This document provides information about the Xen Summit event at Oracle from February 24-25, 2009. It summarizes that there were over 100 attendees from 8+ countries and 36+ companies. The event included presentations on topics like Xen roadmaps and releases, memory management techniques in Xen, network performance, security features, and power management. It also provides the agenda for the two day event listing the presentation topics.
This document provides a history and overview of Xen virtualization technology. It discusses how Xen originated from university research in 1999 and was released as open source in 2004. It gained widespread adoption by 2005. The document outlines Xen's goals of being the standard open source hypervisor and maintaining performance, stability, and security. It discusses the benefits of virtualization for server consolidation, manageability, deployment, and high availability. Finally, it covers topics like paravirtualization, hardware virtualization, network and device virtualization, security, and future directions like client and mobile virtualization and cloud computing.
Kemari is a virtual machine synchronization technique that allows fault tolerance by keeping a primary and secondary VM identical. It uses DomT, a para-virtualized domain, to efficiently synchronize state between VMs by tapping event channels and only transferring updated memory pages. Evaluation shows the secondary VM can continue transparently and with acceptable performance during network, storage and file I/O workloads when the primary hardware fails.
This document discusses VM snapshots, which allow capturing a consistent view of a virtual machine without pausing it. Snapshots are created using copy-on-write frames, where only frames that are dirtied after the snapshot are copied. This provides a lightweight mechanism for various purposes like VM introspection, checkpointing, rollback, and forking VMs. The implementation marks memory read-only and catches write faults to log dirty frames. Additional details are provided on the architecture using a library, FUSE driver, and kernel driver to take snapshots and access snapshot memory. Challenges around write-after-read, catching all writes, and buffer space are also covered.
This document summarizes research into detecting and correcting transient hardware errors. The researchers created lockstep virtual machines that execute identical workloads and compare outputs to detect errors. If outputs mismatch, the VMs replay from the last checkpoint. Checkpoints are taken periodically and compared; if unequal, one VM replays from the previous checkpoint. Initial tests showed small performance overhead from the lockstep execution and input/output checking. Future work involves implementing checkpoint/replay and improving performance and scalability.
This document discusses enabling NUMA support for Xen guests. It outlines the importance of NUMA awareness for performance, and describes how to construct the SRAT and SLIT tables to provide NUMA information to guests. It also covers guest NUMA configuration options like memory allocation strategies and considerations for live migration. The current status includes upstream host NUMA APIs and planned rebasing of patches, with next steps involving further performance analysis and supporting I/O and live migration across NUMA nodes.
This document summarizes a presentation given at the Xen Summit 2008 in Tokyo about challenges in managing large virtualized environments. The presentation discussed scaling a machine pool from 10 to 1,000 physical machines and how different challenges arise at each level, including hardware compatibility and automation. It also covered different types of virtual machines for servers, desktops, and labs and how to integrate them. Finally, it provided an overview of how Google uses Ganeti to manage its virtualized infrastructure by fully automating resource management across a large cluster of machines with varying hardware over time.
This document summarizes a Xen Summit that took place in Boston in 2008. It provides details on:
- The 160+ attendees from 12 countries and 14 universities
- The agenda which included talks on applications of Xen, virtualization techniques, and performance optimizations
- Social events like a lunch and evening party for attendees
- Logistical information for attendees on the wireless network, breakout rooms, and getting event t-shirts and USB drives
- The Xen project status and roadmap with details on recent and upcoming releases
The document summarizes the status of upstreaming Xen into the Linux kernel. Xen domain (domU) support has been stable for over a year in several distributions like Fedora and Debian. Work is ongoing to upstream dom0 support, which involves integrating features like APIC, ACPI, device mappings, and DMA/SWIOTLB handling. Performance optimizations have reduced paravirtualization overhead to 1-2%. Most core patches have been posted for review and the goal is to have core dom0 support merged for 2.6.30. Remaining work items include host suspend/resume and wider hardware testing.
This document provides a history and overview of Xen virtualization technology. It discusses how Xen originated from university research in 1999 and was released as open source in 2004. It gained widespread adoption by 2005. The document outlines Xen's goals of being the standard open source hypervisor and maintaining performance, stability, and security. It discusses the benefits of virtualization for server consolidation, manageability, deployment, and high availability. Finally, it covers topics like paravirtualization, hardware virtualization, network and device virtualization, security, and future directions like client and mobile virtualization and cloud computing.
Kemari is a virtual machine synchronization technique that allows fault tolerance by keeping a primary and secondary VM identical. It uses DomT, a para-virtualized domain, to efficiently synchronize state between VMs by tapping event channels and only transferring updated memory pages. Evaluation shows the secondary VM can continue transparently and with acceptable performance during network, storage and file I/O workloads when the primary hardware fails.
This document discusses VM snapshots, which allow capturing a consistent view of a virtual machine without pausing it. Snapshots are created using copy-on-write frames, where only frames that are dirtied after the snapshot are copied. This provides a lightweight mechanism for various purposes like VM introspection, checkpointing, rollback, and forking VMs. The implementation marks memory read-only and catches write faults to log dirty frames. Additional details are provided on the architecture using a library, FUSE driver, and kernel driver to take snapshots and access snapshot memory. Challenges around write-after-read, catching all writes, and buffer space are also covered.
This document summarizes research into detecting and correcting transient hardware errors. The researchers created lockstep virtual machines that execute identical workloads and compare outputs to detect errors. If outputs mismatch, the VMs replay from the last checkpoint. Checkpoints are taken periodically and compared; if unequal, one VM replays from the previous checkpoint. Initial tests showed small performance overhead from the lockstep execution and input/output checking. Future work involves implementing checkpoint/replay and improving performance and scalability.
This document discusses enabling NUMA support for Xen guests. It outlines the importance of NUMA awareness for performance, and describes how to construct the SRAT and SLIT tables to provide NUMA information to guests. It also covers guest NUMA configuration options like memory allocation strategies and considerations for live migration. The current status includes upstream host NUMA APIs and planned rebasing of patches, with next steps involving further performance analysis and supporting I/O and live migration across NUMA nodes.
This document summarizes a presentation given at the Xen Summit 2008 in Tokyo about challenges in managing large virtualized environments. The presentation discussed scaling a machine pool from 10 to 1,000 physical machines and how different challenges arise at each level, including hardware compatibility and automation. It also covered different types of virtual machines for servers, desktops, and labs and how to integrate them. Finally, it provided an overview of how Google uses Ganeti to manage its virtualized infrastructure by fully automating resource management across a large cluster of machines with varying hardware over time.
This document summarizes a Xen Summit that took place in Boston in 2008. It provides details on:
- The 160+ attendees from 12 countries and 14 universities
- The agenda which included talks on applications of Xen, virtualization techniques, and performance optimizations
- Social events like a lunch and evening party for attendees
- Logistical information for attendees on the wireless network, breakout rooms, and getting event t-shirts and USB drives
- The Xen project status and roadmap with details on recent and upcoming releases
The document summarizes the status of upstreaming Xen into the Linux kernel. Xen domain (domU) support has been stable for over a year in several distributions like Fedora and Debian. Work is ongoing to upstream dom0 support, which involves integrating features like APIC, ACPI, device mappings, and DMA/SWIOTLB handling. Performance optimizations have reduced paravirtualization overhead to 1-2%. Most core patches have been posted for review and the goal is to have core dom0 support merged for 2.6.30. Remaining work items include host suspend/resume and wider hardware testing.
The document discusses the history and capabilities of the Xen virtualization platform. It outlines how Xen has been adopted by many organizations and embedded in various hardware platforms. The document also explores how virtualization enables benefits like server consolidation, manageability, security and unlocking new hardware features. It discusses how Xen is powering large-scale cloud computing platforms and envisions virtualization becoming ubiquitous across all devices.
This document describes SIOEMU, a self-IO emulation technique that allows non-x86 operating systems like OpenVMS to run on Xen/ia64 virtual machines. It does so by having a firmware within the domain handle all IO emulation instead of relying on Qemu in the control domain. This makes the domains more flexible and improves performance by avoiding domain scheduling for IO operations. The firmware emulates devices like IDE and network interfaces to provide full system emulation. Initial results show it can run Linux and OpenVMS domains, but ongoing work is needed to support SMP, save/restore, and add support for devices like VGA.
