Scaling Emulation and Software Preservation Infrastructure

Total Page:16

File Type:pdf, Size:1020Kb

Scaling Emulation and Software Preservation Infrastructure Scaling Emulation And Software Preservation Infrastructure Emulation 3 4 5 6 Logos taken from project/product websites for: CCS64, MAME, DOSBOX, vmware, VirtualBox, MESS, WinUAE, QEMU, Mini vMac, SheepShaver, Hatari Does Emulation = Virtualization? Yes No An emulated Emulated computing hardware exists environment can entirely in safely be called a software; “virtual machine” virtualization relies (opposite of on at least some “physical machine”) physical hardware (e.g. a CPU) 7 Clockwise from top: Mac OS 7.5 running in Basilisk II, Mac OS 9.0.2 running in 8 SheepShaver, and Apple System Software 5.0 in Mini vMac Emulation-as- a-Service EaaS ○ ○ 10 11 12 Benefits ○ ○ ○ ○ 13 14 15 Challenges One 17 Two 18 Three 19 Four 20 21 Scale Up ○ ○ ○ 22 Distributed Management ○ ○ ○ 23 Description ○ ○ ○ 24 Access ○ ○ ○ ○ 25 Demo An emulated computing environment as initially imported into or created within EaaS. Base Environment Hardware Configuration Operating System Environment Types 27 A derivative environment in which Software has been imported, installed, configured and saved into a Base Environment. Software Environment Software Hardware Configuration Operating System Environment Types 28 A derivative environment in which a digital object (file, set of files, disk image, etc.) has been imported, saved, and/or installed into a Base Environment or Software Environment from the node’s available collections (Object Archive). Object Environment Object Software Hardware Configuration Operating System Environment Types 29 How it Works Snapshot - Based Storage 31 EaaS Architecture 32 Self-contained HTML Embedded HTML EaaS Model 33 EaaSI Model (more or less) 34 OAI-PMH Service 35 Our Team ● Euan Cochrane (YUL) ● Seth Anderson (YUL) ● me (YUL) ● Klaus Rechert & Oleg Stobbe (OpenSLX) ● Jessica Meyerson (Educopia/SPN) ● Kat Thornton (Data Current/WikiDP) ● Justin Aubin, Mac Schmidt, Zoe Sinclair, Idris Sylvester, Eric Timperman, Matt Tu, Kohei Yamaguchi ● 37 Our Node Hosts University of California - San Diego Stanford University Notre Dame University Carnegie Mellon University University of Virginia Yale University 38 Affiliated Projects Code of Best Fostering Practices for Fair Communities of Use in Software Practice: Software Preservation Preservation and Emulation in Giving individuals Libraries, Archives and institutions and Museums clear guidance on the legality of archiving software. 39 A Very Special Thanks to our Funders... 40 Thanks! You can find me at ○ ○ ○ Learn more at ○ ○ 41 Image Credits (non-EaaSI) ○ https://dpconline.org/blog/idpd/designing-a-uvi-for-digital-objects ○ Emulation logos: ○ http://ccs64.com/ ○ https://www.mamedev.org/ ○ https://www.dosbox.com/ ○ http://www.winuae.net/ ○ https://www.virtualbox.org/ ○ https://www.qemu.org/ ○ https://www.gryphel.com/c/minivmac/index.html ○ https://sheepshaver.cebix.net/ ○ https://hatari.tuxfamily.org/ ○ http://archive.rhizome.org/theresa-duncan-cdroms/ ○ https://blogs.loc.gov/thesignal/2014/08/emulation-as-a-service-eaas-a t-yale-university-library/ 42.
