Investment in 64-Bit Intel Itanium® Servers Pays Returns for Commsec

Total Page:16

File Type:pdf, Size:1020Kb

Investment in 64-Bit Intel Itanium® Servers Pays Returns for Commsec Investment in 64-bit Intel Itanium 2 servers pays returns for CommSec Solution Overview Intel and Microsoft Customer Reference Case Study Customer Profile Business Challenge Web server logs and try to figure out the Founded in 1995 as a telephone-based reason for the problem. It was easy to investment service, Commonwealth The investment services arm of the find out basic statistics like how many Commonwealth Bank of Australia (CBA) visitors had come to the site every day, Securities Limited (CommSec) is a Limited, Commonwealth Securities Ltd but more complicated analysis – for subsidiary of the Commonwealth Bank (CommSec) maintains numerous internal example, figuring out which Web pages of Australia (CBA). Since launching its and external transactional sites including might be slowing down users because share trading Web site in 1997, Australia’s busiest financial services of misplaced buttons – was virtually CommSec has expanded rapidly to offer Web site, www.commsec.com.au. All impossible. a full range of managed investments told, CommSec-managed Web servers become Australia’s busiest financial handle over 620 million hits and 300,000 Early in 2005, CommSec implemented services Web site, with more than 500 investment transactions monthly. a new Web server logging system million hits per month from more than designed to improve the company’s 537,000 clients. Because the company’s business depends ability to collate and analyse activity so heavily on online services, it is logs. That system was built on 32-bit Intel Challenge essential for the business to monitor the Architecture servers and a Microsoft SQL performance of those services from the Server 2000 database, and went through As Australia’s largest online financial end-user’s perspective. Chronic slow or Web server logs every night to extract, services provider, CommSec needs to unreliable performance can create major dimensionalise and load data into an ensure that the internal and external problems for the business if customers OLAP cube for easy analysis. Web sites it maintains, which receive are unable to trade, for example, or find more than 27 million hits a day, are that anomalies in the site’s construction This approach worked, but the sheer providing the fastest and most effective are making navigation difficult. volume of data being processed – more user experience possible. This requires than 40 million rows per week – meant regular analysis of server performance Keeping quality of service high, and that it was taking more than 10 hours logs, but a log analysis system proved therefore ensuring that customers get for the information to be available to unable to provide results quickly enough consistent and speedy response from the managers. Data processing runs begun company’s online services, was therefore to support business decisions. at 2:00 am would finish after lunchtime, a business priority. This was particularly meaning that it was often the end of the Solution the case as a period of significant day before technical staff could revise expansion in online services had rapidly application code or take other necessary A 4-way Intel Architecture server increased usage by bank staff and remedial actions. running 1.5GHz Intel® Itanium 2 CBA customers. processors and Microsoft SQL Server Latency between the data’s creation 2005 manages the logging, processing, “The user’s perception will ultimately and its availability was hindering storage and analysis of Web user logs drive the technological strategy we use, CommSec’s goal of providing responsive relating to 40 million weekly hits served so we want to understand what the user and proactive management of its up by dozens of Web servers running experience is,” said Michael Blomfield, growing online environment. After CommSec’s many internal and external head of CommSec. “In the past, however, analysis by consultancy EasternMining. transactional sites. reporting was ad hoc; we were mainly com.au, it was suggested that the hearing about issues later, through the system’s 32-bit architecture was creating Business value user help desk. It’s an exceptionally large a bottleneck. The Web log reporting Web site, and we want information on its • Log analysis time has shrunk from system was moved to a completely new performance in real time. Knowing how environment built on servers running more than 10 hours to 1.5 hours. users are using the sites will allow us to 64-bit Intel Itanium 2 processors and the • Availability of reports first thing in the be more proactive rather than reactive.” Microsoft SQL Server 2005 morning facilitates rapid response. database platform. Although usage of its online services • Managers and technical was growing steadily, CommSec had no The improvement in processing speed administrators better understand way of monitoring the performance of was dramatic: daily Web log analysis, customer activities and its applications. In the event of a service