Urgent Virtual Machine Eviction with Enlightened Post-Copy

Total Page:16

File Type:pdf, Size:1020Kb

Urgent Virtual Machine Eviction with Enlightened Post-Copy Urgent Virtual Machine Eviction with Enlightened Post-Copy Yoshihisa Abe†, Roxana Geambasu‡, Kaustubh Joshi•, Mahadev Satyanarayanan† †Carnegie Mellon University, ‡Columbia University, •AT&T Research fyoshiabe, [email protected], [email protected], [email protected] Abstract servative allocation. Migration for contending VMs thus has Virtual machine (VM) migration demands distinct properties its own value, which can impact resource allocation policies. under resource oversubscription and workload surges. We However, migration of a VM under contention poses present enlightened post-copy, a new mechanism for VMs challenges to be solved because of its distinct requirements. under contention that evicts the target VM with fast execu- It needs to salvage the performance of all the VMs being tion transfer and short total duration. This design contrasts affected, namely their aggregate performance. The primary with common live migration, which uses the down time of goal, therefore, is to evict the target VM from its host rapidly, the migrated VM as its primary metric; it instead focuses allowing the other VMs to claim the resources it is currently on recovering the aggregate performance of the VMs being consuming. This objective is achieved by transferring the affected. In enlightened post-copy, the guest OS identifies execution of the migrated VM to a new host, so that its memory state that is expected to encompass the VM’s work- computational cycles are made available to the other VMs. ing set. The hypervisor accordingly transfers its state, miti- Additionally, the duration of migration decides when the gating the performance impact on the migrated VM resulting VM’s state can be freed on the source host; reclaiming the from post-copy transfer. We show that our implementation, space of memory state, which can be tens or hundreds of with modest instrumentation in guest Linux, resolves VM gigabytes, can be particularly important. While adhering to contention up to several times faster than live migration. these priorities, the impact on the migrated VM should be mitigated to the extent possible, for its service disruption to be limited and the aggregate performance to recover fast. 1. Introduction These properties are especially desirable when the VMs As a means of load balancing, VM migration plays a cru- provide services that need to sustain high overall throughput. cial role in cloud resource efficiency. In particular, it affects Example cases include back-end servers or batch-processing the feasibility of oversubscription. Oversubscription is co- applications, such as big data analytics. With these types of location of VMs on the same host in which their allocated workloads, resolving the contention between VMs directly resources can collectively exceed the host’s capacity. While translates to optimizing their performance as a whole. Mi- it allows the VMs to share the physical resources efficiently, gration can also be more for saving the contending VMs than at peak times they can interfere with each other and suffer the target VM itself. The contending VMs can be running performance degradation. Migration, in this situation, offers more latency-sensitive services, such as web servers, than a way of dynamically re-allocating a new machine to these those of the target VM. Or, the target VM may be malfunc- VMs. The faster the operation is in resolving the contention, tioning, for example under a DoS attack, needing diagnosis the more aggressive vendors can be in deploying VMs. With- in segregation. In all these situations, as illustrated in Figure out a good solution, on the other hand, those with perfor- 1, migration with appropriate characteristics would allow the mance emphasis must relinquish resource efficiency and use VMs to be co-located under normal operation, and to be al- more static resource assignments, such as Placements on located new resources when experiencing a surge of loads. Amazon EC2 [1]. Although such strategies can guarantee Unfortunately, the requirements described above defy the VM performance, they lead to wasted resources due to con- trends in VM migration approaches. In particular, the cur- rent standard of live migration [12, 30] often results in elon- gated duration due to its design principles [19, 38]. This be- havior leaves VMs under contention, delaying their perfor- Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without mance recovery. In this paper, we present a design point that fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be is fundamentally different and driven by enlightenment [28]. honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected] or Publications Enlightenment is a type of knowledge the guest passes to Dept., ACM, Inc., fax +1 (212) 869-0481. the hypervisor for improving the efficiency of its operation. VEE ’16 April 2–3, 2016, Atlanta, Georgia, USA. Copyright c 2016 ACM 978-1-4503-3947-6/16/04. $15.00 Applying it to migration, we develop an approach called en- DOI: http://dx.doi.org/10.1145/http://dx.doi.org/10.1145/2892242.2892252 Web Server: Degraded Response Time Malfunctioning VM Affecting Both Degraded Throughput Batch Proc.: Degraded Throughput VM under Normal Operation Host 1 Host 1 Host 1 Normal Batch Batch Web Batch Malfun- Opera- Proc. Proc. Server Proc. ctioning tion VM VM VM VM VM VM Before Before Before After After After Host 1 Host 2 Host 1 Host 2 Host 1 Host 2 Normal Batch Batch Web Batch Malfun- Opera- Proc. Proc. Server Proc. ctioning tion VM VM VM VM VM VM Ideal Throughput Ideal Throughput Ideal Response Time Ideal Throughput Ideal Performance Isolated (a) Optimizing Aggregate Throughput (b) Saving Response-Time-Sensitive Service (c) Isolating VM for Diagnosis Figure 1. Scenarios for Urgent VM Eviction. The top and bottom rows illustrate VMs before and after migration, respectively. lightened post-copy. It employs a post-copy style, in which (x1000) 120 the VM is resumed on the destination before its state has 100 80 been migrated, and mitigates the resulting performance im- 60 40 pact through enlightenment. Upon migration, the guest OS Gbps 10 20 0 informs the hypervisor of memory regions that require high (x1000) 120 transfer priority for sustaining the guest performance. The 100 80 60 hypervisor then transfers the execution of the VM imme- 40 5 Gbps 5 20 diately to a new host, while continuously pushing its state 0 (x1000) as instructed and also serving demand-fetch requests by the 120 100 destination VM. Our implementation, with modest changes 80 60 to guest Linux, shows the effectiveness of the guest’s initia- 40 2.5 Gbps 2.5 20 tive in performing migration with the desired properties. 0 0 30 60 90 120 150 180 210 240 270 300 330 360 The main contributions of this paper are as follows: Time (sec) • Explaining common behaviors of migration and deriving Figure 2. Live Migration Behavior of qemu-kvm under VM properties desired for VMs under contention (Section 2). Contention. The y-axis indicates throughput in operations • Presenting the design and implementation of enlightened per second. The black and gray lines represent the migrated post-copy, an approach that exploits native guest OS sup- and contending VMs, respectively, and the shaded areas the port (Sections 3 and 4). duration of migration. • Evaluating the performance and trade-offs of enlight- ened post-copy against live migration and other basic ap- proaches (Section 5). describe the algorithm and behavior of live migration caus- ing this problem, and derive the properties desired in our 2. Analysis of VM Migration solution. VM migration has historically focused on the liveness, namely minimal suspension, of the target VM. Specifically, 2.1 Mechanics of Migration live migration is the current standard widely adopted by Figure 3 illustrates aspects of VM migration including exe- common hypervisors [12, 30]. The characteristics of live mi- cution, state transfer, and performance. Migration is initiated gration, however, deviate from those desired in the context of on the source, on which the VM originally executes. The VM VMs under contention; it leads to extended duration of mi- is suspended at one point, and then resumed on the destina- gration and thus continued interference of the VMs. Figure tion. State transfer during the course of migration is catego- 2 illustrates this problem, with live migration by qemu-kvm rized into two types: pre-copy and post-copy. Pre-copy and 2.3.0 under the Memcached workload and experimental set- post-copy are phases performed before and after the VM re- up described in Section 5. One of the two contending VMs sumes on the destination, respectively. Associated with the is migrated, with approximately 24 GB of memory state to duration of these state transfer modes, there are three key be transferred, under varied bandwidth. Migration takes 39.9 time metrics: seconds at 10 Gbps, and fails to complete at 2.5 Gbps. For the duration of migration, the VMs suffer degraded perfor- • Down time: time between the suspension and resume of mance due to their mutual interference. In this section, we the VM, during which its execution is stopped. Migration VM VM Migration Start tracking page content mutation Start Suspension Resume End Send all pages to destination VM Execution Source Location Destination Re-send pages dirtied since last transfer State Pre-Copy Post-Copy Transfer Otherwise Down Time Check conditions for completion Time Execution Transfer Time Metrics Expected down time is below threshold Total Duration or additional condition holds Possible Impact Dirty State Missing Suspend guest on source on Performance Tracking VM State Figure 3.
