Presentation from IBM theatre at ISC High-Performance 2017 (Frankfurt, Germany). Learn about ongoing research around prediction of job resource usage in IBM Spectrum LSF.
How to Handle Asynchronous Behaviors Using SVADVClub
SystemVerilog assertions are inherently synchronous due to the language definition. This makes them difficult to use for checking asynchronous behaviors like resets or communication across clock domains. However, with the proper techniques, SVA can effectively check both synchronous and asynchronous properties. Key techniques include using "disable iff" to terminate assertions when asynchronous signals occur, and delaying input sampling through constructs like program blocks, sequence events, or #0 delays to sample inputs after asynchronous signals have taken effect.
This presentation provides an overview of vSAN components and fault tolerance methods. It discusses how vSAN objects are divided into components that are placed across hosts. It covers the different states components can be in, such as active, degraded, absent, and how resync, rebuild, repair, and reconfiguration processes work. It also explains how vSAN uses voting and quorum to determine which cluster partition remains available in a network partition scenario.
USENIX LISA2021 talk by Brendan Gregg (https://www.youtube.com/watch?v=_5Z2AU7QTH4). This talk is a deep dive that describes how BPF (eBPF) works internally on Linux, and dissects some modern performance observability tools. Details covered include the kernel BPF implementation: the verifier, JIT compilation, and the BPF execution environment; the BPF instruction set; different event sources; and how BPF is used by user space, using bpftrace programs as an example. This includes showing how bpftrace is compiled to LLVM IR and then BPF bytecode, and how per-event data and aggregated map data are fetched from the kernel.
Process Scheduler and Balancer in Linux KernelHaifeng Li
The document discusses process scheduling in the Linux kernel. It begins with an introduction to schedulers and outlines Linux scheduler history, including round-robin, O(N), O(1), and Completely Fair schedulers. It then provides more details on the Completely Fair Scheduler's use of virtual runtime to determine process execution order and maintain fairness. The document also briefly discusses the real-time scheduler and key data structures used for scheduling like task_struct and sched_domain. It concludes with an overview of the CFS load balancer's hierarchical design and methods used to balance tasks among CPU cores.
This document summarizes a presentation on static partitioning virtualization for RISC-V. It discusses the motivation for embedded virtualization, an overview of static partitioning hypervisors like Jailhouse and Xen, and the Bao hypervisor. It then provides an overview of the RISC-V hypervisor specification and extensions, including implemented features. It evaluates the performance overhead and interrupt latency of a prototype RISC-V hypervisor implementation with and without interference mitigations like cache partitioning.
Profiling your Applications using the Linux Perf ToolsemBO_Conference
This document provides an overview of using the Linux perf tools to profile applications. It discusses setting up perf, benchmarking applications, profiling both CPU usage and sleep times, and analyzing profiling data. The document covers perf commands like perf record to collect profiling data, perf report to analyze the data, and perf script to convert it to other formats. It also discusses profiling options like call graphs and collecting kernel vs. user mode events.
Understanding software licensing with IBM Power Systems PowerVM virtualizationJay Kruemcke
One of the key benefits of combining workloads in a virtualized environment is the ability to pay for less than the full capacity of the machine. Unfortunately there are many misconceptions about how software licensing really works in these environments.
The IBM Power Systems PowerVM virtualization technology offers a great deal of flexibility, but that flexibility also results in complexity when determining software license requirements. This presentation covers important licensing considerations for the IBM Power Systems environment.
How to Handle Asynchronous Behaviors Using SVADVClub
SystemVerilog assertions are inherently synchronous due to the language definition. This makes them difficult to use for checking asynchronous behaviors like resets or communication across clock domains. However, with the proper techniques, SVA can effectively check both synchronous and asynchronous properties. Key techniques include using "disable iff" to terminate assertions when asynchronous signals occur, and delaying input sampling through constructs like program blocks, sequence events, or #0 delays to sample inputs after asynchronous signals have taken effect.
This presentation provides an overview of vSAN components and fault tolerance methods. It discusses how vSAN objects are divided into components that are placed across hosts. It covers the different states components can be in, such as active, degraded, absent, and how resync, rebuild, repair, and reconfiguration processes work. It also explains how vSAN uses voting and quorum to determine which cluster partition remains available in a network partition scenario.
USENIX LISA2021 talk by Brendan Gregg (https://www.youtube.com/watch?v=_5Z2AU7QTH4). This talk is a deep dive that describes how BPF (eBPF) works internally on Linux, and dissects some modern performance observability tools. Details covered include the kernel BPF implementation: the verifier, JIT compilation, and the BPF execution environment; the BPF instruction set; different event sources; and how BPF is used by user space, using bpftrace programs as an example. This includes showing how bpftrace is compiled to LLVM IR and then BPF bytecode, and how per-event data and aggregated map data are fetched from the kernel.
Process Scheduler and Balancer in Linux KernelHaifeng Li
The document discusses process scheduling in the Linux kernel. It begins with an introduction to schedulers and outlines Linux scheduler history, including round-robin, O(N), O(1), and Completely Fair schedulers. It then provides more details on the Completely Fair Scheduler's use of virtual runtime to determine process execution order and maintain fairness. The document also briefly discusses the real-time scheduler and key data structures used for scheduling like task_struct and sched_domain. It concludes with an overview of the CFS load balancer's hierarchical design and methods used to balance tasks among CPU cores.
This document summarizes a presentation on static partitioning virtualization for RISC-V. It discusses the motivation for embedded virtualization, an overview of static partitioning hypervisors like Jailhouse and Xen, and the Bao hypervisor. It then provides an overview of the RISC-V hypervisor specification and extensions, including implemented features. It evaluates the performance overhead and interrupt latency of a prototype RISC-V hypervisor implementation with and without interference mitigations like cache partitioning.