which previously took more than 10 responsiveness issues, to keep interruption, business managers had to hours, now completes in around an long-term planning ahead of demand. work with technical staff to pore through hour and a half. This meant that the Intel and Microsoft Customer Reference Case Study monitoring database, which had more high-volume Web environment, and the Intel Itanium 2 than 820 million rows after six months’ CommSec’s online environment is no servers“ and Microsoft SQL usage and was continuing to grow at exception. With millions of customers breakneck pace, could be processed, relying on its systems to complete Server 2005 have given analysed and reported upon well before essential transactions, it was imperative us an unprecedented view managers arrived at work in that CommSec’s systems be both the morning. responsive and effective in delivering the into the performance of information those users required. our online services so we This capability, in turn, has allowed CommSec to both better understand CommSec’s Web environment is built can focus on delivering the Web and intranet usage patterns, and on a Web services environment that is services customers to more readily identify and remediate supported by dozens of servers dishing any potential performance issues. For up millions of hits per week. Each time want – with the performance example, after a recent analysis showed any of those systems are accessed, details they expect. a slight slowdown in response time are recorded within the Web server logs. due to increasing numbers of users, the Those logs contain invaluable information Michael Blomfield technical managers were able to present about user session length, time to load Head, Commonwealth Securities Limited” concrete performance information to business managers and an additional particular pages, time spent on particular eight Web servers were quickly pages, the navigation path users take purchased to keep critical systems through the site, and other details that running within acceptable are essential to ensuring that the design service parameters. of such a high-volume Web site is best suiting its user’s needs. However, this Over time, increasingly sophisticated information was previously inaccessible analysis will give CommSec managers to managers, who were at best able to use even more visibility into user trends, third-party analysis tools to get only basic The previous allowing them to better classify users usage statistics for the day before. based on their usage patterns. In turn, database“ was just In the hopes of extracting meaningful this capability will help ensure that screaming out for more development testing best reflects information from the logs, EasternMining. memory. Now, with the real-world performance. com.au consultant Richard Lees was engaged to design a business intelligence power and memory of the “Deploying Intel Itanium 2 servers system that would let CommSec get 64-bit Intel Itanium 2 and Microsoft SQL Server 2005 to more meaningful information from its monitor our servers has given us an Web server logs. After spending time processors, and the unprecedented view into the manually importing and exporting the capabilities of Microsoft real-world performance of our critical log information into OLAP data cubes for SQL Server 2005, the whole online services,” said Blomfield. analysis, Lees and CommSec staff realised that an automated solution was going data transformation and “As we continue to add functionality to be necessary to keep up with steadily dimensionalisation process to our core Web sites, we can structure growing usage volumes. our business with the confidence that goes much faster. we can meet optimal service levels no “It’s critical to be able to perform fast matter how far our user based expands. ad hoc analysis of the logs to ensure Richard Lees This way, we can continue to focus on service level agreements are met,” said Principal, EasternMining.com.au ” delivering the services customers want – Lees. “This application allows the bank and the performance they expect.” to monitor the performance of the Web servers to analyse the actual experience of Technology Case the end user.” Performance monitoring is essential to In early 2005, CommSec took its first ensure the ongoing value of any step towards more effective log analysis Intel and Microsoft Customer Reference Case Study Lessons Learned by introducing a two-way 32-bit Intel compared with just nine on the old • It’s all about the user Architecture server running the Microsoft system. This means that data analysis can experience. Windows 2003 Server operating system conclude, and reports can be generated, and Microsoft SQL Server 2000 database. before managers arrive for work in the It doesn’t matter how effective your This system dimensionalised Web morning. Most queries on the OLAP new system is; if it’s not responsive server log information – compressing cube, which now contains nearly 1 billion and well-designed for user needs, and organising it by assigning codes to rows, are answered within one to they won’t make the most of it.