Recommended publications
  • Backbox Penetration Testing Never Looked So Lovely
    DISTROHOPPER DISTROHOPPER Our pick of the latest releases will whet your appetite for new Linux distributions. Picaros Diego Linux for children. here are a few distributions aimed at children: Doudou springs to mind, Tand there’s also Sugar on a Stick. Both of these are based on the idea that you need to protect children from the complexities of the computer (and protect the computer from the children). Picaros Diego is different. There’s nothing stripped- down or shielded from view. Instead, it’s a normal Linux distro with a brighter, more kid-friendly interface. The desktop wallpaper perhaps best We were too busy playing Secret Mario on Picaros Diego to write a witty or interesting caption. exemplifies this. On one hand, it’s a colourful cartoon image designed to interest young file manager. In the programming category, little young for a system like this, but the it children. Some of the images on the we were slightly disappointed to discover it may well work for children on the upper end landscape are icons for games, and this only had Gambas (a Visual Basic-like of that age range. should encourage children to investigate the language), and not more popular teaching Overall, we like the philosophy of wrapping system rather than just relying on menus. languages like Scratch or a Python IDE. Linux is a child-friendly package, but not On the other hand, it still displays technical However, it’s based on Debian, so you do dumbing it down. Picaros Diego won’t work details such as the CPU usage and the RAM have the full range of software available for every child, but if you have a budding and Swap availability.
    [Show full text]
  • Linux Virtual COM User's Manual
    LES301A-KIT LES301AE-KIT LES302A-KIT LES302AE-KIT 1- and 2-Port 10/100 Device Servers, RS-232/422/485, DB9 M Linux Virtual COM User’s Manual ® BLAC K BOX Customer Order toll-free in the U.S.: Call 877-877-BBOX (outside U.S. call 724-746-5500) Support FREE technical support 24 hours a day, 7 days a week: Call 724-746-5500 or fax 724-746-0746 Mailing address: Black Box Corporation, 1000 Park Drive, Lawrence, PA 15055-1018 Information Web site: www.blackbox.com • E-mail: [email protected] Linux Virtual COM user manual Trademarks Used in this Manual Trademarks Used in this Manual Black Box and the Double Diamond logo are registered trademarks of BB Technologies, Inc. Ubuntu is a registered trademark of Canonical Ltd. Linux is a registered trademark of Linus Torvalds. SUSE is a registered trademark of Novell, Inc. Red Hat and Fedora are registered trademarks of Red Hat, Inc. Debian is a registered trademark of Software in the Public Interest, Inc. Any other trademarks mentioned in this manual are acknowleged to be the property of the trademark owners. We‘re here to help! If you have any questions about your application or our products, contact Black Box Tech Support at 724-746-5500 or go to blackbox.com and click on “Talk to Black Box.” You’ll be live with one of our technical experts in less than 30 seconds. Page 2 724-746-5500 | blackbox.com Linux Virtual COM user manual 724-746-5500 | blackbox.com Guides Contained in this Document IMPORTANT ANNOUNCEMENT: The information contained in this document is the property of Black Box Corporation and is supplied for the sole purpose of the operation and maintenance of products of Black Box Corporation.