Profiling your Applications using the Linux Perf ToolsemBO_Conference
This document provides an overview of using the Linux perf tools to profile applications. It discusses setting up perf, benchmarking applications, profiling both CPU usage and sleep times, and analyzing profiling data. The document covers perf commands like perf record to collect profiling data, perf report to analyze the data, and perf script to convert it to other formats. It also discusses profiling options like call graphs and collecting kernel vs. user mode events.
Understanding software licensing with IBM Power Systems PowerVM virtualizationJay Kruemcke
One of the key benefits of combining workloads in a virtualized environment is the ability to pay for less than the full capacity of the machine. Unfortunately there are many misconceptions about how software licensing really works in these environments.
The IBM Power Systems PowerVM virtualization technology offers a great deal of flexibility, but that flexibility also results in complexity when determining software license requirements. This presentation covers important licensing considerations for the IBM Power Systems environment.
Session at ContainerDay Security 2023 on the 8th of March in Hamburg.
Cilium is the next generation, eBPF powered open-source Cloud Native Networking solution, providing security, observability, scalability, and superior performance. Cilium is an incubating project under CNCF and the leading CNI for Kubernetes. In this session we will introduce the fundamentals of Cilium Network Policies and the basics of application-aware and Identity-based Security. We will discuss the default-allow and default-deny approaches and visualize the corresponding ingress and egress connections. Using the Network Policy Editor we will be able to demonstrate how a Cilium Network Policy looks like and what they mean on a given Kubernetes cluster. Additionally, we will walk through different examples and demonstrate how application traffic can be observed with Hubble and show how you can use the Network Policy Editor to apply new Cilium Network Policies for your workloads. Finally, we’ll demonstrate how Tetragon provides eBPF-based transparent security observability combined with real-time runtime enforcement.
Presentation oracle on power power advantages and license optimizationsolarisyougood
This document discusses optimizing Oracle licensing on IBM Power Systems. It describes the advantages of Power Systems for virtualization and workload consolidation which can reduce licensing costs. It provides an overview of Oracle editions and their pricing, noting opportunities to use Standard Edition to save costs versus Enterprise Edition. It also discusses when RAC may not be needed on Power Systems due to its high availability features, and how PowerVM partitioning is recognized by Oracle for "sub-capacity pricing" based on actual cores used.
Video: https://www.youtube.com/watch?v=JRFNIKUROPE . Talk for linux.conf.au 2017 (LCA2017) by Brendan Gregg, about Linux enhanced BPF (eBPF). Abstract:
A world of new capabilities is emerging for the Linux 4.x series, thanks to enhancements that have been included in Linux for to Berkeley Packet Filter (BPF): an in-kernel virtual machine that can execute user space-defined programs. It is finding uses for security auditing and enforcement, enhancing networking (including eXpress Data Path), and performance observability and troubleshooting. Many new open source tools that have been written in the past 12 months for performance analysis that use BPF. Tracing superpowers have finally arrived for Linux!
For its use with tracing, BPF provides the programmable capabilities to the existing tracing frameworks: kprobes, uprobes, and tracepoints. In particular, BPF allows timestamps to be recorded and compared from custom events, allowing latency to be studied in many new places: kernel and application internals. It also allows data to be efficiently summarized in-kernel, including as histograms. This has allowed dozens of new observability tools to be developed so far, including measuring latency distributions for file system I/O and run queue latency, printing details of storage device I/O and TCP retransmits, investigating blocked stack traces and memory leaks, and a whole lot more.
This talk will summarize BPF capabilities and use cases so far, and then focus on its use to enhance Linux tracing, especially with the open source bcc collection. bcc includes BPF versions of old classics, and many new tools, including execsnoop, opensnoop, funcccount, ext4slower, and more (many of which I developed). Perhaps you'd like to develop new tools, or use the existing tools to find performance wins large and small, especially when instrumenting areas that previously had zero visibility. I'll also summarize how we intend to use these new capabilities to enhance systems analysis at Netflix.
Presentation from IBM theatre at ISC High-Performance 2017 (Frankfurt, Germany). Learn about running jobs in containers (Docker, Singularity, Shifter) in IBM Spectrum LSF.
QEMU is an emulator that uses dynamic translation to emulate one instruction set architecture (ISA) on another host ISA. It translates guest instructions to an intermediate representation (TCG IR) code, and then compiles the IR code to native host instructions. QEMU employs techniques like translation block caching and chaining to improve the performance of dynamic translation. It also uses helper functions to offload complex operations during translation to improve efficiency.
LAS16-307: Benchmarking Schedutil in AndroidLinaro
This document summarizes benchmarking results that compare the performance and power efficiency of Android's schedutil CPU scheduler against the existing ondemand and interactive schedulers. Tests were conducted on a Hikey development board using various workloads before and after applying the Energy Aware Scheduling patches. While schedutil showed competitive performance in many tests, some regressions were observed in user experience metrics like recent app switching and gallery scrolling, as well as higher energy usage when combined with the EAS patches, indicating areas for further optimization.
Intel & QLogic NIC performance test results v0.2David Pasek
This document summarizes test results from an HPE lab that compared network performance of VMs using Intel X710 and Qlogic FastLinQ QL41xxx NICs passed through to ESXi hosts. A variety of TCP, UDP, HTTP and HTTPS network throughput tests were run between VMs on the two hosts. In most tests, the Intel and Qlogic NICs performed comparably, with Qlogic outperforming Intel in some UDP and HTTP tests when using receive-side scaling. The tests helped validate that the Qlogic NIC meets expectations for VM network throughput.