Recommended publications
  • Contents This Week with My Coleco ADAM 0009.18
    Contents This Week With My Coleco ADAM 0009.18 ............................................................................................ 9 I. Address Book Patch for ADAMserve. ............................................................................................... 9 II. SmartFiler Patch to Enable Database Creation Under ADAMserve/HARDDISK. .................. 10 III. Next Time. ....................................................................................................................................... 11 This Week With My Coleco ADAM 0009.10 .......................................................................................... 12 I. Finding a New Home for the TWWMCA Archive. .......................................................................... 12 II. Converting TWWMCA Plaintext to HTML. .................................................................................. 12 III. Sample HTML Converter Input and Output Text. .................................................................... 13 I. Administrivia. .................................................................................................................................... 17 II. Sample Numbered List. ................................................................................................................... 17 III. Sample Code Listing. ..................................................................................................................... 17 IV. Next Time. ......................................................................................................................................
    [Show full text]
  • Are Central to Operating Systems As They Provide an Efficient Way for the Operating System to Interact and React to Its Environment
    1 www.onlineeducation.bharatsevaksamaj.net www.bssskillmission.in OPERATING SYSTEMS DESIGN Topic Objective: At the end of this topic student will be able to understand: Understand the operating system Understand the Program execution Understand the Interrupts Understand the Supervisor mode Understand the Memory management Understand the Virtual memory Understand the Multitasking Definition/Overview: An operating system: An operating system (commonly abbreviated to either OS or O/S) is an interface between hardware and applications; it is responsible for the management and coordination of activities and the sharing of the limited resources of the computer. The operating system acts as a host for applications that are run on the machine. Program execution: The operating system acts as an interface between an application and the hardware. Interrupts: InterruptsWWW.BSSVE.IN are central to operating systems as they provide an efficient way for the operating system to interact and react to its environment. Supervisor mode: Modern CPUs support something called dual mode operation. CPUs with this capability use two modes: protected mode and supervisor mode, which allow certain CPU functions to be controlled and affected only by the operating system kernel. Here, protected mode does not refer specifically to the 80286 (Intel's x86 16-bit microprocessor) CPU feature, although its protected mode is very similar to it. Memory management: Among other things, a multiprogramming operating system kernel must be responsible for managing all system memory which is currently in use by programs. www.bsscommunitycollege.in www.bssnewgeneration.in www.bsslifeskillscollege.in 2 www.onlineeducation.bharatsevaksamaj.net www.bssskillmission.in Key Points: 1.
    [Show full text]
  • Taking Advantage of the SAS® System on the Windows® Platform
    Taking Advantage of the SAS® System on the Windows® Platform Gary Mehler, SAS, Cary, NC ABSTRACT background will help the reader understand the quickly changing landscape of basic capabilities As the Microsoft Windows platform continues to on personal computers. evolve and mature, business applications can more effectively realize large-scale benefits in this relatively cost-effective environment. This PLATFORM ISSUES paper presents a discussion of the state of the Windows platform {including Windows 2000 and It is useful to survey the state of operating Terminal Services) and how the SAS System systems and hardware from time to time, and takes advantage and integrates with the much has occurred in the last year: Windows operating system. New features of the Version 2000, Windows 98 Second Edition, and 8 SAS System are also covered. improved PC hardware is now available. In addition, future processor improvements and the advent of 64-bit personal computers are INTRODUCTION expected later in 2000. In the history of SAS software on the Windows platform, SAS Institute has provided various Welcome to Windows 2000 methods of taking advantage of features and other applications available on personal During 1999, much of the interest in the computers. In addition to reflecting the native Microsoft Windows platform revolved around the look and feel of the Windows platform, expected · release of the Windows 2000 interoperability has been a hallmark of the SAS operating system. After a very long development System for Windows. This interoperability has .cycle, Microsoft finally released some versions of taken the form of support for e-mail, Lotus Windows 2000 in February 2000, and the wide Notes, Windows Explorer integration, and other range of new capabilities of Windows 2000 methods of interacting with client application deserves study by administrators and software.