    [Show full text]
  • ENACT Devops Framework–Final Version
    ENACT DevOps Framework – Final version. Title: ENACT DevOps Framework – Final version . Authors: Alexander Palm (UDE), Thorsten Weyer (UDE), Jacek Dominiak (Beawre), Nicolas Ferry (CNRS), Hui Song (SINTEF), Rustem Dautov (SINTEF), Phu Nguyen (SINTEF), Franck Dechavanne (CNRS), Thibaut Gonnin (CNRS), Stéphane Lavirotte (CNRS), Gérald Rocher (CNRS), Jean-Yves Tigli (CNRS), Luong NGUYEN (Montimage),Vinh Hoa La (Montimage), Wissam Mallouli (Montimage), Edgardo Montes de Oca (Montimage), Anne Gallon (Evidian), Jean-Christophe Durieu (Evidian), Samuel Mamuye (Evidian), Olivier Verdun (Evidian), Elena González (Beawre), Victor Muntés (Beawre), Eider Iturbe (Tecnalia), Saturnino Martinez (Tecnalia), Angel Rego (Tecnalia) and Erkuden Rios (Tecnalia) Editor: Jacek Dominiak (Beawre) Reviewers: Modris Greitans (EDI), Uģis Grīnbergs (BOSC) Identifier: Deliverable # D5.4 Nature: Software Date: 01 March 2021 Status: v1.0 Diss. level: Public Executive Summary This deliverable showcases the final release of the ENACT framework, along with the API’s descriptions available for the integration as well as the list of market leaders which can be integrated with the enablers of the framework. Final version 1.0, 01/03/2020 1 ENACT DevOps Framework – Final version. Final version 1.0, 01/03/2020 2 ENACT DevOps Framework – Final version. Members of the ENACT consortium: SINTEF AS Norway BEAWRE DIGITAL SL Spain EVIDIAN SA France INDRA Sistemas SA Spain Fundacion Tecnalia Research & Innovation Spain TellU AS Norway Centre National de la Recherche Scientifique France Universitaet Duisburg-Essen Germany MONTIMAGE France Istituto per Servizi di Ricovero e Assistenza agli Anziani Italy Baltic Open Solution Center Latvia Elektronikas un Datorzinatnu Instituts Latvia Revision history Date Version Author Comments V0.1 Jacek Dominiak Table of content 15/12/2020 V0.2 Jacek Dominiak, Nicolas Table of content modification, include Ferry external documents in this deliverable 16/12/2020 V0.3 Stéphane Lavirotte, Gérald Contribute to ACM and BDA sections.
    [Show full text]
  • 1.1 X Client/Server
    เดสกทอปลินุกซ เทพพิทักษ การุญบุญญานันท 2 สารบัญ 1 ระบบ X Window 5 1.1 ระบบ X Client/Server . 5 1.2 Window Manager . 6 1.3 Desktop Environment . 7 2 การปรับแตง GNOME 11 2.1 การติดตั้งฟอนต . 11 2.2 GConf . 12 2.3 การแสดงตัวอักษร . 13 2.4 พื้นหลัง . 15 2.5 Theme . 16 2.6 เมนู/ทูลบาร . 17 2.7 แปนพิมพ . 18 2.8 เมาส . 