1) The document discusses several services that have been developed in the virtualization plane, including Remus for transparent high availability, Parallax for virtual storage, and Tralfamadore for enhancing and understanding systems.
2) Tralfamadore continuously logs system execution over long periods, re-executes slices to generate indexes, and allows querying the history to search for specific events or states.
3) These services demonstrate how the virtualization plane provides opportunities to build low-level extensions that can improve areas like availability, storage, and debugging of software.
The document discusses the goals and roadmap of the Xen Project, an open source hypervisor. The Xen Project aims to build the industry standard hypervisor, maintain high performance, and support multiple CPU types from servers to clients to mobile phones. Virtualization provides benefits like server consolidation and increased manageability. Hardware advances like VT-x/AMD-V further reduce overhead allowing near-zero overhead virtualization. The roadmap includes improvements to security, scalability, client/mobile support, and research into areas like VM streaming and hardware fault tolerance.
This document summarizes a presentation on the Trusted Virtual Machine Infrastructure (TVMI) project. The project aims to develop a mechanism for uniquely identifying and authenticating virtual machines using virtual Trusted Platform Modules (vTPMs). This would allow virtual machines to be assigned strong cryptographic identities, enhancing security and manageability in environments that require tracking of information flow, such as virtual community networks.
The document discusses Xen, an open source hypervisor project. It provides a brief history of Xen starting in 2002. It describes Xen's key features including support for hardware virtualization, high performance, and security. The mission of the Xen Project is to establish the hypervisor as the industry standard and maintain performance and stability while supporting a wide range of systems. An advisory board oversees the project and community.
This document discusses network topology offloading using intelligent network interface cards (NICs). It proposes using a programmable network processor like the Netronome NFP3200 to implement complex network topologies in software and offload the data and control planes for network functions like switching, firewalls, and load balancing. Example topologies are presented to demonstrate how virtual machines could be connected using common network elements like switches implemented entirely in the network processor.
This document discusses IBM's proposal for an open-source library and tools to support the Open Virtualization Format (OVF) standard. It aims to provide complete support for creating, using, and maintaining OVF appliances. This will help establish OVF as the de-facto standard toolkit for working with virtual appliances and enable widespread adoption of OVF. Key areas of focus include providing primitive OVF support, adding environment support to allow appliances to be portable across hypervisors, and implementing guest and workload enlightenment. The project plans to use Python for initial development with the ability to optimize performance-critical components in C later on.
This document provides an overview of using the Xen management API with the Ruby programming language. It discusses how the API standardizes the data model and communication protocol. It then demonstrates how to use a Ruby gem to interface with the API, giving examples of accessing virtual machines, calling methods on them, and using the API to perform operations equivalent to "xm create".
Xen Project is an open source hypervisor that was started in 2002 and has since become the standard used in many large virtualization deployments. It supports x86, IA64 and ARM architectures and has over 50 company and 20 university contributors. Xen allows for improved security, availability, reliability and efficient use of resources. It is used widely in cloud, enterprise and embedded applications. Future projects focus on areas like fault tolerance, client virtualization and cloud services.
Solaris Fault Management Architecture (FMA) provides fault diagnosis and recovery for hardware errors. To implement FMA in a virtualized environment with Xen, changes were made to both Xen and Solaris. Xen was changed to collect error telemetry, allow fault injection for testing, and expose CPU information through hypercalls. Solaris was modified to use abstraction layers and fall back to normal interrupts if MSI is unavailable. The FMA integration with Xen has been tested and can now take CPUs offline, with future work planned on bringing CPUs back online and other recovery actions.
1) JustRunIt is an experiment-based infrastructure for managing virtualized data centers that uses VM cloning and workload replay to conduct management experiments in a sandbox.
2) Case studies show JustRunIt can determine optimal resource allocations to meet performance targets with minimal resources, outperforming highly accurate modeling.
3) JustRunIt can also evaluate hardware upgrades by running experiments on upgraded sandbox hardware.
Linux Foundation Collaboration Summit 13 :10 years of Xen and BeyondThe Linux Foundation
In 2013, the Xen Hypervisor will be 10 years old: when Xen was designed, we anticipated a world, which now is known as cloud computing. Today, Xen powers the largest clouds in production and is the basis for several commercial virtualization products. In this talk we will give on overview of Xen and related projects, cover hot developments in the Xen community and outline what comes next.
The talk is intended for users and developers that are familiar with virtualization: no deep knowledge is required. We will start with an architectural overview and cover topics such as: Xen and Linux, how to secure your cloud using disaggregation, SELinux and XSM/FLASK, the evolution of Paravirtualization, Xen on ARM and common challenges for open source hypervisors. We will explore the potential of Open Mirage for testing hypervisors. The talk will conclude with an outlook to the future of Xen.
The document discusses two novel applications of the Xen virtualization platform: CYDEST, a virtual training environment for cyber defense, and EXAMIN, a malware testing environment. CYDEST allows trainees to interact with multiple virtual machines through a web-based management interface and automated assessment. EXAMIN aims to provide a testing platform for analyzing malware through a virtual network of Linux and Windows machines that can be configured and monitored. Both projects utilize Xen's virtualization capabilities while seeking to address challenges around guest isolation, documentation of changing APIs, and management interfaces.
This document discusses enhancing application security within virtual machines. It proposes controlling system calls from outside of target VMs to confine application behaviors. It also proposes controlling memory and file operations related to target applications using a virtual machine monitor and control VM to prevent non-target programs from leaking or tampering with target application data. The goal is to bridge the semantic gap between what a VMM can observe at the hardware level and what security systems require at the application level to enforce security policies.
This document discusses the history and development of the Xen hypervisor project. It provides an overview of how paravirtualization and hardware-assisted virtualization have improved performance. It also examines how virtualization benefits security through policy enforcement and workload isolation. Network and memory management virtualization techniques are described that improve performance for virtual machines.
Citrix leverages the open source Xen hypervisor as the core virtualization engine for its XenServer product. While XenServer and open source Xen share the Xen hypervisor, XenServer offers additional tested and polished features designed for production use. XenServer is easier to use than open source Xen due to rigorous testing, optimization, and the inclusion of 75% proprietary code. XenServer provides an enterprise-grade virtualization platform with high availability, disaster recovery, workload visibility, and dynamic provisioning capabilities.
How to Optimize Microsoft Hyper-V Failover Cluster and Double PerformanceStarWind Software
High availability in a virtualized workload may require to sacrifice failover cluster performance. Using an optimized for virtualization approach on data storage and virtual machines placement and protection will give you desired boost of performance.
The presentation shows how to:
- Achieve true Hyper-V cluster high availability with just 2 Hyper-V hosts and zero storage hardware
- Boost Hyper-V cluster performance by configuring automatic dynamic optimization
- Effectively track VMs resources usage
- Save an extra 30% of Hyper-V cluster resources by utilizing agentless antivirus
VMware ESXi is a free bare-metal hypervisor that can be used to virtualize laptops. It has low resource usage which allows laptops to run virtual machines all day without overheating. The document provides instructions for installing ESXi on laptops and ensuring the network drivers are correctly configured by replacing the OEM file. Examples are given of running ESXi on different laptops and using it to virtualize an OpenSolaris environment.
Advanced performance troubleshooting using esxtopAlan Renouf
This document discusses using esxtop and resxtop tools to troubleshoot performance issues on VMware ESXi hosts. It provides 10 key things to know about esxtop counters and how they work. It then gives examples of using esxtop to troubleshoot common problems like CPU contention, memory issues, network throughput problems, and disk I/O latency. It also lists some other diagnostic tools that can be used along with esxtop.
This document summarizes a presentation on transcendent memory (tmem) on the Xen virtual machine monitor. Tmem aims to more efficiently manage physical memory across virtual machines by collecting unused and wasted guest memory into a shared pool. The presentation provides background on challenges with memory management in operating systems and virtual machines. It gives an overview of tmem, including different subpool types and recent progress integrating it with Linux guests. Performance results are shown comparing self-ballooning alone versus using tmem with and without deduplication and compression enabled.