    [Show full text]
  • Kochakian. Birmingham, AL, the University of Alabama at Birmingham, 1984
    298 BOOK REVIEWS How IT WAS. ANABOLIC ACTION OF STEROIDS AND REMEMBRANCES. By Charles D. Kochakian. Birmingham, AL, The University of Alabama at Birmingham, 1984. 116 pp. $10.95. Charles D. Kochakian has had a long and distinguished career in the field of endocrine physiology. His most important work concerned the anabolic actions of steroids. While still a graduate student, Kochakian showed that the anabolic effects of male hormones could be quantitated by measuring the changes they caused in urinary nitrogen balance. He subsequently showed that this anabolic effect was independent of the actions of other endocrine systems and pioneered the concept of a single hormone having different effects at different tissue sites. His career spanned five decades and included professorships at the University of Rochester, University of Oklahoma School of Medicine, and the University of Alabama at Birmingham. How It Was presents a history of Dr. Kochakian's career. Except for the first chapter, "My Pathway to Endocrinology," and a couple of reflective chapters at the end, little personal material is included, the focus rather being on Kochakian's scientific life. This, in general, makes an interesting story, especially for the specialist in endocrinology. Kochakian does sometimes refer without explanation to obscure procedures and equipment of endocrinology with which most general medical readers are probably unfamiliar. For example, in discussing some of his early experiments on the effects of androgens on basal metabolic rate, he states: "I acquired the rudiments of basal metabolism determination by the closed-circuit Benedict and also the open- circuit Tissot-Haldane methods in the laboratory work of the course" (p.
    [Show full text]
  • Oracle VM Virtualbox User Manual
    Oracle VM VirtualBox R User Manual Version 4.2.6 c 2004-2012 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 10 1.1 Why is virtualization useful?............................. 11 1.2 Some terminology................................... 11 1.3 Features overview................................... 12 1.4 Supported host operating systems.......................... 14 1.5 Installing VirtualBox and extension packs...................... 15 1.6 Starting VirtualBox.................................. 16 1.7 Creating your first virtual machine......................... 17 1.8 Running your virtual machine............................ 20 1.8.1 Starting a new VM for the first time.................... 20 1.8.2 Capturing and releasing keyboard and mouse.............. 21 1.8.3 Typing special characters.......................... 22 1.8.4 Changing removable media......................... 23 1.8.5 Resizing the machine’s window...................... 23 1.8.6 Saving the state of the machine...................... 23 1.9 Using VM groups................................... 24 1.10 Snapshots....................................... 25 1.10.1 Taking, restoring and deleting snapshots................. 25 1.10.2 Snapshot contents.............................. 27 1.11 Virtual machine configuration............................ 28 1.12 Removing virtual machines.............................. 28 1.13 Cloning virtual machines............................... 28 1.14 Importing and exporting virtual machines..................... 29 1.15 Global Settings...................................
    [Show full text]
  • Final Exam Review
    COM153 - FARRIS Final Exam Review 1. This type of small integrated circuit is central for a desktop computer, performing the processing for the computer. A. RAM B. ROM BIOS C. motherboard D. microprocessor 2. This is the central circuit board of a computer. A. memory B. motherboard C. ROM BIOS D. video adapter 3. This integrated circuit chip contains the program code that informs the processor of the devices present and how to communicate with them. A. ROM BIOS B. RAM C. video adapter D. motherboard 4. To communicate from your desktop PC to a service on your network and access the features of that service requires special ____________ software. A. driver B. ROM BIOS C. operating system D. client 5. The user communicates with the OS through this software layer. A. jog management B. user interface C. device management D. video adapter 6. What job function is not found in single tasking operating systems? A. user interface B. device management C. memory management D. task management COM153 - FARRIS 7. Without this feature of modern desktop OSs, you would not be able to open a new application after your operating system and currently opened applications and data filled the entire physical RAM. A. RTOS B. device management C. GUI D. virtual memory 8. What is the greatest amount of RAM usable by a 64-bit edition of Windows 7? A. 4 GB B. 128 GB C. 192 GB D. 16 GB 9. What term is used in a GUI to describe a specialized disk file that contains information about other files? A.
