern University)
Rapid Bare-Metal ing and Image Management Service Presenters: Apoorve Mohan Ravi Santosh Gudimetla (Northeastern University) : Bare Metal Imaging Service Motivation: Even with HIL using existing provisioning
More informationOperating Systems. Operating System Structure. Lecture 2 Michael O Boyle
Operating Systems Operating System Structure Lecture 2 Michael O Boyle 1 Overview Architecture impact User operating interaction User vs kernel Syscall Operating System structure Layers Examples 2 Lower-level
More informationFaculté Polytechnique
Faculté Polytechnique INFORMATIQUE PARALLÈLE ET DISTRIBUÉE CHAPTER 7 : CLOUD COMPUTING Sidi Ahmed Mahmoudi sidi.mahmoudi@umons.ac.be 13 December 2017 PLAN Introduction I. History of Cloud Computing and
More informationDATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure
DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure AlienVault USM Anywhere accelerates and centralizes threat detection, incident response,
More informationDistributed Systems COMP 212. Lecture 18 Othon Michail
Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and
More informationRenovating your storage infrastructure for Cloud era
Renovating your storage infrastructure for Cloud era Nguyen Phuc Cuong Software Defined Storage Country Sales Leader Copyright IBM Corporation 2016 2 Business SLAs Challenging Traditional Storage Approaches
More informationChapter 2: Operating-System Structures. Operating System Concepts 9 th Edit9on
Chapter 2: Operating-System Structures Operating System Concepts 9 th Edit9on Silberschatz, Galvin and Gagne 2013 Chapter 2: Operating-System Structures 1. Operating System Services 2. User Operating System
More informationContainerizing GPU Applications with Docker for Scaling to the Cloud
Containerizing GPU Applications with Docker for Scaling to the Cloud SUBBU RAMA FUTURE OF PACKAGING APPLICATIONS Turns Discrete Computing Resources into a Virtual Supercomputer GPU Mem Mem GPU GPU Mem
More informationOperating System Services. User Services. System Operation Services. User Operating System Interface - CLI. A View of Operating System Services
Operating System Services One set of services for users The other set of services for system operations Operating Systems Structures Notice: This set of slides is based on the notes by Professor Perrone
More informationChapter 3: Operating-System Structures
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1
More informationA Hands on Introduction to Docker
A Hands on Introduction to Docker Len Bass A Hands on introduction Introduction to to Docker May 2017 1 4, Len 2017 Bass 2017 Len Bass 1 Setting expectations This is an introduction to Docker intended
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation
More informationAdopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security
Adopting Modern Practices for Improved Cloud Security Cox Automotive - Enterprise Risk & Security 1 About Cox Automotive Cox Automotive is a leading provider of products and services that span the automotive
More informationObjectives. Chapter 2: Operating-System Structures. 2.1 Operating System Services
Objectives Chapter 2: Operating-System Structures To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system
More informationCHAPTER 2: SYSTEM STRUCTURES. By I-Chen Lin Textbook: Operating System Concepts 9th Ed.
CHAPTER 2: SYSTEM STRUCTURES By I-Chen Lin Textbook: Operating System Concepts 9th Ed. Chapter 2: System Structures Operating System Services User Operating System Interface System Calls Types of System
More informationHow CloudEndure Disaster Recovery Works
How Disaster Recovery Works Technical White Paper How Disaster Recovery Works THE TECHNOLOGY BEHIND CLOUDENDURE S ENTERPRISE-GRADE DISASTER RECOVERY SOLUTION Introduction Disaster Recovery is a Software-as-a-Service
More informationTech Talk #11. Public Cloud UNIVERSITY OF COLORADO AT BOULDER 12/14/16 CU TECH TALK #11
Tech Talk #11 Public Cloud UNIVERSITY OF COLORADO AT BOULDER 12/14/16 CU TECH TALK #11 Who is this idiot speaking? Orrie Gartner Deputy Director of Operations Where is the Tech in this Tech Talk? For those
More informationHow CloudEndure Works
How Works How Works THE TECHNOLOGY BEHIND CLOUDENDURE S DISASTER RECOVERY AND LIVE MIGRATION SOLUTIONS offers cloud-based Disaster Recovery and Live Migration Software-as-a-Service (SaaS) solutions. Both
More informationChapter 2: Operating-System Structures
Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System
More informationMinfy-Magnaquest Migration Use Case
Document Details Use Case Name Minfy Migration Use Case04 First Draft 15 th August 2018 Author Prabhakar D Reviewed By Pradeep Narayanaswamy Scope This document provides a detailed use case study on data
More informationElmar Szych Cloud Solution Architekt
Elmar Szych Cloud Solution Architekt Technologie verändert unser Leben und unsere Arbeit in immer rasanterem Tempo. 4 Veränderung kann große Chancen mit sich bringen. Ganze Branchen verändern sich. Cloud
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationContainers for NFV Peter Willis March 2017
Containers for NFV Peter Willis March 2017 Content What is containers Fundamental Benefits Use Cases Virtual CPE in the network/cloud Network Slicing Service Protection & Energy saving At the Edge/Fog
More informationAPI, DEVOPS & MICROSERVICES
API, DEVOPS & MICROSERVICES RAPID. OPEN. SECURE. INNOVATION TOUR 2018 April 26 Singapore 1 2018 Software AG. All rights reserved. For internal use only THE NEW ARCHITECTURAL PARADIGM Microservices Containers
More informationDXC Technology and VMware: Innovation that Transforms
DXC Technology and VMware: Innovation that Transforms DXC and VMware for Digital Transformation Digital transformation is the talk of IT today, and although driven by technology, the focus is on real,
More informationDisaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper
Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More information