The document discusses the history and capabilities of the Xen virtualization platform. It outlines how Xen has been adopted by many organizations and embedded in various hardware platforms. The document also explores how virtualization enables benefits like server consolidation, manageability, security and unlocking new hardware features. It discusses how Xen is powering large-scale cloud computing platforms and envisions virtualization becoming ubiquitous across all devices.
This document describes SIOEMU, a self-IO emulation technique that allows non-x86 operating systems like OpenVMS to run on Xen/ia64 virtual machines. It does so by having a firmware within the domain handle all IO emulation instead of relying on Qemu in the control domain. This makes the domains more flexible and improves performance by avoiding domain scheduling for IO operations. The firmware emulates devices like IDE and network interfaces to provide full system emulation. Initial results show it can run Linux and OpenVMS domains, but ongoing work is needed to support SMP, save/restore, and add support for devices like VGA.
1) The document discusses several services that have been developed in the virtualization plane, including Remus for transparent high availability, Parallax for virtual storage, and Tralfamadore for enhancing and understanding systems.
2) Tralfamadore continuously logs system execution over long periods, re-executes slices to generate indexes, and allows querying the history to search for specific events or states.
3) These services demonstrate how the virtualization plane provides opportunities to build low-level extensions that can improve areas like availability, storage, and debugging of software.
The document discusses the goals and roadmap of the Xen Project, an open source hypervisor. The Xen Project aims to build the industry standard hypervisor, maintain high performance, and support multiple CPU types from servers to clients to mobile phones. Virtualization provides benefits like server consolidation and increased manageability. Hardware advances like VT-x/AMD-V further reduce overhead allowing near-zero overhead virtualization. The roadmap includes improvements to security, scalability, client/mobile support, and research into areas like VM streaming and hardware fault tolerance.
This document summarizes a presentation on the Trusted Virtual Machine Infrastructure (TVMI) project. The project aims to develop a mechanism for uniquely identifying and authenticating virtual machines using virtual Trusted Platform Modules (vTPMs). This would allow virtual machines to be assigned strong cryptographic identities, enhancing security and manageability in environments that require tracking of information flow, such as virtual community networks.
The document discusses Xen, an open source hypervisor project. It provides a brief history of Xen starting in 2002. It describes Xen's key features including support for hardware virtualization, high performance, and security. The mission of the Xen Project is to establish the hypervisor as the industry standard and maintain performance and stability while supporting a wide range of systems. An advisory board oversees the project and community.
This document discusses network topology offloading using intelligent network interface cards (NICs). It proposes using a programmable network processor like the Netronome NFP3200 to implement complex network topologies in software and offload the data and control planes for network functions like switching, firewalls, and load balancing. Example topologies are presented to demonstrate how virtual machines could be connected using common network elements like switches implemented entirely in the network processor.
This document discusses IBM's proposal for an open-source library and tools to support the Open Virtualization Format (OVF) standard. It aims to provide complete support for creating, using, and maintaining OVF appliances. This will help establish OVF as the de-facto standard toolkit for working with virtual appliances and enable widespread adoption of OVF. Key areas of focus include providing primitive OVF support, adding environment support to allow appliances to be portable across hypervisors, and implementing guest and workload enlightenment. The project plans to use Python for initial development with the ability to optimize performance-critical components in C later on.
This document provides an overview of using the Xen management API with the Ruby programming language. It discusses how the API standardizes the data model and communication protocol. It then demonstrates how to use a Ruby gem to interface with the API, giving examples of accessing virtual machines, calling methods on them, and using the API to perform operations equivalent to "xm create".
Xen Project is an open source hypervisor that was started in 2002 and has since become the standard used in many large virtualization deployments. It supports x86, IA64 and ARM architectures and has over 50 company and 20 university contributors. Xen allows for improved security, availability, reliability and efficient use of resources. It is used widely in cloud, enterprise and embedded applications. Future projects focus on areas like fault tolerance, client virtualization and cloud services.
Solaris Fault Management Architecture (FMA) provides fault diagnosis and recovery for hardware errors. To implement FMA in a virtualized environment with Xen, changes were made to both Xen and Solaris. Xen was changed to collect error telemetry, allow fault injection for testing, and expose CPU information through hypercalls. Solaris was modified to use abstraction layers and fall back to normal interrupts if MSI is unavailable. The FMA integration with Xen has been tested and can now take CPUs offline, with future work planned on bringing CPUs back online and other recovery actions.
1) JustRunIt is an experiment-based infrastructure for managing virtualized data centers that uses VM cloning and workload replay to conduct management experiments in a sandbox.
2) Case studies show JustRunIt can determine optimal resource allocations to meet performance targets with minimal resources, outperforming highly accurate modeling.
3) JustRunIt can also evaluate hardware upgrades by running experiments on upgraded sandbox hardware.
Linux Foundation Collaboration Summit 13 :10 years of Xen and BeyondThe Linux Foundation
In 2013, the Xen Hypervisor will be 10 years old: when Xen was designed, we anticipated a world, which now is known as cloud computing. Today, Xen powers the largest clouds in production and is the basis for several commercial virtualization products. In this talk we will give on overview of Xen and related projects, cover hot developments in the Xen community and outline what comes next.
The talk is intended for users and developers that are familiar with virtualization: no deep knowledge is required. We will start with an architectural overview and cover topics such as: Xen and Linux, how to secure your cloud using disaggregation, SELinux and XSM/FLASK, the evolution of Paravirtualization, Xen on ARM and common challenges for open source hypervisors. We will explore the potential of Open Mirage for testing hypervisors. The talk will conclude with an outlook to the future of Xen.
The document discusses two novel applications of the Xen virtualization platform: CYDEST, a virtual training environment for cyber defense, and EXAMIN, a malware testing environment. CYDEST allows trainees to interact with multiple virtual machines through a web-based management interface and automated assessment. EXAMIN aims to provide a testing platform for analyzing malware through a virtual network of Linux and Windows machines that can be configured and monitored. Both projects utilize Xen's virtualization capabilities while seeking to address challenges around guest isolation, documentation of changing APIs, and management interfaces.
This document discusses enhancing application security within virtual machines. It proposes controlling system calls from outside of target VMs to confine application behaviors. It also proposes controlling memory and file operations related to target applications using a virtual machine monitor and control VM to prevent non-target programs from leaking or tampering with target application data. The goal is to bridge the semantic gap between what a VMM can observe at the hardware level and what security systems require at the application level to enforce security policies.
This document discusses the history and development of the Xen hypervisor project. It provides an overview of how paravirtualization and hardware-assisted virtualization have improved performance. It also examines how virtualization benefits security through policy enforcement and workload isolation. Network and memory management virtualization techniques are described that improve performance for virtual machines.
Citrix leverages the open source Xen hypervisor as the core virtualization engine for its XenServer product. While XenServer and open source Xen share the Xen hypervisor, XenServer offers additional tested and polished features designed for production use. XenServer is easier to use than open source Xen due to rigorous testing, optimization, and the inclusion of 75% proprietary code. XenServer provides an enterprise-grade virtualization platform with high availability, disaster recovery, workload visibility, and dynamic provisioning capabilities.
How to Optimize Microsoft Hyper-V Failover Cluster and Double PerformanceStarWind Software
High availability in a virtualized workload may require to sacrifice failover cluster performance. Using an optimized for virtualization approach on data storage and virtual machines placement and protection will give you desired boost of performance.
The presentation shows how to:
- Achieve true Hyper-V cluster high availability with just 2 Hyper-V hosts and zero storage hardware
- Boost Hyper-V cluster performance by configuring automatic dynamic optimization
- Effectively track VMs resources usage
- Save an extra 30% of Hyper-V cluster resources by utilizing agentless antivirus
VMware ESXi is a free bare-metal hypervisor that can be used to virtualize laptops. It has low resource usage which allows laptops to run virtual machines all day without overheating. The document provides instructions for installing ESXi on laptops and ensuring the network drivers are correctly configured by replacing the OEM file. Examples are given of running ESXi on different laptops and using it to virtualize an OpenSolaris environment.