    [Show full text]
  • SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks
    2009 International Conference on Advanced Information Networking and Applications Workshops SSL-based Lightweight Security of IP-based Wireless Sensor Networks Wooyoung Jung, Sungmin Hong, Minkeun Ha, Young-Joo Kim, Daeyoung Kim† 1Korea Advanced Institute of Science and Technology [email protected], {ghitsh, minkeun.ha, yjkim73, kimd}@kaist.ac.kr Abstract—IP-based wireless sensor networks (IP-WSN) are security consideration [3], but still no solution has been popularly recognized as a global sensor networks infrastructure suggested. by combining IPv6 technology with wireless sensor networks We suggest lightweight Secure Sockets Layer (SSL) [11] (WSN). However, IP-WSN, currently, does not provide security for IP-WSN security using ECC [5] instead of RSA for key- because it is commonly recognized that it is a big burden for IP- exchange and authentication, RC4 for data encryption, and WSN to adapt Internet’s dominant security protocol. We suggest a security protocol for IP-WSN based on Secure Sockets Layer SHA1 and MD5 hashing algorithms and present it in this (SSL). We have developed IP-WSN sensor node hardware with paper. This lightweight SSL is small enough to be operated in 16-bit MSP430 MCU including 116 KB Flash and 8 KB RAM, the highly restricted device resources including 16-bit MCU, and implemented IP-WSN software stack and lightweight SSL 116 KB Flash memory, and 8 KB RAM with embedded OS, components. The resource consumption is around 64 KB of Flash IEEE 802.15.4 PHY/MAC, lightweight TCP/IP stacks and and 7 KB of RAM when it is used that ECC for key-exchange 6LoWPAN adaptation layer.
    [Show full text]
  • Openvz User's Guide
    OpenVZ User’s Guide December 20, 2016 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 http://www.virtuozzo.com Copyright © 1999-2016 Parallels IP Holdings GmbH and its affiliates. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at http://www.virtuozzo.com/legal/. Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Apple, Mac, the Mac logo, Mac OS, iPad, iPhone, iPod touch, FaceTime HD camera and iSight are trademarks of Apple Inc., registered in the US and other countries. Linux is a registered trademark of Linus Torvalds. All other marks and names mentioned herein may be trademarks of their respective owners. Table of Contents 1. Learning OpenVZ Basics ..................................................................................................................... 8 1.1. OpenVZ Overview ..................................................................................................................... 8 1.2. OS Virtualization Layer .............................................................................................................. 8 1.2.1. Basics of OS Virtualization ............................................................................................. 8 1.2.2. OpenVZ Containers .......................................................................................................
    [Show full text]
  • Frequently Asked Questions for Freebsd 11.X and 12.X
    Frequently Asked Questions for FreeBSD 11.X and 12.X Frequently Asked Questions for FreeBSD 11.X and 12.X Revision: eab1c5d1f6 Copyright © 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 The FreeBSD Documentation Project Abstract This is the Frequently Asked Questions (FAQ) for FreeBSD versions 12.X and 11.X. Every effort has been made to make this FAQ as informative as possible; if you have any suggestions as to how it may be improved, send them to the FreeBSD documentation project mailing list. The latest version of this document is always available from the FreeBSD website. It may also be downloaded as one large HTML le with HTTP or as a variety of other formats from the FreeBSD FTP server. Copyright Redistribution and use in source (XML DocBook) and 'compiled' forms (XML, HTML, PDF, PostScript, RTF and so forth) with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code (XML DocBook) must retain the above copyright notice, this list of condi- tions and the following disclaimer as the rst lines of this le unmodified. 2. Redistributions in compiled form (transformed to other DTDs, converted to PDF, PostScript, RTF and other formats) must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Important THIS DOCUMENTATION IS PROVIDED BY THE FREEBSD DOCUMENTATION PROJECT "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICU- LAR PURPOSE ARE DISCLAIMED.