Recommended publications
  • Running Telecom/TT-Link and Trafman Under Windows 7 (And Up) Using Dosbox
    Running Telecom/TT-Link and Trafman under Windows 7 (and up) using DOSbox 3/31/2014 Documentation written for: Telecom/TT-Link V3.97 or later. TrafMan V6.43 or later. DOSbox V0.74 or later. COM/IP V4.9.5 or later. TrafMan & Telecom/TT-Link on Windows 7 Page 1 of 10 I. Introduction and Initial Emulator Setup Microsoft discontinued support for MS-DOS level programs starting with Windows 7. This has made the operation of Telecom/TT-Link and TrafMan on systems with a Windows 7 or later operating systems problematical, to say the least. However, it is possible to achieve functionality (with some limits) even on a Windows 7 computer by using what is known as a “DOS Emulator”. Emulator’s simulate the conditions of an earlier operating system on a later one. For example, one of the most common emulators is called DOSbox (http://sourceforge.net/projects/dosbox/ ) and it is available as a free download for both PC and Mac computers. DOSbox creates an artificial MS-DOS level environment on a Windows 7 computer. Inside this environment you can run most DOS programs, including TrafMan and Telecom/TT-Link. This document describes how to utilize the DOSbox emulator for running Telecom/TT-Link and TrafMan. It should be noted, however, that other emulators may also work and this document can serve as a guide for setting up and using similar DOS emulators as they are available. Initial DOSbox Emulator Setup: 1) Download the latest release of DOSbox (0.74 or later) to your PC and install it.
    [Show full text]
  • Digital Forensics and Preservation 1
    01000100 01010000 Digital 01000011 Forensics 01000100 and Preservation 01010000 Jeremy Leighton John 01000011 01000100 DPC Technology Watch Report 12-03 November 2012 01010000 01000011 01000100 01010000 Series editors on behalf of the DPC 01000011 Charles Beagrie Ltd. Principal Investigator for the Series 01000100 Neil Beagrie 01010000 01000011DPC Technology Watch Series © Digital Preservation Coalition 2012 and Jeremy Leighton John 2012 Published in association with Charles Beagrie Ltd. ISSN: 2048-7916 DOI: http://dx.doi.org/10.7207/twr12-03 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing from the publisher. The moral right of the author has been asserted. First published in Great Britain in 2012 by the Digital Preservation Coalition. Foreword The Digital Preservation Coalition (DPC) is an advocate and catalyst for digital preservation, ensuring our members can deliver resilient long-term access to digital content and services. It is a not-for- profit membership organization whose primary objective is to raise awareness of the importance of the preservation of digital material and the attendant strategic, cultural and technological issues. It supports its members through knowledge exchange, capacity building, assurance, advocacy and partnership. The DPC’s vision is to make our digital memory accessible tomorrow. The DPC Technology Watch Reports identify, delineate, monitor and address topics that have a major bearing on ensuring our collected digital memory will be available tomorrow. They provide an advanced introduction in order to support those charged with ensuring a robust digital memory, and they are of general interest to a wide and international audience with interests in computing, information management, collections management and technology.