Advanced performance troubleshooting using esxtopAlan Renouf
This document discusses using esxtop and resxtop tools to troubleshoot performance issues on VMware ESXi hosts. It provides 10 key things to know about esxtop counters and how they work. It then gives examples of using esxtop to troubleshoot common problems like CPU contention, memory issues, network throughput problems, and disk I/O latency. It also lists some other diagnostic tools that can be used along with esxtop.
This document summarizes a presentation on transcendent memory (tmem) on the Xen virtual machine monitor. Tmem aims to more efficiently manage physical memory across virtual machines by collecting unused and wasted guest memory into a shared pool. The presentation provides background on challenges with memory management in operating systems and virtual machines. It gives an overview of tmem, including different subpool types and recent progress integrating it with Linux guests. Performance results are shown comparing self-ballooning alone versus using tmem with and without deduplication and compression enabled.
This document discusses moving backend drivers from the Dom0 domain to a separate HVM driver domain in Xen. Testing showed the HVM driver domain provided better network performance than the PV backend domain, with lower CPU utilization. Issues were discussed around booting the system without physical device drivers in Dom0, requiring the HVM driver domain to run devices and provide networking/storage. Further analysis of EPT page flipping performance was suggested.
OWF: Xen Project - Moving a commercial open source project to an open source ...The Linux Foundation
In April this year, Xen became a Linux Foundation Collaborative Project. 6 months later it is time to take stock. I will start with a brief introduction of the Xen Project, explain the key challenges the project had under Citrix' stewardship, explain why Xen moved to the Linux Foundation, explore the challenges and considerations when choosing an open source foundation and explore the impact on the Xen community to date. The talk will centre around the core question of whether open source foundations provide a better collaboration platform for open source projects than corporate stewardship. The answer - at least for the Xen project - is clearly yes. However, following this route has its own challenges, trade-offs and risks.
Traditionally Linux has always run on Xen either as a pure PV guest or as a virtualization unaware guest in an HVM domain. Recently, under the name of "PV on HVM", a series of works has been done to make Linux aware that is running on Xen and enable as many PV interfaces as possible even when running in an HVM container. After enabling the basic PV network and disk drivers, some other more interesting optimizations were implemented: in particular remapping legacy interrupts and MSIs onto event channels. This talk will explain the idea behind the feature, the reason why avoiding interactions with the lapic is a good, and some implementation details.
In this talk, John will explore the technology and architecture introduced in the ARM Cortex-A15 processor in support of virtualization. This is the first of multiple processors from ARM that will support true virtualization, and the ability to host existing operating systems binaries without modification. The hardware extensions were defined following careful analysis to address the key virtualization performance limitations of today's solutions while bringing new technologies to the device to better support a virtualized system.
This document provides an overview of the Xen Summit agenda and Xen community updates. The first day of the Xen Summit agenda focuses on welcome presentations and case studies on using Xen Cloud Platform and XCP. It also covers topics like AMD and virtualization, energy efficient storage, and the Xen scheduler. The second day covers sessions on GoGrid, open source cloud computing, embedded workloads, and graphics passthrough challenges. It also provides an update on Xen community events and the Xen Advisory Board. Finally, it discusses the Xen Cloud Platform project and goals to create a full virtual infrastructure layer for cloud deployments.
XenServer 6.0 provides improved performance, scalability, and ease of use. Key enhancements include support for 16 vCPUs and 128GB RAM per VM, 1TB physical RAM, rolling pool upgrades, and simplified installation. It also features high availability, live migration, disaster recovery with storage replication, and support for SCVMM and SCOM management. XenServer is optimized for XenDesktop deployments with features like IntelliCache for storage optimization and GPU pass-through for 3D graphics.
This document provides an overview of virtualization using the open source Xen hypervisor. It discusses the history and community around Xen, what virtualization is, the benefits of virtualization and why Xen was selected. It also explains how Xen works and the various Xen projects and solutions, such as the Xen hypervisor, Xen Cloud Platform, Xen Client Initiative and Hosted Xen.
This document summarizes the history and development of the Xen virtualization project. It discusses how Xen addressed the issues with server sprawl and lack of isolation in early operating systems. It describes the benefits of server consolidation and manageability that virtualization provided. It also outlines the different approaches Xen took to virtualizing memory management and network interfaces to improve performance.
Oscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCPThe Linux Foundation
Here are some common existing deployment methods for virtual machines:
- Manual installation from ISO - Booting a virtual machine from an installation ISO and manually installing an operating system through the graphical user interface. Good for one-off deployments but not scalable.
- Scripted installation - Using scripts to automate the installation process. Better than manual but still requires customizing for each new virtual machine.
- Templates - Creating a "golden image" template virtual machine with a pre-installed and configured operating system. New virtual machines can be quickly deployed by cloning the template. Allows consistent deployments but still requires customizing each template.
- Configuration management - Using configuration management tools like Puppet, Chef, Ansible to declar
This document summarizes a study comparing the open source hypervisors Xen and KVM. It finds that Xen performs slightly better than KVM for CPU-intensive and kernel compile tests, while KVM performs better for I/O tests due to disk caching. For performance isolation, both hypervisors show good isolation of stressed VMs from normal VMs, except Xen has little isolation for network traffic while KVM has issues with disk and network receiver tests. Scalability tests show Xen scales well with additional VMs, while KVM performance degrades and VMs crash with more than 4 VMs.
Hypervisors are becoming more and more widespread in embedded environments, from automotive to medical and avionics. Their use case is different from traditional server and desktop virtualization, and so are their requirements. This talk will explain why hypervisors are used in embedded, and the unique challenges posed by these environments to virtualization technologies.
Xen, a popular open source hypervisor, was born to virtualize x86 Linux systems for the data center. It is now the leading open source hypervisor for ARM embedded platforms. The presentation will show how the ARM port of Xen differs from its x86 counterpart. It will go through the fundamental design decisions that made Xen a good choice for ARM embedded virtualization. The talk will explain the implementation of key features such as device assignment and interrupt virtualization.
Xen is a virtual machine monitor that allows multiple operating systems to run concurrently on a single physical machine. It uses paravirtualization rather than full virtualization to improve performance. Xen provides performance isolation between guest operating systems and can host different operating systems with only small modifications required. Evaluation shows Xen achieves near native performance for guest operating systems and provides strong performance isolation even under malicious workloads. Future work aims to improve memory performance and support additional guest operating systems like Windows.
XenClient provides desktop virtualization for corporate laptops, allowing IT control while providing flexibility for users. New features since RC1/RC2 include support for Windows 7 64-bit, improved USB device support, enhanced usability, and disk encryption for deployed VMs. The Synchronizer now supports dynamic image layers to reduce backup sizes and simplify updating base VM images.
Todd Deshane presented results from benchmarking tests of Xen and KVM virtualization systems at the 2008 Xen Summit. Key findings included Xen having similar or better CPU performance than KVM, but KVM outperforming Xen on some disk and network tests. Tests of performance isolation showed Xen was generally more isolated, while KVM scaling failed as guest numbers increased beyond 4. Areas for further work were identified, such as expanding tests and automating processes.
XPDDS18: Performance tuning on Xen platform - Bo Zhang & Yifei Jiang, HuaweiThe Linux Foundation
Huawei Cloud applies xen platform to many customer scenarios. This talk will introduce our optimizations on the xen platform to solve problems occuring in these scenarios.
E.g
1. Redesign the implementation of kernel locks to improve the scalability of the Xen platform in large-scale server scenarios.
2. Develop LazyFPU and L3 cache affinity features to improve virtual machine performance in SAP HANA database service scenarios.
3. Develop HostNUMA and GuestNUMA features to enhance virtual machine performance in specvirt test and desktop cloud scenarios.
4. Shorten the time cost of concurrent life-cycle operations for large scales of virtual machines, to achieve quick change of classes in the cloud classroom.
Crash Course in Open Source Cloud ComputingMark Hinkle
The document provides an overview of open source tools for building and managing cloud computing infrastructure. It discusses popular open source cloud computing platforms like OpenStack, CloudStack, and Eucalyptus. It also summarizes open source virtualization technologies, virtual machine formats, public cloud services, cloud storage options, APIs for cloud portability, and automation and management tools. The document is intended to help readers get a crash course in using open source for cloud computing.