The Linux kernel is undergoing the most fundamental architecture evolution in history and is becoming a microkernel. Why is the Linux kernel evolving into a microkernel? The potentially biggest fundamental change ever happening to the Linux kernel. This talk covers how companies like Facebook and Google use BPF to patch 0-day exploits, how BPF will change the way features are added to the kernel forever, and how BPF is introducing a new type of application deployment method for the Linux kernel.
The document discusses using the Storage Performance Development Kit (SPDK) to optimize Ceph performance. SPDK provides userspace libraries and drivers to unlock the full potential of Intel storage technologies. It summarizes current SPDK support in Ceph's BlueStore backend and proposes leveraging SPDK further to accelerate Ceph's block services through optimized SPDK targets and caching. Collaboration is needed between the SPDK and Ceph communities to fully realize these optimizations.
This document provides a reference architecture for implementing a Virtual SAN Ready Node environment using Dell hardware and VMware software. It describes the physical and logical architecture, including networking, storage, and server node components. Specific hardware models are recommended, such as Dell R730 servers and Dell networking switches. The architecture supports VMware Horizon, including hybrid deployments with Horizon Air.
RISC-V Boot Process: One Step at a TimeAtish Patra
- OpenSBI is an open-source implementation of the RISC-V Supervisor Binary Interface (SBI) specifications. It provides runtime services in M-mode to facilitate booting of operating systems.
- OpenSBI supports various RISC-V platforms including SiFive boards, QEMU, and is integrated with projects like U-Boot and EDK2. It provides a standardized way for operating systems to interface with the underlying hardware.
- Future work includes supporting more platforms, implementing the SBI v0.2 specification, and enabling features like sequential CPU boot and hypervisor support. OpenSBI aims to establish a stable boot ecosystem for RISC-V.
Automated Testing for Embedded Software in C or C++Lars Thorup
This document discusses automated testing for embedded C software. It introduces Lars Thorup and provides an agenda for the document. It then defines automated testing, describes the Unity testing framework for embedded C, and provides an example of how to handle dependencies in testing. It advocates for continuous integration, breaking dependencies through abstraction and injection, and explains how automated testing can improve software quality through faster development and preventing bugs.
The document describes a workshop on Universal Verification Methodology (UVM) that will cover UVM concepts and techniques for verifying blocks, IP, SOCs, and systems. The workshop agenda includes presentations on UVM concepts and architecture, sequences and phasing, TLM2 and register packages, and putting together UVM testbenches. The workshop is organized by Dennis Brophy, Stan Krolikoski, and Yatin Trivedi and will take place on June 5, 2011 in San Diego, CA.
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)zOSCommserver
Back in 2017, we introduced you to a new capability called z/OS Encryption Readiness Technology (zERT). zERT provides z/OS network security administrators the data they need to understand and assess the quality of the cryptographic protection being applied to their z/OS network traffic. This session will cover new zERT features that have been added, including the zERT Network Analyzer (a z/OSMF plugin), a healthy list of IBM and ISV products that consume zERT SMF data, some new configuration options, and a few hints and tips.
This document discusses how Qemu works to translate guest binaries to run on the host machine. It first generates an intermediate representation called TCG-IR from the guest binary code. It then translates the TCG-IR into native host machine code. To achieve high performance, it chains translated blocks together by patching jump targets. Key techniques include just-in-time compilation, translation block finding, block chaining, and helper functions to emulate unsupported guest instructions.
Dead Lock Analysis of spin_lock() in Linux Kernel (english)Sneeker Yeh
The document discusses spin locks and semaphores in the Linux kernel. It begins with an introduction to the difference between spin locks and semaphores. Spin locks cause threads to continuously loop trying to acquire the lock, while semaphores cause threads to sleep. An example is given of a deadlock scenario that can occur with spin locks. The document then discusses the concept of context in the kernel, including user context, interrupt context, and the control flow during procedure calls and interrupts. Log analysis and examples of double-acquire deadlocks involving spin locks are provided. The document concludes with recommendations for how to prevent deadlocks, such as using spin_lock_irqsave/restore and avoiding semaphores in interrupt context.
Introduction to OS LEVEL Virtualization & ContainersVaibhav Sharma
This Presentation contains information about os level virtualization and Containers internals. It has used other material on slide share which is referenced in Notes of PPT
New system information panels in SDSF on z/OS 2.1 and 2.2 allow users to easily view system configuration information such as:
- System parameters (SYS)
- Link list data sets (LNK)
- Link pack data sets (LPA)
- APF authorized libraries (APF)
- Page data sets (PAG)
- Parmlib data sets (PARM)
The SDSFAUX address space must be started to access these panels, which show consolidated data and allow searching within data sets.
z/OS Small Enhancements - Episode 2016AMarna Walle
This presentation covers small enhancements from older z/OS releases. You might have missed little functions that are helpful, but you never knew existed! The content of each of these z/OS Small Enhancements changes every half year (Episode A and Episode B each year).
Session at ContainerDay Security 2023 on the 8th of March in Hamburg.
Cilium is the next generation, eBPF powered open-source Cloud Native Networking solution, providing security, observability, scalability, and superior performance. Cilium is an incubating project under CNCF and the leading CNI for Kubernetes. In this session we will introduce the fundamentals of Cilium Network Policies and the basics of application-aware and Identity-based Security. We will discuss the default-allow and default-deny approaches and visualize the corresponding ingress and egress connections. Using the Network Policy Editor we will be able to demonstrate how a Cilium Network Policy looks like and what they mean on a given Kubernetes cluster. Additionally, we will walk through different examples and demonstrate how application traffic can be observed with Hubble and show how you can use the Network Policy Editor to apply new Cilium Network Policies for your workloads. Finally, we’ll demonstrate how Tetragon provides eBPF-based transparent security observability combined with real-time runtime enforcement.