20 3 4 บทที่ 1 ระบบ X Window ระบบ GUI ที่อยูคูกับยูนิกซมมานานคือระบบ X Window ซึ่งพัฒนาโดยโครงการ Athena ที่ MIT รวมกับบริษัท Digital Equipment Corporation และบริษัทเอกชนจำนวนหนึ่ง ปจจุบัน X Window ดูแลโดย Open Group เปนระบบที่เปดทั้งในเรื่องโปรโตคอลและซอรสโคด ขณะที่เขียนเอกสารฉบับนี้ เวอรชันลาสุดของ X Window คือ เวอรชัน 11 รีลีส 6.6 (เรียกสั้นๆ วา X11R6.6) สำหรับลินุกซและระบบปฏิบัติการในตระกูลยูนิกซที่ทำงานบน PC ระบบ X Window ที่ใชจะมาจาก โครงการ XFree86 ซึ่งพัฒนาไดรเวอรสำหรับอุปกรณกราฟกตางๆ ที่ใชกับเครื่อง PC รุนลาสุดขณะที่ เขียนเอกสารนี้คือ 4.3.0 1.1 ระบบ X Client/Server X Window เปนระบบที่ทำงานผานระบบเครือขาย โดยแยกเปนสวน X client และ X server สื่อสาร กันผาน X protocol ดังนั้น โปรแกรมที่ทำงานบน X Window จะสามารถแสดงผลบนระบบปฏิบัติการ ที่ตางชนิดกันก็ได ตราบใดที่ระบบนั้นสามารถใหบริการผาน X protocol ได X client ไดแกโปรแกรมประยุกตตางๆ ที่จะขอใชบริการจาก X server ในการติดตอกับฮารดแวร เชน จอภาพ แปนพิมพ เมาส ฯลฯ ดังนั้น X server จึงทำงานอยูบนเครื่องที่อยูใกลผูใชเสมอ ในขณะที่ X client อาจอยูในเครื่องเดียวกันหรืออยูในเครื่องใดเครื่องหนึ่งในระบบเครือขายก็ได X client จะติดตอกับ X server ดวยการเรียก X library (เรียกสั้นๆ วา Xlib) API ตางๆ ใน Xlib มีหนาที่แปลงการเรียกฟงกชันแตละครั้งใหเปน request ในรูปของ X protocol เพื่อสงไปยัง X server
    [Show full text]
  • Linux on the Ipaq
    Linux on the Ipaq by Jon Nelson Linux on the Ipaq ● Distros – Familiar – Intimate ● GUI's/GUE's – Opie – GPE ● Window Managers – icewm – blackbox Distributions ● Familiar – Entirely based on XFree86's/keithp's Tiny-X server, which includes the latest RENDER extension. – Anti-Aliased True-Type Font support in rxvt-aa, matchbox, and fltk (this is extended to any X application using the Xft APIs). – Dropbear sshd included by default. – The latest releases include JFFS2 support, which enables you to have read/write access to the iPAQ's Flash. Distributions ● Familiar cont'd – Integrated Python v2.3 w/ PyGtk and PyGDKImlib. – Binary and Library compatible w/ Debian's ARM distribution. In most cases, programs (as long as their dependencies are met) can be taken from Debian and executed on the iPAQ w/out issue. – Full package support based on ipkg. – Many system programs are implemented using busybox, saving much space. Distributions ● Intimate – Based on Familiar – Full blown Debian package management – Needs 140MB for base image – KDE Graphical User Environments Opie GPE Window Managers Familiar Installation ● Familiar 0.7.2 ● Models Supported – H3100, H3600, H3700, H3800, H3900, H5100, H5400, and H5500 ● Prerequisites – Need CF card and sleeve or serial connection – Internet connection is nice but not needed – Need a Windows box ● Download files Familiar/Opie Installation ● Install bootloader – Copy BootBlaster and bootldr files to Ipaq ● Extract from downloaded .tar ● ActiveSync, Synce, CF/MMC/SD, FTP, Pocket IE ● Follow directions – Keep Ipaq plugged in – Make backup of WinCE – Flash ROM – Follow instructions Familiar/Opie Installation ● Installing Linux image – Need serial connection ● USB/serial cradle best option ● hyperterminal or minicom – 115200 8N1 serial configuration – no flow control – no hardware handshaking – At the "boot>" prompt ● 'load root' ● ymodem upload jffs2 Familiar/Opie Installation boot> load root loading flash region root ready for YMODEM download.