The document discusses the Xen virtualization system. It begins by outlining the goals of Xen, which include running on commodity x86 hardware and operating systems without performance or functionality sacrifices, while allowing up to 100 virtual machine instances per server. It then describes Xen's design, which uses a thin hypervisor and paravirtualization to multiplex physical resources between guest operating systems. The document evaluates Xen's performance, finding it imposes small overhead and provides good isolation between virtual machines. It concludes that Xen is a promising virtualization platform and its development is ongoing.
The document discusses the server virtualization market opportunity and Citrix's XenServer 5.0 product. It notes the three main players in the virtualization market are VMware, Microsoft, and Citrix. XenServer 5.0 offers virtualization for every server in the enterprise at low cost and with features including high availability, disaster recovery, and dynamic workload streaming.
We present initial results from and quantitative analysis of two leading open source hypervisors, Xen and KVM. This study focuses on the overall performance, performance isolation, and scalability of virtual machines running on these hypervisors. Our comparison was carried out using a benchmark suite that we developed to make the results easily repeatable. Our goals are to understand how the different architectural decisions taken by different hypervisor developers affect the resulting hypervisors, to help hypervisor developers realize areas of improvement for their hypervisors, and to help users make informed decisions
about their choice of hypervisor.
The document discusses using virtualization with Xen in a real world environment. It describes how virtualization was used at Newtec to consolidate servers, test configurations, and build dynamic development environments. Some key benefits realized were reduced hardware costs through consolidation, the ability to test at large scale without dedicated hardware, and automating the deployment of virtual machines. It also discusses lessons learned around only virtualizing what is needed and ensuring simplicity to maximize availability.
Xen.org Project Updates discusses recent developments in several Xen projects:
PVOPS has added Dom0 support to Linux 3.0 and ongoing work in 3.1 including new modules. Planned work includes features like HW clock support and 3D graphics.
Xen 4.1 was recently released with large system support up to 4TB and 255 CPUs. Security enhancements include CPU pools and memory introspection.
The XCP project aims to make the XenAPI toolstack independent of distributions and deliverable via common package managers. This would allow XCP to become the Xen community platform.
The Xen ARM project has supported ARM architectures since 2004. Current work focuses on Cortex-A15
This document summarizes Bobby Curtis' presentation on using Oracle VirtualBox. It introduces VirtualBox as free cross-platform virtualization software. It outlines the requirements for running VirtualBox, describes common use cases like application development and testing disaster recovery scenarios. It provides instructions for downloading, installing, and configuring VirtualBox, accessing virtual machines, and tips for optimizing performance. The presentation also describes how to participate in the RAC Attack workshop for building a multi-node RAC cluster on a laptop using VirtualBox.
Static partitioning is used to split an embedded system into multiple domains, each of them having access only to a portion of the hardware on the SoC. It is key to enable mixed-criticality scenarios, where a critical application, often based on a small RTOS, runs alongside a larger non-critical app, typically based on Linux. The two domains cannot interfere with each other.
This talk will explain how to use Xen for static partitioning. It will introduce dom0-less, a new Xen feature written for the purpose. Dom0-less allows multiple VMs to start at boot time directly from the Xen hypervisor, decreasing boot times drastically. It makes it very easy to partition the system without virtualization overhead. Dom0 becomes unnecessary.
This presentation will go into details on how to setup a Xen dom0-less system. It will show configuration examples and explain device assignment. The talk will discuss its implications for latency-sensitive and safety-critical environments.
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
Daniel Smith discusses TrenchBoot, a project aiming to establish a unified approach to harnessing boot integrity technologies across open source platforms. TrenchBoot will enable establishing hardware-rooted integrity during platform boot (first launch inspection), runtime (runtime inspection), and other states. For runtime inspection, TrenchBoot will develop a way to securely re-establish the integrity of Xen at any time without rebooting by dynamically launching an integrity kernel to inspect and verify Xen. The talk outlines the initial and future work of TrenchBoot to integrate these capabilities with Linux, Xen and other open source projects.
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...The Linux Foundation
Artem will briefly cover what has been done since the first talk on Xen in Automotive domain back in 2013, what is going on now and what is still missing for broad adaptation of Xen in vehicles. The following topics will be covered:
Embedded/automotive features of Xen
Collaboration with AGL and GENIVI organizations for standardization
Efforts on Functional Safety compliance
Artem will also go over typical automotive use scenarios for Xen which may not be the same as generic computing use of hypervisor.
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...The Linux Foundation
In this keynote talk, we will give an overview of the state of the Xen Project, trends that impact the project, see whether challenges that surfaced last year have been addressed and how we did it, and highlight new challenges and solutions for the coming year.
In recent years unikernels have shown immense performance potential (e.g., boot times of only a few ms, image sizes of only hundreds of KBs).The fundamental drawback of unikernels is that they require that applications be manually ported to the underlying minimalistic OS, needing both expert work and often considerable amount of time.
The Unikraft project provides a unikernel code base and build system that significantly simplifies the building of unikernels. In addition to support for a number CPU architectures, languages and frameworks, Unikraft provides debugging and tracing features that are generally sorely missing from unikernel projects. In this talk we will talk about these features, show a set of preliminary performance numbers, and provide a roadmap for the project's future.
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...The Linux Foundation
The idea of making Xen secret-free has been floating since Spectre and Meltdown came into light. In this talk we will discuss what is being done and what needs to be done next.
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxThe Linux Foundation
This talk will introduce Dom0-less: a new way of using Xen to build mixed-criticality solutions. Dom0-less is a Xen feature that adds a novel approach to static partitioning based on virtualization. It allows multiple domains to start at boot time directly from the Xen hypervisor, decreasing boot times dramatically. Xen userspace tools, such as xl and libvirt, become optional.
Dom0-less extends the existing device tree based Xen boot protocol to cover information required by additional domains. Binaries, such as kernels and ramdisks, are loaded by the bootloader (u-boot) and advertised to Xen via new device tree bindings.
The audience will learn how to use Dom0-less to partition the system. Uboot and device tree configuration details will be explained to enable the audience to get the most out of this feature. The talk will include a status update and details on future plans.
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...The Linux Foundation
As the number of contributions grow, reviewer bandwidth becomes a bottleneck; and maintainers are always asking for more help. However, ultimately maintainers must at least Ack every patch that goes in; so if you're not a maintainer, how can you contribute? Why should anyone care about your opinion?
This talk will try to lay out some advice and guidelines for non-maintainers, for how they can do code review in a way which will effectively reduce the load on maintainers when they do come to review a patch.
This talk is a follow-up to our Summit 2017 presentation in which we covered our plans for Intel VMFUNC and #VE, as well as related use-cases. This year, we will provide a report on what we have accomplished in Xen 4.12, and what remains to be addressed. We will also give a brief status update of VMI on AMD hardware. The session will end with some real-world numbers of the Hypervisor Introspection solution running on Citrix Hypervisor 8.0 with #VE enabled.
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. Besides technical and compliance issues (such as ISO 26262 vs IEC 611508) transitioning an existing project to become more easily safety certifiable requires significant changes to development practices within an open source project.
In this session, we will lay out some challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the Xen Project has followed thus far and highlight lessons learned along the way. The talk will primarily focus on necessary process, tooling changes and community challenges that can prevent progress. We will be offering an in-depth review of how Xen Project is approaching this challenging goal and try to derive lessons for other projects and contributors.
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
This document summarizes a discussion around enabling functional safety certification for the Xen open source hypervisor project. Key points discussed include:
- Establishing a split development model with open and closed parts to balance community needs and safety requirements.
- Developing reference implementations and stacks supported by multiple vendors to demonstrate safety certification feasibility.
- Creating plans and processes around requirements, documentation, verification testing, and tooling integration to begin filling gaps for certification.
- Addressing challenges around funding, resources, expertise, and maintaining contributions to ensure any initial work is sustainable long-term.
- Taking an iterative, agile approach to make early progress while further securing necessary funding and support from interested parties.
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixThe Linux Foundation
2018 saw fundamental shifts in security boundaries which were previously taken for granted. A lot of work has been done in the past 2 years, and largely in secret under embargo, but there is plenty more work to be done to strengthen the existing mitigations and to try to recover some performance without reopening security holes.