Presentation oracle on power power advantages and license optimizationsolarisyougood
This document discusses optimizing Oracle licensing on IBM Power Systems. It describes the advantages of Power Systems for virtualization and workload consolidation which can reduce licensing costs. It provides an overview of Oracle editions and their pricing, noting opportunities to use Standard Edition to save costs versus Enterprise Edition. It also discusses when RAC may not be needed on Power Systems due to its high availability features, and how PowerVM partitioning is recognized by Oracle for "sub-capacity pricing" based on actual cores used.
Video: https://www.youtube.com/watch?v=JRFNIKUROPE . Talk for linux.conf.au 2017 (LCA2017) by Brendan Gregg, about Linux enhanced BPF (eBPF). Abstract:
A world of new capabilities is emerging for the Linux 4.x series, thanks to enhancements that have been included in Linux for to Berkeley Packet Filter (BPF): an in-kernel virtual machine that can execute user space-defined programs. It is finding uses for security auditing and enforcement, enhancing networking (including eXpress Data Path), and performance observability and troubleshooting. Many new open source tools that have been written in the past 12 months for performance analysis that use BPF. Tracing superpowers have finally arrived for Linux!
For its use with tracing, BPF provides the programmable capabilities to the existing tracing frameworks: kprobes, uprobes, and tracepoints. In particular, BPF allows timestamps to be recorded and compared from custom events, allowing latency to be studied in many new places: kernel and application internals. It also allows data to be efficiently summarized in-kernel, including as histograms. This has allowed dozens of new observability tools to be developed so far, including measuring latency distributions for file system I/O and run queue latency, printing details of storage device I/O and TCP retransmits, investigating blocked stack traces and memory leaks, and a whole lot more.
This talk will summarize BPF capabilities and use cases so far, and then focus on its use to enhance Linux tracing, especially with the open source bcc collection. bcc includes BPF versions of old classics, and many new tools, including execsnoop, opensnoop, funcccount, ext4slower, and more (many of which I developed). Perhaps you'd like to develop new tools, or use the existing tools to find performance wins large and small, especially when instrumenting areas that previously had zero visibility. I'll also summarize how we intend to use these new capabilities to enhance systems analysis at Netflix.
Presentation from IBM theatre at ISC High-Performance 2017 (Frankfurt, Germany). Learn about running jobs in containers (Docker, Singularity, Shifter) in IBM Spectrum LSF.
QEMU is an emulator that uses dynamic translation to emulate one instruction set architecture (ISA) on another host ISA. It translates guest instructions to an intermediate representation (TCG IR) code, and then compiles the IR code to native host instructions. QEMU employs techniques like translation block caching and chaining to improve the performance of dynamic translation. It also uses helper functions to offload complex operations during translation to improve efficiency.
LAS16-307: Benchmarking Schedutil in AndroidLinaro
This document summarizes benchmarking results that compare the performance and power efficiency of Android's schedutil CPU scheduler against the existing ondemand and interactive schedulers. Tests were conducted on a Hikey development board using various workloads before and after applying the Energy Aware Scheduling patches. While schedutil showed competitive performance in many tests, some regressions were observed in user experience metrics like recent app switching and gallery scrolling, as well as higher energy usage when combined with the EAS patches, indicating areas for further optimization.
Intel & QLogic NIC performance test results v0.2David Pasek
This document summarizes test results from an HPE lab that compared network performance of VMs using Intel X710 and Qlogic FastLinQ QL41xxx NICs passed through to ESXi hosts. A variety of TCP, UDP, HTTP and HTTPS network throughput tests were run between VMs on the two hosts. In most tests, the Intel and Qlogic NICs performed comparably, with Qlogic outperforming Intel in some UDP and HTTP tests when using receive-side scaling. The tests helped validate that the Qlogic NIC meets expectations for VM network throughput.
The Linux kernel is undergoing the most fundamental architecture evolution in history and is becoming a microkernel. Why is the Linux kernel evolving into a microkernel? The potentially biggest fundamental change ever happening to the Linux kernel. This talk covers how companies like Facebook and Google use BPF to patch 0-day exploits, how BPF will change the way features are added to the kernel forever, and how BPF is introducing a new type of application deployment method for the Linux kernel.
The document discusses using the Storage Performance Development Kit (SPDK) to optimize Ceph performance. SPDK provides userspace libraries and drivers to unlock the full potential of Intel storage technologies. It summarizes current SPDK support in Ceph's BlueStore backend and proposes leveraging SPDK further to accelerate Ceph's block services through optimized SPDK targets and caching. Collaboration is needed between the SPDK and Ceph communities to fully realize these optimizations.
This document provides a reference architecture for implementing a Virtual SAN Ready Node environment using Dell hardware and VMware software. It describes the physical and logical architecture, including networking, storage, and server node components. Specific hardware models are recommended, such as Dell R730 servers and Dell networking switches. The architecture supports VMware Horizon, including hybrid deployments with Horizon Air.
RISC-V Boot Process: One Step at a TimeAtish Patra
- OpenSBI is an open-source implementation of the RISC-V Supervisor Binary Interface (SBI) specifications. It provides runtime services in M-mode to facilitate booting of operating systems.
- OpenSBI supports various RISC-V platforms including SiFive boards, QEMU, and is integrated with projects like U-Boot and EDK2. It provides a standardized way for operating systems to interface with the underlying hardware.