    [Show full text]
  • FEM Simulations: Effects of Improvements in Information Technologies on the Computational Time with Large Full Vehicle FEM Models
    FEM simulations: effects of improvements in information technologies on the computational time with large full vehicle FEM models A. Ghelardini, G. Mancini, C. Goracci, A. Cera, A. Corbizi, D. Russo Trenitalia S.p.A., Florence, Italy Abstract New well designed computing platforms for FEM simulators and new hardware and software computing technologies have allowed to address FEM related scalability constraints. The latest 64 bit computer technologies are tremendously improving Technical and Research Department capability to deal with more complex and realistic simulation models, simultaneously reducing the department FEM related response times. Introduction Trenitalia is the main Train Operator Company in Italy, it is responsible for managing the development, construction and maintenance of the rail transportation system (Image 1) in the country. In this capacity, the Trenitalia Technical and Research Department uses ANSYS Mechanical for the following activities: • Design optimization for implementation of new equipment on existing locomotives, coaches and wagons of Trenitalia fleet. • Stress strength structural checks to comply with safety transportation rules for new vehicles. • Maintenance engineering planning for bogies and/or body frames deteriorated by fatigue and corrosion phenomena. Looking for FEM optimized computing platforms The need for larger analysis models and shorter computer response times led Trenitalia to evaluate new calculation solutions. In looking for more computational power to improve mechanical stress simulation capability, Trenitalia Technical and Research Department, in cooperation with Information Technology Department, investigated how finite element programs interact with modern operating systems. This research activity demonstrated the following main constraints in dealing with production-size models: • Model size is limited by the amount of real memory used by 32-bit FEM programs (especially in their internal databases) in a 32-bit computing solution.
    [Show full text]
  • CS 450: Operating Systems Michael Lee <[email protected]>
    x86 & xv6 overview CS 450: Operating Systems Michael Lee <[email protected]> Agenda - Motivation - x86 ISA - PC architecture - UNIX - xv6 Motivation - OS relies on many low-level hardware mechanisms to do its job - To work on an OS kernel, we must be intimately familiar with the underlying ISA and PC hardware - Hardware may dictate what is or isn’t possible, and influence how we represent and manage system-level structures - We focus on x86, but all modern ISAs support the mechanisms we need - e.g., xv6 has been ported to ARM already § x86 Documentation - Intel IA-32 Software Developer’s Manuals are complete references - Volume 1: Architectural Overview - Volume 2: Instruction Set Reference - Volume 3: Systems Programming Guide - Many diagrams in slides taken from them x86 coverage - Timeline - Syntax - Registers - Instruction operands - Instructions and sample usage - Processor modes - Interrupt & Exception handling Timeline - 1978: Intel released 8086, a 16-bit CPU - 1982: 80186 and 80286 (still 16-bit) - 1985: 80386 was the first 32-bit x86 CPU (aka i386/IA-32) - 2000: AMD created x86-64: 64-bit ISA compatible with x86 - 2001: Intel released IA-64 “Itanium” ISA, incompatible with x86 - End-of-life announced in 2019 (i.e., official failure) x86 ISA - xv6 uses the IA-32 ISA - But we can still build/run it on x86-64! - x86 is a CISC ISA, so we have: - Memory operands for non-load/store instructions - Complex addressing modes - Relatively large number of instructions Syntax / Formatting - Two common variants: Intel and AT&T syntax - Intel syntax common in Windows world - e.g., mov DWORD PTR [ebp-4], 10 ; format: OP DST, SRC - AT&T syntax common in UNIX world (default GCC output) - e.g., movl $10, -4(%ebp) # format: OP SRC, DST - We will use this syntax BASIC EXECUTION ENVIRONMENT • General-purpose registers.
    [Show full text]
  • Virtuozzo Hybrid Server 7
    Virtuozzo Hybrid Server 7 User's Guide September 30, 2021 Virtuozzo International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 https://virtuozzo.com Copyright ©2016-2021 Virtuozzo International GmbH. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at . Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Apple, Mac, the Mac logo, Mac OS, iPad, iPhone, iPod touch, FaceTime HD camera and iSight are trademarks of Apple Inc., registered in the US and other countries. Linux is a registered trademark of Linus Torvalds. All other marks and names mentioned herein may be trademarks of their respective owners. Contents 1. Learning the Basics ................................................ 1 1.1 Virtuozzo Hybrid Server Overview .................................... 1 1.2 Differences between Virtuozzo Hybrid Server and OpenVZ ..................... 2 1.3 OS Virtualization Layer ........................................... 2 1.3.1 Basics of OS Virtualization .................................... 2 1.3.2 Virtuozzo Containers ....................................... 3 1.3.2.1 Virtuozzo Container Hardware ........................... 5 1.3.3 Memory and IOPS Deduplication ................................ 5 1.3.4 Templates ............................................. 6 1.4 Hardware Virtualization Layer .....................................
    [Show full text]