This talk will look at speculative execution sidechannels, the work which has already been done to mitigate the security holes, and future work which hopes to bring some improvements.
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdThe Linux Foundation
The Arm architecture provides a set of guidelines that any software should abide by when accessing the memory with MMU off and update page-tables. Failing to do so may result in getting TLB conflicts or breaking coherency.
In a previous talk ("Keeping coherency on Arm"), we focused on updating safely the stage-2 (aka P2M) page-tables. This talk will focus on the boot code and Xen memory management.
During this session, we will introduce some of the guidelines and when they should be used. We will also discuss how Xen boot sequence needs to be reworked to avoid breaking the guidelines.
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...The Linux Foundation
For many years the QEMU codebase has contained PV backends for Xen guests, giving them paravirtual access to storage, network, keyboard, mouse, etc. however these backends have not been configurable as QEMU devices as their implementation did not fully adhere to the QEMU Object Model (QOM).
Particularly the PV storage backend not using proper QOM devices, or qdevs, meant that the QEMU block layer needed to maintain legacy code that was cluttering up the source. This was causing push-back from the maintainers who did not want to accept any patches relating to that Xen backend until it was 'qdevified'.
In this talk, I'll explain the modifications I made to QEMU to achieve 'qdevification' of the PV storage backend, how compatibility with the libxl toolstack was maintained, and what the next steps in both QEMU and libxl development should be.
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DThe Linux Foundation
PCI is a local computer bus for attaching hardware devices in a computer, and is the main peripheral bus on modern x86 systems. As such, having a proper way to emulate it is crucial for Xen to be able to expose both fully emulated devices or passthrough devices to guests.
This talk will focus on the current status of PCI emulation in Xen, how and where it is used, what are its main limitations and future plans to improve it in order to be more robust and modular.
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsThe Linux Foundation
Volodymyr will speak about TEE mediators. This is a new feature in Xen which allows multiple virtual machines to interact with Trusted Execution Environment available on platform. He developed mediator for one of TEEs, namely OP-TEE.
He will give background information on why TEE is needed at all and share some implementation details.
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...The Linux Foundation
Xen is a very powerful hypervisor with a talented and diverse developers community. Despite the fact it's almost everywhere (from the Cloud to the embedded world), it can be difficult to set up and manage as a system administrator. General purpose distros have Xen packages, but that's just a start in your Xen journey: you need some tooling and knowledge to have a working and scalable platform.
XCP-ng was built to overcome those issues: by bringing Xen to the masses with a fully turnkey distro with Xen as its core. It's the logical sequel to the XCP project, with a community focus from the start. We'll see how it happened, what we did, and what's next. Finally, we'll see the impact of XCP-ng on the Xen Project.
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...The Linux Foundation
Doug has long advocated for more CI/CD (Continuous Integration / Continuous Delivery) processes to be adopted by the Xen Project from the use of Travis CI and now GitLab CI. This talk aims to propose ideas for building upon the existing process and transforming the development process to provide users a higher quality with each release by the Xen Project.
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...The Linux Foundation
High level toolstacks for server and cloud virtualization are very mature with large communities using and supporting them. Client virtualization is a much more niche community with unique requirements when compared to those found in the server space. In this talk, we’ll introduce a client virtualization toolstack for Xen (redctl) that we are using in Redfield, a new open-source client virtualization distribution that builds upon the work done by the greater virtualization and Linux communities. We will present a case for maturing libxl’s Go bindings and discuss what advantages Go has to offer for high level toolstacks, including in the server space.
Today Xen is scheduling guest virtual cpus on all available physical cpus independently from each other. Recent security issues on modern processors (e.g. L1TF) require to turn off hyperthreading for best security in order to avoid leaking information from one hyperthread to the other. One way to avoid having to turn off hyperthreading is to only ever schedule virtual cpus of the same guest on one physical core at the same time. This is called core scheduling.
This presentation shows results from the effort to implement core scheduling in the Xen hypervisor. The basic modifications in Xen are presented and performance numbers with core scheduling active are shown.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
1. Welcome & Project Update
Ian Pratt
Keir Fraser
Xen Summit at Oracle Feb 24-25, 2009
2. Attendee Profile
100+ Attendees
8+ Countries
36+ Companies
5+ Universities
Xen Summit at Oracle Feb 24-25, 2009
3. Program Committee
Dan Magenheimer – Oracle
Jose Renato Santos – HP
Jun Nakajima - Intel
John Janakiraman – Skytap
Alex Vasilevsky – Virtual Computer
Victor Hugo dos Santos
Sang-bum Suh - Samsung
Hitoshi Matsumoto - Fujitsu
Thanks for putting together a great event!
Xen Summit at Oracle Feb 24-25, 2009
4. Event Information
• Breakout Room Available During Event
• Room 105
• See handout for Wireless Setup
• Lunch – Provided for Registered Attendees
at Conference Center
• Abstracts & Speaker Profiles at
http://www.xen.org/community/xensummit.html
Xen Summit at Oracle Feb 24-25, 2009
5. Evening Event – Tuesday
6:30 pm – 9:30 pm
http://www.computerhistory.org/
• Dinner, Wine, Beer, and Sodas
• 2 Guides for Private Museum Tours
• Directions at Registration Table
• Sign-up Sheet for Carpooling
Xen Summit at Oracle Feb 24-25, 2009
6. Xen Summit Gear
Xen Summit Jackets
Carabiners for Event Pass
Xen Summit at Oracle Feb 24-25, 2009
7. Agenda Overview - Tuesday
9:30 – 10:00 am Welcome and Project Status
10:00 – 10:30 am Roadmap & Releases
10:50 – 11:10 am Difference Engine
11:10 – 11:40 am PVOPS Status
11:40 – 12:15 pm Transcendent Memory on Xen
1:15 - 1:45 pm Satori: Enlightened Page-Sharing
1:45 – 2:05 pm Paravirtualized USB Support
2:05 – 2:35 pm PCI-Pass Through Techniques
2:35 – 3:05 pm Status of SR-IOV & VT-D