- Future work includes supporting more platforms, implementing the SBI v0.2 specification, and enabling features like sequential CPU boot and hypervisor support. OpenSBI aims to establish a stable boot ecosystem for RISC-V.
Automated Testing for Embedded Software in C or C++Lars Thorup
This document discusses automated testing for embedded C software. It introduces Lars Thorup and provides an agenda for the document. It then defines automated testing, describes the Unity testing framework for embedded C, and provides an example of how to handle dependencies in testing. It advocates for continuous integration, breaking dependencies through abstraction and injection, and explains how automated testing can improve software quality through faster development and preventing bugs.
The document describes a workshop on Universal Verification Methodology (UVM) that will cover UVM concepts and techniques for verifying blocks, IP, SOCs, and systems. The workshop agenda includes presentations on UVM concepts and architecture, sequences and phasing, TLM2 and register packages, and putting together UVM testbenches. The workshop is organized by Dennis Brophy, Stan Krolikoski, and Yatin Trivedi and will take place on June 5, 2011 in San Diego, CA.
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)zOSCommserver
Back in 2017, we introduced you to a new capability called z/OS Encryption Readiness Technology (zERT). zERT provides z/OS network security administrators the data they need to understand and assess the quality of the cryptographic protection being applied to their z/OS network traffic. This session will cover new zERT features that have been added, including the zERT Network Analyzer (a z/OSMF plugin), a healthy list of IBM and ISV products that consume zERT SMF data, some new configuration options, and a few hints and tips.
This document discusses how Qemu works to translate guest binaries to run on the host machine. It first generates an intermediate representation called TCG-IR from the guest binary code. It then translates the TCG-IR into native host machine code. To achieve high performance, it chains translated blocks together by patching jump targets. Key techniques include just-in-time compilation, translation block finding, block chaining, and helper functions to emulate unsupported guest instructions.
Dead Lock Analysis of spin_lock() in Linux Kernel (english)Sneeker Yeh
The document discusses spin locks and semaphores in the Linux kernel. It begins with an introduction to the difference between spin locks and semaphores. Spin locks cause threads to continuously loop trying to acquire the lock, while semaphores cause threads to sleep. An example is given of a deadlock scenario that can occur with spin locks. The document then discusses the concept of context in the kernel, including user context, interrupt context, and the control flow during procedure calls and interrupts. Log analysis and examples of double-acquire deadlocks involving spin locks are provided. The document concludes with recommendations for how to prevent deadlocks, such as using spin_lock_irqsave/restore and avoiding semaphores in interrupt context.
Introduction to OS LEVEL Virtualization & ContainersVaibhav Sharma
This Presentation contains information about os level virtualization and Containers internals. It has used other material on slide share which is referenced in Notes of PPT
New system information panels in SDSF on z/OS 2.1 and 2.2 allow users to easily view system configuration information such as:
- System parameters (SYS)
- Link list data sets (LNK)
- Link pack data sets (LPA)
- APF authorized libraries (APF)
- Page data sets (PAG)
- Parmlib data sets (PARM)
The SDSFAUX address space must be started to access these panels, which show consolidated data and allow searching within data sets.
z/OS Small Enhancements - Episode 2016AMarna Walle
This presentation covers small enhancements from older z/OS releases. You might have missed little functions that are helpful, but you never knew existed! The content of each of these z/OS Small Enhancements changes every half year (Episode A and Episode B each year).
Unisanta - Visão Geral de hardware Servidor IBM System zAnderson Bassani
Apresentação realizada na Universidade Santa Cecília - Cidade de Santos, São Paulo em 03/09/2014. Apresentado aos alunos de Sistemas de Informação e Ciência da Computação.
The document discusses several topics related to comparing the performance and capacity of different computing systems. It introduces the concept of workload factor which allows comparing the capacity of systems to process the same workload despite architectural differences. Several industry standard benchmarks are described but they are noted to not always match real customer workloads. Real workloads place more stress on system interconnect and cache performance than most benchmarks.
The document provides information about an upcoming webcast on enhancements in z/OS Version 2.1. It begins with disclaimers and contact information for the presenters. It then provides the webcast URL and dates. The remainder of the document outlines key new capabilities in z/OS 2.1 related to performance, scale, availability, security, data serving, and management. These are aimed at helping customers drive business value, achieve superior economics, improve performance and scale, and increase customer satisfaction.
Java and the GPU - Everything You Need To KnowAdam Roberts
Here are the main types of GPUs and some key differences:
- Consumer/gaming GPUs: These are graphics cards primarily designed for gaming and consumer applications. Examples include Nvidia GeForce and AMD Radeon cards. They have good price/performance but may lack some features of professional GPUs.
- Professional/workstation GPUs: Higher-end cards designed for professional applications like CAD, content creation, etc. Examples include Nvidia Quadro and AMD FirePro. Tend to be more expensive than gaming GPUs but have stronger drivers, support, and certifications for professional software.
- Cloud/data center GPUs: GPUs designed for high performance computing and machine learning workloads. Have much more
z/OS Small Enhancements - Episode 2014BMarna Walle
This presentation covers small enhancements from older z/OS releases. You might have missed little functions that are helpful, but you never knew existed! The content of each of these z/OS Small Enhancements changes every half year (Episode A and Episode B each year).
Ims13 ims tools ims v13 migration workshop - IMS UG May 2014 Sydney & Melbo...Robert Hain
Together, the IBM IMS Tools Solution Packs and IMS 13 deliver simplification, automation and intelligence, with all the tools needed to support IMS databases now in one package. It doesn’t make sense to run reorganization utilities if your databases do not need to be reorganized. Now you can quickly and easily improve IMS application performance, IMS resource utilization and deliver higher system availability with the end-to-end analysis of IMS transactions. Comprehensive performance reporting and easier interactive analysis determine what happened, what needs fixing and how to fix it – all part of the intelligence and automation of the IMS Tools Performance Solution Pack.