    [Show full text]
  • Window Managers HOWTO Articles - Window Managers
    2021/07/26 13:08 (UTC) 1/3 HOWTO articles - Window Managers HOWTO articles - Window Managers This section contains how to articles intended to guide users to setup and maintain window managers on Slackware based systems. Inspired? Want to write a Window Manager HOWTO page yourself? Type a new page name (no spaces - use underscores instead) and start creating! You are not allowed to add pages Overview of Slackware Administration HOWTOS Page Description Tags Dual Monitors Known to work on Slackware 14.1 and howtos, software, XFCE If you are running XFCE and your secondary window managers, dual monitor isn't working, check and make sure it's enabled Dual Monitors monitors, monitors, dual in XFCE's SETTINGS: SETTINGS > SETTING MANAGER > displays, displays, DISPLAY > display name in column on left > USE THIS author arfon OUTPUT Enlightement DR17 What is E17? Enlightenment DR17 (E17) is the long awaited successor of E16, a window manager which was distributed in Slackware 10 years ago. It is classed as a “desktop shell”, providing the Enlightement howtos, e17, author things you need to operate your desktop (or laptop), but DR17 ngc891 not a whole suite of applications. This includes launching applications, managing their windows, and doing other system tasks like suspending, rebooting, managing files, etc. Fluxbox Fluxbox is a window manager for X, based on Blackbox 0.61.1 code (deprecated), very light and fast, howtos, window with several window management tools such as tabs, Fluxbox managers, fluxbox, groupings, docks, etc. Configuration files are simple and author carriunix easily editable, allowing high customization. Fluxbox is written in C++ and licensed under an MIT license.
    [Show full text]
  • BEATRIX Beafanatix DAMN SMALL LINUX FEATHER LINUX
    BEATRIX http://www.watsky.net/ en remastering af Knoppix. Nyeste version i feb 2007 var ver 2005-IF. 183 MB Bruger GNOME 2.6 windows manager. Finder windows partitioner, floppy drillede Parametre ved opstart: linux26 toram eller linux24 toram Programmer: Firefox, Evolution, Open Office, Gaim, Gnome pdf-viewer, Eye of Gnome ..vil ikke køre på Ediths computer, men hvis man option sætter "failsafe" ved opstart, så går det! BeaFanatIX http://bea.cabaret.com/ en remastering af Ubuntu og Knoppix. Nyeste version februar 2007 var 2006.2. 115 MB? Bruger GNOME 2.6 windows manager. Finder windows partitioner, floppy drillede Parametre ved opstart: linux26 toram? eller linux24 toram? Programmer: Firefox, Abi-word, Gnumeric ..vil ikke køre på Ediths computer, men hvis man option sætter "failsafe" ved opstart, så går det! DAMN SMALL LINUX http://www.damnsmalllinux.org/ Også en remastering af Knoppix. Nyeste version februar 2007 er ver. 3.2 50 MB Bruger blackbox windows manager, går på nettet, finder USB-stift og windows på harddisken Parametre ved opstart: knoppix toram lang=da Programmer: tcc (tiny C-compiler), SQLite, o.m.a. FEATHER LINUX http://featherlinux.berlios.de Nyeste version februar 2007 var 0.7.5. Fylder 128 MB Bruger blackbox windows manager, går på nettet, finder floppy, USB-stift og windows på harddisken. Minder gevaldigt meget om DSL, eller rettere en DSL med betydelige udvidelser. Parametre ved opstart: knoppix toram xdef lang=da xdef skulle giver 1024x768 16 bit svarende til "knoppix vga=791" 24 bit skulle komme med vga=792 Under opstart, skal man væge Xvesa eller Xfbdev, USB-mus Y/N, IMPS/2 mouse wheel, keymap og skærmopløsning.