3:30 – 4:00 pm Cross Vendor Migration
4:00 – 4:20 pm Power Management in Xen
4:20 – 4:40 pm Detecting and Correcting Transient Errors via Xen
Xen Summit at Oracle Feb 24-25, 2009
8. Agenda Overview - Wed
9:00 – 9:30 am Open Nebula VM Manager
9:30 – 10:00 am Client Virtualization Framework
10:00 – 10:30 am Tralfamadore
10:45 – 11:00 am VM Snapshots
11:00 – 11:30 am Real-time and VMM
11:30 – 12:00 Nested Page Tables
1:00 – 1:30 pm Project Zentific
1:30 – 2:00 pm Just Run It
2:00 – 2:30 pm 3D Rendering on Xen
2:30 – 3:00 pm REFLINK Operation in ocfs2
3:30 – 4:00 pm Achieving 10GB/s Paravirt Drivers
4:00 – 4:30 pm Xen Scalability
Xen Summit at Oracle Feb 24-25, 2009
10. Overview
• XenEmbedded
• XenClient
• HostedXen
• Xen Introspection API
Xen Summit at Oracle Feb 24-25, 2009
11. XenEmbedded
• Small footprint Xen environment
• For embedding into Servers, Desktops,
Laptops, Routers, Storage Arrays
• buildroot/busybox/uclibc based
• 8MB compressed image size
• xenvm/xenops embedded toolstack
• Simple configuration file
• Process per VM with control socket
• Fast booting
• See xenbits.xen.org/xenclient
Xen Summit at Oracle Feb 24-25, 2009
12. XenClient
• Repository for bleeding-edge client
related work, feeding in to xen-unstable
• Enhanced device pass-through
• Intel, ATI, nVidia graphics
• Power conservation and suspend
• ACPI/SMBIOS virtualization
• function keys, battery state, etc
• Secure mouse/keyboard routing
• Graphics virtualization
• Fast boot and measured launch
• Enhanced USB emulation
• “In-place P2V”, easy to install
Xen Summit at Oracle Feb 24-25, 2009
13. Hosted Xen
• Xen engine run as a kernel module to
enable hosted (type-2) VMM
• Runs on Windows and OSX today
• Enables Xen to also compete with other
type-2 VMMs
• KVM, VirtualBox, Parallels, VirtualPC,
VMWare Workstation/ACE/Fusion
• Looses the security and isolation
benefits of a true type-1 hypervisor, but
still useful in some scenarios
Xen Summit at Oracle Feb 24-25, 2009
14. Hosted Xen
• Xen loaded as an ELF module, linked
via dispatch table into host kernel
• Less than 1000 LOC to plumb Xen
module into Windows and OSX
• Leverages all of the great feature
development, optimization, broad
testing that's done on Xen
• Latest hardware support, SMP
guests, PV drivers etc
Xen Summit at Oracle Feb 24-25, 2009
15. Xen Introspection API
• API to enable monitoring and control of
VMs by a suitably privileged entity
• CPU, memory, disk, network, etc
• Enables Security, Forensics,
Debugging, System Management
• Georgia Tech Xen Access library
• Accessing memory, pagetable
walking
• Shadow/HAP enhancements for trap-on
access/write/execute
• UofAlaska/UC Davis VIX
Xen Summit at Oracle Feb 24-25, 2009
16. Observations
• Security is becoming increasingly
important in virtualization
• Xen as a true type-1 is well placed
• Must continue disaggregation and de-
privileging campaign
• Must continue to foster academic
research on and using Xen
• Community must help turn prototypes
into production code
Xen Summit at Oracle Feb 24-25, 2009
17. Xen Releases and Roadmap
Keir Fraser
02/25/09 17
Xen Summit at Oracle Feb 24-25, 2009
18. Release plans
Current stable releases: 3.2.3 and 3.3.1
Both released in early January
Next releases: 3.3.2 and 3.4.0
Both anticipated around Easter time
Ongoing strategy:
Maintain two stable branches until the later one
has matured enough for switchover
Quarterly releases from stable branches
Six to nine months between major releases
02/25/09
18
Xen Summit at Oracle Feb 24-25, 2009
19. Memory management
More efficient heap allocators
No separate ‘xenheap’
Better ‘malloc’
Populate-on-demand HVM guest memory
Boot an HVM guest with a big memory map
But no need to allocate it all up front
OS won’t use much memory during boot
And then balloon driver can claim large
swathes
02/25/09
19
Xen Summit at Oracle Feb 24-25, 2009
20. Page sharing
Potential for reducing memory pressure by sharing
identical pages across VMs
Significant savings in ‘ideal’ cases
Rather smaller gains in typical heterogeneous scenarios
(10-20%)
How to find identical pages?
Memory scanning vs. disc block tracking
Allows memory overcommit
Hence requires demand paging
Or don’t give spare pages directly back to guests
02/25/09 20
Xen Summit at Oracle Feb 24-25, 2009
21. Virtual block devices: blktap2
Support VHD storage format
Snapshot virtual disks
Checkpoints, backups, gold images, etc
Live coalescing of snapshots
Simplified kernel support
Leverage blkback
Simpler invocation model
More generic, easier test and debug
21
Xen Summit at Oracle Feb 24-25, 2009
22. Cross-hypervisor compatibility
Viridian interface
CPUID, hypercalls
Actually turn on just a few optimisations
And turn off some annoying checks
VHD format support
22
Xen Summit at Oracle Feb 24-25, 2009
23. High availability
Detect hardware failures
Hardware-based: Machine Check Architecture
Software-based: e.g., compare replicas
React appropriately…
CPU/memory offlining
Disable the offending hardware
Switch to a ‘hot spare’
UBC’s ongoing Remus project
Kemari developed at NTT Japan
23
Xen Summit at Oracle Feb 24-25, 2009
24. Network performance
Network virtualisation is particularly hard
High packet rates; latency sensitive
Existing netfront/back drivers have limitations
High cost for packet receive
Not designed for next-generation NICs
Ongoing work on netchannel2 to address this
Lazy copy in the guest (reduces dom0 load)
Provide guest a copy-only, sub-page, revocable grant
Support multi-queue NICs
DMA directly to guest buffers
Reusable extensible ring architecture
02/25/09 24
Xen Summit at Oracle Feb 24-25, 2009
25. Security
Deprivileged service domains
Qemu-dm, pvgrub, …
Secure boot
Measurement and containment
Xen Introspection Project
Allow guest state to be monitored and dissected
Read memory, registers, etc
Callbacks when critical state is modified
Virus scanners, test/debug, …
02/25/09
25
Xen Summit at Oracle Feb 24-25, 2009
26. Power management
Range timers
fuzzy deadlines, allowing batched firing and
fewer wakeups
Selectable PM policy
Admin can choose governor to trade off power
vs performance
Smarter scheduling
Further work is ongoing: George Dunlap, Intel,
etc
02/25/09 26
Xen Summit at Oracle Feb 24-25, 2009
27. Managing development
Use the developer mailing list
xen-devel@lists.xensource.com
Requests for comments
Announcements of dev plans
Patches posted for comment, review and
checkin
Use the wiki
http://wiki.xensource.com/xenwiki/XenRoadMap
27
Xen Summit at Oracle Feb 24-25, 2009
28. Welcome & Project Update
Ian Pratt
Keir Fraser
Xen Summit at Oracle Feb 24-25, 2009
1
29. Attendee Profile
100+ Attendees
8+ Countries
36+ Companies
5+ Universities
Xen Summit at Oracle Feb 24-25, 2009
2
30. Program Committee
Dan Magenheimer – Oracle
Jose Renato Santos – HP
Jun Nakajima - Intel
John Janakiraman – Skytap
Alex Vasilevsky – Virtual Computer
Victor Hugo dos Santos
Sang-bum Suh - Samsung
Hitoshi Matsumoto - Fujitsu
Thanks for putting together a great event!