Tendências da junção entre Big Data Analytics, Machine Learning e Supercomput...Igor José F. Freitas
This document discusses trends in machine learning, big data analytics, and supercomputing. It describes how machine learning is evolving from classic techniques like regression and clustering to deep learning using neural networks. It also discusses how high performance computing and big data analytics are converging, with workloads varying in their resource needs for data and compute. The document outlines Intel's strategy to apply their high performance computing approach to artificial intelligence and machine learning.
OpenStack and z/VM – What is it and how do I get it?Anderson Bassani
The document discusses OpenStack and how to get it running on z/VM. It provides an overview of OpenStack, describing what it is and who it is for. It then covers specifics of the z/VM OpenStack implementation, including supported features in Nova, Neutron and Cinder. Finally, it outlines the steps to install the z/VM OpenStack appliance, including requirements, downloading the necessary files, and configuring directories.
Using GPUs to Achieve Massive Parallelism in Java 8Dev_Events
Adam Roberts, IBM Spark Team Lead – Runtimes, IBM Cloud
Graphic processing units (GPUs) are not limited to traditional scene rendering tasks. They can play a
huge role in accelerating applications that have a large number of parallelizable tasks.
Learn how Java can exploit the power of GPUs to optimize high-performance enterprise and technical
computing applications such as big data and analytics workloads, through both explicit GPU
programming and letting the Java JIT compiler transparently off-load work to the GPU.
This presentation covers the principles and considerations for GPU programming from Java and looks at
the software stack and developer tools available. After this talk you will be ready to extract the full
power of GPUs from your own application. We will present a demo showing GPU acceleration and
discuss what is coming in the future.
The document summarizes the reality of IBM's System i platform, contrasting it with common myths. It describes the System i as having industry-leading technology, the lowest total cost of ownership, and continuing investment from IBM. It also provides statistics showing widespread use of the System i in Fortune 100 and 500 companies as well as the healthcare industry.
Radically Simple Management & Assembly of API-based Applicationsvinodmut
This document discusses API composition for cloud applications. It describes how APIs from different providers can be assembled together through recipes and workflows to create new applications and services. The workflows allow for flow control logic and can be deployed on a scalable runtime in the cloud. A demo is shown of a smart home application created by combining APIs for various home devices through a simple script. The document concludes by stating that API choreography platforms will help developers and businesses leverage APIs for the cloud in a resilient and secure manner.
This document discusses modernizing management, monitoring, and provisioning on mainframes. It notes that mainframes provide high availability, security, scalability, and disaster recovery capabilities through the z/VM hypervisor. Consolidating workloads from distributed servers onto mainframes can reduce costs through lower software licensing, energy usage, facilities needs, and staffing while improving availability and flexibility. Linux runs efficiently on mainframes and benefits from hardware features like cryptographic support and high I/O bandwidth.
Enabling a hardware accelerated deep learning data science experience for Apa...DataWorks Summit
Deep learning techniques are finding significant commercial success in a wide variety of industries. Large unstructured data sets such as images, videos, speech and text are great for deep learning, but impose a lot of demands on computing resources. New types of hardware architectures such as GPUs and faster interconnects (e.g. NVLink), RDMA capable networking interface from Mellanox available on OpenPOWER and IBM POWER systems are enabling practical speedups for deep learning. Data Scientists can intuitively incorporate deep learning capabilities on accelerated hardware using open source components such as Jupyter and Zeppelin notebooks, RStudio, Spark, Python, Docker, and Kubernetes with IBM PowerAI. Jupyter and Apache Zeppelin integrate well with Apache Spark and Hadoop using the Apache Livy project. This session will show some deep learning build and deploy steps using Tensorflow and Caffe in Docker containers running in a hardware accelerated private cloud container service. This session will also show system architectures and best practices for deployments on accelerated hardware. INDRAJIT PODDAR, Senior Technical Staff Member, IBM
z/OS Small Enhancements - Episode 2014AMarna Walle
This presentation covers small enhancements from older z/OS releases. You might have missed little functions that are helpful, but you never knew existed! The content of each of these z/OS Small Enhancements changes every half year (Episode A and Episode B each year).
This document discusses API discovery and debugging. It begins with three disclaimers about IBM's statements regarding future products being subject to change. It then provides three tips for starting an API journey: 1) reference a catalog of business rules, 2) look at program flow, and 3) follow the data. It also notes what should be done when there is an issue with an API. The document ends with listing various trademarks.
Similar to Cognitive Computing in IBM Spectrum LSF (20)
Project Management: The Role of Project Dashboards.pdfKarya Keeper
Project management is a crucial aspect of any organization, ensuring that projects are completed efficiently and effectively. One of the key tools used in project management is the project dashboard, which provides a comprehensive view of project progress and performance. In this article, we will explore the role of project dashboards in project management, highlighting their key features and benefits.
Consistent toolbox talks are critical for maintaining workplace safety, as they provide regular opportunities to address specific hazards and reinforce safe practices.
These brief, focused sessions ensure that safety is a continual conversation rather than a one-time event, which helps keep safety protocols fresh in employees' minds. Studies have shown that shorter, more frequent training sessions are more effective for retention and behavior change compared to longer, infrequent sessions.
Engaging workers regularly, toolbox talks promote a culture of safety, empower employees to voice concerns, and ultimately reduce the likelihood of accidents and injuries on site.