    [Show full text]
  • Basic UNIX 4: More on the GUI ● How X Works ● Window and Desktop Managers ● File Managers ● Common Tasks ● System Administration Tools
    Basic UNIX 4: More on the GUI ● How X works ● Window and desktop managers ● File managers ● Common tasks ● System administration tools Iowa State University Information Technology Services Last update 1/29/2008 by jbalvanz How X works ● X server (X) – Provides tools for drawing graphics on a display – X applications send commands to the X server via TCP/IP ● X client – Machine running the software that wants to draw graphics – Usually the machine running the server, but doesn't have to be! How this looks Server Client Application package X Server TCP/IP TCP/IP Stack Stack Network Why is this good? ● Applications are independent of graphics hardware, window manager and even hardware platform ● Server and client do not have to be on the same machine; applications can be run remotely – Licensing considerations – Horsepower restrictions Running X applications remotely ● Connect to a remote machine using ssh with the -X option (not -x) ssh -X [email protected] ● Start the application sas Window managers ● Manages positioning of windows on the screen, virtual desktops, running applications; may include menus – AfterStep – Blackbox – Enlightenment Display Driver – FVWM Window Manager – IceWM – WindowMaker X Server – etc., etc., etc., etc. TCP/IP Stack Desktop Environments ● Window management + system utilities + standard applications + games + menuing system + ???????? – GNOME Desktop – K Desktop Environment (KDE) – Microsoft Windows What you'll have to get used to... ● Users have a choice of window/desktop manager (even in the stock RedHat install) ● Many desktop managers are themeable, i.e., FVWM may look completely different from FVWM on another machine depending on the choice of theme Why choice is good..
    [Show full text]
  • 07/01/2003 First Responder Guide for Law Enforcement and Corrections
    First Responder Guide for Law Enforcement and Corrections Officers 07/01/2003 Preface The purpose of this guide is to provide some basic guidance in using Knoppix as a “first responder” tool to determine whether a computer should be examined in more detail. Here are some examples of how Knoppix might be used: Law enforcement officers have received information of a crime that may not be enough to support a warrant. They decide to conduct a “knock and talk” with the individual. During the contact they obtain consent to look at the individual’s computer for evidence. Knoppix provides a method of looking at the computer, without altering the evidence. Evidence found using Knoppix can be used as a justification to either seize the computer (where clear contraband is found, such as child porn) or establish probable cause to obtain a search warrant. Corrections personnel (Probation, Parole, and/or Pretrial Services Officers) are responsible for supervising defendants and/or offenders for Courts and/or parole authorities. Frequently, this responsibility requires the ability to monitor an offender’s or defendant’s computer use. Knoppix provides a method to take a quick look at the computer, without altering evidence. Again, evidence found using Knoppix can be used for a violation hearing. Additionally, this evidence can be provided to law enforcement for their use in pursuing new criminal charges, i.e., to establish probable cause for a search warrant. Officers are faced with numerous computers for processing. Imaging all of these computers for forensic processing is a timely process. Knoppix can be a method for quickly determining which computers should be imaged immediately.
    [Show full text]
  • Liberating Virtual Machines from Physical Boundaries Through Execution Knowledge Yoshihisa Abe
    Liberating Virtual Machines from Physical Boundaries through Execution Knowledge Yoshihisa Abe CMU-CS-15-147 December 2015 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Thesis Committee: Mahadev Satyanarayanan, Chair Dan Siewiorek Todd Mowry Kaustubh Joshi, AT&T Research Roxana Geambasu, Columbia University Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Copyright c 2015 Yoshihisa Abe This research was supported by the National Science Foundation under grant numbers CNS-0833882, CCF- 1019104, IIS-1065336, and CNS-1518865; by the Defense Advanced Research Projects Agency under grant numbers FA8721-05-C-0003 and FA8650-11-C-7190; by the Moore Foundation under grant number 2160; by the Alfred P. Sloan Foundation under grant number 20121031; by an Intel Science and Technology Center grant; by the Quality of Life Technologies ERC (NSF-EEC-0540865); and by the Department of Defense under Contract No. FA8721-05-C-0003 for the operation of the Software Engineering Institute, a federally funded research and development center. Additional support was provided by Intel, IBM, Google, Bosch, Vodafone, Crown Castle, and the Conklin Kistler family fund. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution, the U.S. government or any other entity. Keywords: Virtualization, Migration, Operating systems, Cloud computing, Interac- tivity Abstract Hardware virtualization enables remote instantiation of computation through the preserved executability of encapsulated software. The large size of vir- tual machines (VMs), however, poses challenges in exploiting this strong fea- ture under the existence of resource constraints.