Xen Summit at Oracle Feb 24-25, 2009
3
31. Event Information
• Breakout Room Available During Event
• Room 105
• See handout for Wireless Setup
• Lunch – Provided for Registered Attendees
at Conference Center
• Abstracts & Speaker Profiles at
http://www.xen.org/community/xensummit.html
Xen Summit at Oracle Feb 24-25, 2009
32. Evening Event – Tuesday
6:30 pm – 9:30 pm
http://www.computerhistory.org/
• Dinner, Wine, Beer, and Sodas
• 2 Guides for Private Museum Tours
• Directions at Registration Table
• Sign-up Sheet for Carpooling
Xen Summit at Oracle Feb 24-25, 2009
33. Xen Summit Gear
Xen Summit Jackets
Carabiners for Event Pass
Xen Summit at Oracle Feb 24-25, 2009
6
34. Agenda Overview - Tuesday
9:30 – 10:00 am Welcome and Project Status
10:00 – 10:30 am Roadmap & Releases
10:50 – 11:10 am Difference Engine
11:10 – 11:40 am PVOPS Status
11:40 – 12:15 pm Transcendent Memory on Xen
1:15 - 1:45 pm Satori: Enlightened Page-Sharing
1:45 – 2:05 pm Paravirtualized USB Support
2:05 – 2:35 pm PCI-Pass Through Techniques
2:35 – 3:05 pm Status of SR-IOV & VT-D
3:30 – 4:00 pm Cross Vendor Migration
4:00 – 4:20 pm Power Management in Xen
4:20 – 4:40 pm Detecting and Correcting Transient Errors via Xen
Xen Summit at Oracle Feb 24-25, 2009
7
35. Agenda Overview - Wed
9:00 – 9:30 am Open Nebula VM Manager
9:30 – 10:00 am Client Virtualization Framework
10:00 – 10:30 am Tralfamadore
10:45 – 11:00 am VM Snapshots
11:00 – 11:30 am Real-time and VMM
11:30 – 12:00 Nested Page Tables
1:00 – 1:30 pm Project Zentific
1:30 – 2:00 pm Just Run It
2:00 – 2:30 pm 3D Rendering on Xen
2:30 – 3:00 pm REFLINK Operation in ocfs2
3:30 – 4:00 pm Achieving 10GB/s Paravirt Drivers
4:00 – 4:30 pm Xen Scalability
Xen Summit at Oracle Feb 24-25, 2009
8
36. Xen Summit Europe at LinuxTAG
Xen Summit at Oracle Feb 24-25, 2009
9
37. Overview
• XenEmbedded
• XenClient
• HostedXen
• Xen Introspection API
Xen Summit at Oracle Feb 24-25, 2009
38. XenEmbedded
• Small footprint Xen environment
• For embedding into Servers, Desktops,
Laptops, Routers, Storage Arrays
• buildroot/busybox/uclibc based
• 8MB compressed image size
• xenvm/xenops embedded toolstack
• Simple configuration file
• Process per VM with control socket
• Fast booting
• See xenbits.xen.org/xenclient
Xen Summit at Oracle Feb 24-25, 2009
39. XenClient
• Repository for bleeding-edge client
related work, feeding in to xen-unstable
• Enhanced device pass-through
• Intel, ATI, nVidia graphics
• Power conservation and suspend
• ACPI/SMBIOS virtualization
• function keys, battery state, etc
• Secure mouse/keyboard routing
• Graphics virtualization
• Fast boot and measured launch
• Enhanced USB emulation
• “In-place P2V”, easy to install
Xen Summit at Oracle Feb 24-25, 2009
40. Hosted Xen
• Xen engine run as a kernel module to
enable hosted (type-2) VMM
• Runs on Windows and OSX today
• Enables Xen to also compete with other
type-2 VMMs
• KVM, VirtualBox, Parallels, VirtualPC,
VMWare Workstation/ACE/Fusion
• Looses the security and isolation
benefits of a true type-1 hypervisor, but
still useful in some scenarios
Xen Summit at Oracle Feb 24-25, 2009
41. Hosted Xen
• Xen loaded as an ELF module, linked
via dispatch table into host kernel
• Less than 1000 LOC to plumb Xen
module into Windows and OSX
• Leverages all of the great feature
development, optimization, broad
testing that's done on Xen
• Latest hardware support, SMP
guests, PV drivers etc
Xen Summit at Oracle Feb 24-25, 2009
42. Xen Introspection API
• API to enable monitoring and control of
VMs by a suitably privileged entity
• CPU, memory, disk, network, etc
• Enables Security, Forensics,
Debugging, System Management
• Georgia Tech Xen Access library
• Accessing memory, pagetable
walking
• Shadow/HAP enhancements for trap-on
access/write/execute
• UofAlaska/UC Davis VIX
Xen Summit at Oracle Feb 24-25, 2009
43. Observations
• Security is becoming increasingly
important in virtualization
• Xen as a true type-1 is well placed
• Must continue disaggregation and de-
privileging campaign
• Must continue to foster academic
research on and using Xen
• Community must help turn prototypes
into production code
Xen Summit at Oracle Feb 24-25, 2009
44. .org
Xen Releases and Roadmap
Keir Fraser
02/25/09 17
Xen Summit at Oracle Feb 24-25, 2009
17
45. Release plans
Current stable releases: 3.2.3 and 3.3.1
Both released in early January
Next releases: 3.3.2 and 3.4.0
Both anticipated around Easter time
Ongoing strategy:
Maintain two stable branches until the later one
has matured enough for switchover
Quarterly releases from stable branches
Six to nine months between major releases
02/25/09
18
Xen Summit at Oracle Feb 24-25, 2009
46. Memory management
More efficient heap allocators
No separate ‘xenheap’
Better ‘malloc’
Populate-on-demand HVM guest memory
Boot an HVM guest with a big memory map
But no need to allocate it all up front
OS won’t use much memory during boot
And then balloon driver can claim large
swathes
02/25/09
19
Xen Summit at Oracle Feb 24-25, 2009
Amazon
* Mar 1999 HotOS paper on XenoServers
* XXX grant application
[lessons from the Nemesis experience - the importance of compatibility]
[accounting and billing at core (unlike PlanetLab]
[speed of light, something fundamental]
[struggle for funding]
* Aug 2002 Xen development started
[pub bet]
* [2002 XenoServers project funded]
* Oct 2003 SOSP paper quot;Xen and the Art of Virtualizationquot;
[could have stopped, interesting platform, keep going to build something real]
[Enterprise software is hard, respect for folk that make stuff work]
[resource revocation, 24x7 operation, benchmarks]
* Apr 2004 Xen 1.0 released
* Jun 2004 First Xen developer's meeting at OLS
* Nov 2004 Xen 2.0 released
* Dec 2004 XenSource formed
* working with CPU and IO hardware vendors
* RedHat, Novell, Sun adopt Xen in their OSes
* Microsoft and VMware adopt paravirtualziation
* Sep 2006 XenEnterprise released
[Oct 2007 XenSource acquired by Citrix Systems Inc]
* May 2008 XenServer 3.2 embedded in flash memory on Dell and HP servers
[proud, part of the platform, ubiquitous, back to the 1970's]
19
47. Page sharing
Potential for reducing memory pressure by sharing
identical pages across VMs
Significant savings in ‘ideal’ cases
Rather smaller gains in typical heterogeneous scenarios
(10-20%)
How to find identical pages?
Memory scanning vs. disc block tracking
Allows memory overcommit
Hence requires demand paging
Or don’t give spare pages directly back to guests
02/25/09 20
Xen Summit at Oracle Feb 24-25, 2009
Satori – Enlightened guests detect sharing opportunities and give up memory when sharing breaks
Difference Engine – all automatic
Tmem – a different plan for spare memory
48. Virtual block devices: blktap2
Support VHD storage format
Snapshot virtual disks
Checkpoints, backups, gold images, etc
Live coalescing of snapshots
Simplified kernel support
Leverage blkback
Simpler invocation model
More generic, easier test and debug
21
Xen Summit at Oracle Feb 24-25, 2009
49. Cross-hypervisor compatibility
Viridian interface
CPUID, hypercalls
Actually turn on just a few optimisations
And turn off some annoying checks
VHD format support
22
Xen Summit at Oracle Feb 24-25, 2009
50. High availability
Detect hardware failures
Hardware-based: Machine Check Architecture
Software-based: e.g., compare replicas
React appropriately…
CPU/memory offlining
Disable the offending hardware
Switch to a ‘hot spare’
UBC’s ongoing Remus project
Kemari developed at NTT Japan
23
Xen Summit at Oracle Feb 24-25, 2009
MCA – AMD, Intel, Sun
Replication – John Byrne
23
51. A
m
a
z
o
n
*
M
a
Network performance
r
1
Network virtualisation is particularly hard
9
9
High packet rates; latency sensitive
9
Existing netfront/back drivers have limitations
H
o
t High cost for packet receive
O
S Not designed for next-generation NICs
p Ongoing work on netchannel2 to address this
a
p
Lazy copy in the guest (reduces dom0 load)
e
r
Provide guest a copy-only, sub-page, revocable grant
o
Support multi-queue NICs
n
X DMA directly to guest buffers
e
n
Reusable extensible ring architecture
o
S
e 02/25/09 24
Xen Summit at Oracle Feb 24-25, 2009
r
v
e
r
s
*
X
X
X
g
r
a
n
t
a
p
p
l
i
c
a
t
i
o
n
[
l
e
s
s
o
n
s
f
r
o
m
t
h
24
e
52. Security
Deprivileged service domains
Qemu-dm, pvgrub, …
Secure boot
Measurement and containment
Xen Introspection Project
Allow guest state to be monitored and dissected
Read memory, registers, etc
Callbacks when critical state is modified
Virus scanners, test/debug, …
02/25/09
25
Xen Summit at Oracle Feb 24-25, 2009
53. Power management
Range timers
fuzzy deadlines, allowing batched firing and
fewer wakeups
Selectable PM policy
Admin can choose governor to trade off power
vs performance
Smarter scheduling
Further work is ongoing: George Dunlap, Intel,
etc
02/25/09 26
Xen Summit at Oracle Feb 24-25, 2009
54. Managing development
Use the developer mailing list
xen-devel@lists.xensource.com
Requests for comments
Announcements of dev plans
Patches posted for comment, review and
checkin
Use the wiki
http://wiki.xensource.com/xenwiki/XenRoadMap
27
Xen Summit at Oracle Feb 24-25, 2009