The traditional method of conducting safety talks with paper documents and lengthy meetings is not only time-consuming but also less effective. Manual tracking of attendance and compliance is prone to errors and inconsistencies, leading to gaps in safety communication and potential non-compliance with OSHA regulations. Switching to a digital solution like Safelyio offers significant advantages.
Safelyio automates the delivery and documentation of safety talks, ensuring consistency and accessibility. The microlearning approach breaks down complex safety protocols into manageable, bite-sized pieces, making it easier for employees to absorb and retain information.
This method minimizes disruptions to work schedules, eliminates the hassle of paperwork, and ensures that all safety communications are tracked and recorded accurately. Ultimately, using a digital platform like Safelyio enhances engagement, compliance, and overall safety performance on site. https://safelyio.com/
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsPeter Muessig
The UI5 tooling is the development and build tooling of UI5. It is built in a modular and extensible way so that it can be easily extended by your needs. This session will showcase various tooling extensions which can boost your development experience by far so that you can really work offline, transpile your code in your project to use even newer versions of EcmaScript (than 2022 which is supported right now by the UI5 tooling), consume any npm package of your choice in your project, using different kind of proxies, and even stitching UI5 projects during development together to mimic your target environment.
WWDC 2024 Keynote Review: For CocoaCoders AustinPatrick Weigel
Overview of WWDC 2024 Keynote Address.
Covers: Apple Intelligence, iOS18, macOS Sequoia, iPadOS, watchOS, visionOS, and Apple TV+.
Understandable dialogue on Apple TV+
On-device app controlling AI.
Access to ChatGPT with a guest appearance by Chief Data Thief Sam Altman!
App Locking! iPhone Mirroring! And a Calculator!!
Flutter is a popular open source, cross-platform framework developed by Google. In this webinar we'll explore Flutter and its architecture, delve into the Flutter Embedder and Flutter’s Dart language, discover how to leverage Flutter for embedded device development, learn about Automotive Grade Linux (AGL) and its consortium and understand the rationale behind AGL's choice of Flutter for next-gen IVI systems. Don’t miss this opportunity to discover whether Flutter is right for your project.
Liberarsi dai framework con i Web Component.pptxMassimo Artizzu
In Italian
Presentazione sulle feature e l'utilizzo dei Web Component nell sviluppo di pagine e applicazioni web. Racconto delle ragioni storiche dell'avvento dei Web Component. Evidenziazione dei vantaggi e delle sfide poste, indicazione delle best practices, con particolare accento sulla possibilità di usare web component per facilitare la migrazione delle proprie applicazioni verso nuovi stack tecnologici.
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfVALiNTRY360
Salesforce Healthcare CRM, implemented by VALiNTRY360, revolutionizes patient management by enhancing patient engagement, streamlining administrative processes, and improving care coordination. Its advanced analytics, robust security, and seamless integration with telehealth services ensure that healthcare providers can deliver personalized, efficient, and secure patient care. By automating routine tasks and providing actionable insights, Salesforce Healthcare CRM enables healthcare providers to focus on delivering high-quality care, leading to better patient outcomes and higher satisfaction. VALiNTRY360's expertise ensures a tailored solution that meets the unique needs of any healthcare practice, from small clinics to large hospital systems.
For more info visit us https://valintry360.com/solutions/health-life-sciences
8 Best Automated Android App Testing Tool and Framework in 2024.pdfkalichargn70th171
Regarding mobile operating systems, two major players dominate our thoughts: Android and iPhone. With Android leading the market, software development companies are focused on delivering apps compatible with this OS. Ensuring an app's functionality across various Android devices, OS versions, and hardware specifications is critical, making Android app testing essential.
UI5con 2024 - Bring Your Own Design SystemPeter Muessig
How do you combine the OpenUI5/SAPUI5 programming model with a design system that makes its controls available as Web Components? Since OpenUI5/SAPUI5 1.120, the framework supports the integration of any Web Components. This makes it possible, for example, to natively embed own Web Components of your design system which are created with Stencil. The integration embeds the Web Components in a way that they can be used naturally in XMLViews, like with standard UI5 controls, and can be bound with data binding. Learn how you can also make use of the Web Components base class in OpenUI5/SAPUI5 to also integrate your Web Components and get inspired by the solution to generate a custom UI5 library providing the Web Components control wrappers for the native ones.
2. IBM
Systems
What is cognitive computing?
IBM defines cognitive computing as
− Systems that learn at scale, reason with purpose and
interact with humans naturally
− Rather than being explicitly programmed, they learn and
reason from their interactions with us and from their
experiences with their environment
Cognitive computing is becoming popular not only in
traditional fields (e.g. computer vision, AI, image
searching), but also in more general fields such as EDA
− Wafer yield analysis
− Congestion prediction in Place and Route
Can we apply these techniques to make LSF “smarter” or
reduce “user error”?
3. IBM
Systems
When LSF meets Cognitive Era …
LSF produces huge amount of data which is not
only for the purpose of problem diagnosis or
restarting cluster
− Historical job records contain job resource
requirements and resource consuming
information
− Cluster performance monitoring data and system
configuration changing records
Cognitive technologies could make LSF smarter:
− Break the obstacles of mapping user domain
knowledge to resource requirements in LSF
− Automatically tune LSF cluster performance by
learning the best parameter configurations
− Intelligently predict job resource usage:
Memory Usage
Runtime
How much memory
does my job need?
LSF
Tell me other
information about
your job! I will
figure out your
memory
requirements!