    [Show full text]
  • Free and Open Source Software
    Free and open source software Copyleft ·Events and Awards ·Free software ·Free Software Definition ·Gratis versus General Libre ·List of free and open source software packages ·Open-source software Operating system AROS ·BSD ·Darwin ·FreeDOS ·GNU ·Haiku ·Inferno ·Linux ·Mach ·MINIX ·OpenSolaris ·Sym families bian ·Plan 9 ·ReactOS Eclipse ·Free Development Pascal ·GCC ·Java ·LLVM ·Lua ·NetBeans ·Open64 ·Perl ·PHP ·Python ·ROSE ·Ruby ·Tcl History GNU ·Haiku ·Linux ·Mozilla (Application Suite ·Firefox ·Thunderbird ) Apache Software Foundation ·Blender Foundation ·Eclipse Foundation ·freedesktop.org ·Free Software Foundation (Europe ·India ·Latin America ) ·FSMI ·GNOME Foundation ·GNU Project ·Google Code ·KDE e.V. ·Linux Organizations Foundation ·Mozilla Foundation ·Open Source Geospatial Foundation ·Open Source Initiative ·SourceForge ·Symbian Foundation ·Xiph.Org Foundation ·XMPP Standards Foundation ·X.Org Foundation Apache ·Artistic ·BSD ·GNU GPL ·GNU LGPL ·ISC ·MIT ·MPL ·Ms-PL/RL ·zlib ·FSF approved Licences licenses License standards Open Source Definition ·The Free Software Definition ·Debian Free Software Guidelines Binary blob ·Digital rights management ·Graphics hardware compatibility ·License proliferation ·Mozilla software rebranding ·Proprietary software ·SCO-Linux Challenges controversies ·Security ·Software patents ·Hardware restrictions ·Trusted Computing ·Viral license Alternative terms ·Community ·Linux distribution ·Forking ·Movement ·Microsoft Open Other topics Specification Promise ·Revolution OS ·Comparison with closed
    [Show full text]
  • Magazine Magazine
    The Mathematical Function Atan2 • Resizing your Android partitions Year One Issue #6 ODROID Jun 2014 DREAM MACHINE Magazine AND WHISPER AN INSIDE LOOK AT PREBUILT UBUNTU 13.04 AND 13.10 DISK IMAGES THAT GET YOUR ODROID UP AND RUNNING FAST! Ubuntu Mathematics Tools Lubuntu Whisper 13.10 Saucy Salamander Blackbox LXDE XBMC PLUS: • PACKAGE YOUR OWN CUSTOM COMPILED SOFTWARE • PROGRAM YOUR ODROID SHOW WITH REBOL THE ODROID FAMILY ODROID-X2 ODROID-XU • ENABLE MULTI-CHANNEL AUDIO OUTPUT WITH XBMC ODROID-U3 What we stand for. We strive to symbolize the edge technology, future, youth, humanity, and engineering. Our philosophy is based on Developers. And our efforts to keep close relationships with developers around the world. For that, you can always count on having the quality and sophistication that is the hallmark of our products. Simple, modern and distinctive. So you can have the best to accomplish everything you can dream of. We are now shipping the ODROID U3 devices to EU countries! Come and visit our online store to shop! Address: Max-Pollin-Straße 1 85104 Pförring Germany Telephone & Fax phone : +49 (0) 8403 / 920-920 email : [email protected] Our ODROID products can be found at: http://www.pollin.de/shop/suchergebnis.html?S_ TEXT=odroid&log=internal EDITORIAL ver since we began publishing ODROID Magazine, we’ve been receiving some great articles from our international contribu- Etors involving their innovative hardware projects, including the Giant Android Tablet, ODROID Truck PC, and the Unmanned Ground Vehicle. The worldwide maker community has shown that there is almost no limit as to what an ODROID can do.
    [Show full text]