5. IBM
Systems
Preliminary prediction verification using LSF customer data
Prediction targets
− Job maximum memory usage: the maximum memory consumed by a job
during its lifecycle in LSF
− Job runtime: the total running time of a job in LSF
Prediction algorithms
− Machine Learning algorithms
k-nearest neighbors algorithm (k-NN): find k-th nearest job records
to calculate the value for the job to be predicted
Support Vector Machine (SVM): “small sample” learning to avoid
high-dimension disaster
− Deep learning networks using MXNET and Caffe
Build the model by choosing proper hyper-parameters (e.g. number
of layers, neutrons)
Prediction method
− Use classification model to predict the range of maximum memory usage
− Use regression model to predict the continuous value of job runtimes
LSF Job events
collection
Feature extraction
Training processed
job features
Prediction using
trained models
6. IBM
Systems
Job Memory Prediction
Green: Average deviation ratio of user specified value
Blue: Average deviation ratio of predicted value
DeviationRatio
• For this client’s data set, the users are significantly
over reserving memory for “small” jobs.
• In this case, the prediction is more accurate than
the user specified values but there are still “errors”.
• This means we could potentially run more jobs on
these nodes.
7. IBM
Systems
Job Runtime Prediction For this client’s data set, the users
significantly over specify the expected
runtime for a job (probably just accepting
scripted/queue defaults).
This prediction gives very good results,
but again, there are still some errors.
This means we could potentially give
fairly accurate predictions on turnaround
time for a set of jobs and/or better backfill
scheduling.
8. IBM
Systems
Selecting the Model
There are many different Deep Learning frameworks MXNET,
Caffe, Tensor Flow, Torch etc
− Selecting the wrong model will give no useful results.
You also need the right “hyper parameters” to get good results.
− A poor choice of parameters will give a sub-optimal result.
Selection of the right model and parameters takes time and
effort.
− Within Spectrum Computing we have a related project to help
with automating the model and hyper-parameter selection and
training of the model
Caffe
MXNET
NOT convergent!!
Convergent but
not very good
Train
Test
9. IBM
Systems
Open Discussion
The prototype has shown promising results with sample client data.
We’re looking for your feedback and have packaged the prototype as a VM for you to try.
− It can be used in a passive or active mode for memory and runtime.
What kinds of job resource requirements are difficult for end users to specify for their
jobs?
What scenarios can use the prediction data in your cluster? Can the prediction errors be
tolerated?
Are there any other scenarios might utilize the predictions provided by cognitive computing
approaches?
10. IBM
Systems
If you are interested in the prototype: LSF Predictor VM
1. Configure and start VM image
2. Install data collect in LSF cluster to ingest historical data to predictor for model training
• (Passive mode) Run command to predict some of historical jobs, and open web browser to view reports for
the prediction accuracy evaluation
• (Active mode) Deploy esub script to LSF, and use the esub to replace user specified mem with predicted one
for new submitted jobs
Browse
r
13. IBM
Systems
Job runtime prediction (Cont’d)
Customer 2:
30k jobs for training model
2k jobs for prediction verification
Customer 3:
20k jobs for training model
2k jobs for prediction verification
Both two customers do not use job-level runtime
limits feature in LSF
16. IBM
Systems
Information and trademarks
IBM, the IBM logo, ibm.com, IBM System Storage, IBM Spectrum Storage, IBM Spectrum Control, IBM Spectrum Protect, IBM Spectrum Archive, IBM Spectrum Virtualize, IBM Spectrum Scale, IBM Spectrum Accelerate, Softlayer, and XIV are
trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at http://www.ibm.com/legal/copytrade.shtml
The following are trademarks or registered trademarks of other companies.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
IT Infrastructure Library is a Registered Trade Mark of AXELOS Limited.
Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom.
ITIL is a Registered Trade Mark of AXELOS Limited.
UNIX is a registered trademark of The Open Group in the United States and other countries.
* All other products may be trademarks or registered trademarks of their respective companies.
Notes:
Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations
such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements
equivalent to the performance ratios stated here.
All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance
characteristics will vary depending on individual customer configurations and conditions.
This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business
contact for information on the product or services available in your area.
All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. |
17. IBM
Systems
Special notices
This document was developed for IBM offerings in the United States as of the date of publication. IBM may not make these offerings available in other countries, and the information is
subject to change without notice. Consult your local IBM business contact for information on the IBM offerings available in your area.
Information in this document concerning non-IBM products was obtained from the suppliers of these products or other public sources. Questions on the capabilities of non-IBM products
should be addressed to the suppliers of those products.
IBM may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not give you any license to these patents. Send
license inquires, in writing, to IBM Director of Licensing, IBM Corporation, New Castle Drive, Armonk, NY 10504-1785 USA.
All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
The information contained in this document has not been submitted to any formal IBM test and is provided "AS IS" with no warranties or guarantees either expressed or implied.
All examples cited or described in this document are presented as illustrations of the manner in which some IBM products can be used and the results that may be achieved. Actual
environmental costs and performance characteristics will vary depending on individual client configurations and conditions.
IBM Global Financing offerings are provided through IBM Credit Corporation in the United States and other IBM subsidiaries and divisions worldwide to qualified commercial and
government clients. Rates are based on a client's credit rating, financing terms, offering type, equipment type and options, and may vary by country. Other restrictions may apply. Rates
and offerings are subject to change, extension or withdrawal without notice.
IBM is not responsible for printing errors in this document that result in pricing or information inaccuracies.
All prices shown are IBM's United States suggested list prices and are subject to change without notice; reseller prices may vary.
IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply.
Any performance data contained in this document was determined in a controlled environment. Actual results may vary significantly and are dependent on many factors including system
hardware configuration and software design and configuration. Some measurements quoted in this document may have been made on development-level systems. There is no
guarantee these measurements will be the same on generally-available systems. Some measurements quoted in this document may have been estimated through extrapolation. Users
of this document should verify the applicable data for their specific environment.
|