    [Show full text]
  • Virtualization Technologies Overview Course: CS 490 by Mendel
    Virtualization technologies overview Course: CS 490 by Mendel Rosenblum Name Can boot USB GUI Live 3D Snaps Live an OS on mem acceleration hot of migration another ory runnin disk alloc g partition ation system as guest Bochs partially partially Yes No Container s Cooperati Yes[1] Yes No No ve Linux (supporte d through X11 over networkin g) Denali DOSBox Partial (the Yes No No host OS can provide DOSBox services with USB devices) DOSEMU No No No FreeVPS GXemul No No Hercules Hyper-V iCore Yes Yes No Yes No Virtual Accounts Imperas Yes Yes Yes Yes OVP (Eclipse) Tools Integrity Yes No Yes Yes No Yes (HP-UX Virtual (Integrity guests only, Machines Virtual Linux and Machine Windows 2K3 Manager in near future) (add-on) Jail No Yes partially Yes No No No KVM Yes [3] Yes Yes [4] Yes Supported Yes [5] with VMGL [6] Linux- VServer LynxSec ure Mac-on- Yes Yes No No Linux Mac-on- No No Mac OpenVZ Yes Yes Yes Yes No Yes (using Xvnc and/or XDMCP) Oracle Yes Yes Yes Yes Yes VM (manage d by Oracle VM Manager) OVPsim Yes Yes Yes Yes (Eclipse) Padded Yes Yes Yes Cell for x86 (Green Hills Software) Padded Yes Yes Yes No Cell for PowerPC (Green Hills Software) Parallels Yes, if Boot Yes Yes Yes DirectX 9 Desktop Camp is and for Mac installed OpenGL 2.0 Parallels No Yes Yes No partially Workstati on PearPC POWER Yes Yes No Yes No Yes (on Hypervis POWER 6- or (PHYP) based systems, requires PowerVM Enterprise Licensing) QEMU Yes Yes Yes [4] Some code Yes done [7]; Also supported with VMGL [6] QEMU w/ Yes Yes Yes Some code Yes kqemu done [7]; Also module supported
    [Show full text]
  • THE PRES/URRECTION of DEENA LARSEN's “MARBLE SPRINGS, SECOND EDITION” by LEIGHTON L. CHRISTIANSEN THESIS Submitted in Part
    THE PRES/URRECTION OF DEENA LARSEN’S “MARBLE SPRINGS, SECOND EDITION” BY LEIGHTON L. CHRISTIANSEN THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Library and Information Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2012 Urbana, Illinois Adviser: Associate Professor Jerome McDonough © 2012 Leighton L. Christiansen Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License 2012 Leighton L. Christiansen Abstract The following is a report on one effort to preserve Deena Larsen’s hypertextual poetic work Marble Springs, Second Edition (MS2). As MS2 is based on Apple’s HyperCard, a software program that is no longer updated or supported, MS2, and other works created in the same environment, face extinction unless action is taken. The experiment below details a basic documentary approach, recording functions and taking screen shots of state changes. The need to preserve significant properties is discussed, as are the costs associated with this preservation approach. ii Acknowledgments This project would not have been possible without the help and support of many people. First I have to thank Deena Larsen for entrusting me with “her baby,” Marble Springs, and a number of obsolete Macs. Many thanks to my readers, Jerome McDonough and Matthew Kirschenbaum, who offered helpful insights in discussions and comments. A great deal of appreciation is due to my team of proofreaders, Lynn Yarmey, Mary Gen Davies, April Anderson and Mikki Smith. Anyone who has to try to correct my poor spelling over 3,000 pages deserves an award. Finally, thanks to my classmates, professors, and friends at GSLIS, who listened to me talk on and on about this project, all of whom had to wonder when I would finish.
    [Show full text]
  • The Art of Virtualization with Free Software Master on Free Software 2009/2010
    What is Virtualization Types of Virtualization The Art of Virtualization with Free Software Master on Free Software 2009/2010 Miguel Vidal, Jos´eCastro {mvidal,jfcastro}@libresoft.es GSyC/Libresoft – URJC April 24th, 2010 Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization (cc) 2010 Miguel Vidal, Jos´eCastro. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License, available at http://creativecommons.org/licenses/by-sa/3.0/ Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization Agenda Part 1: What is Virtualization Part 2: Types of Virtualization Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization What is Virtualization Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization What is Virtualization Hardware/software combination, which allows a computer to act as several ones. It includes making a single physical resource (such as a server, an operating system, or storage device) appears to function as multiple logical resources. Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization Definitions Virtualization is a methodology of dividing the resources of a computer into multiple execution environments. Virtualization applies one or more concepts or technologies such as partitioning, time-sharing, partial or complete machine simulation, emulation, quality of service, and many others. Colloquially, virtualization refers to the abstraction of computer resources. Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization Hypervisors In modern computing, Virtual Machine Monitors (aka hypervisors) allow many different OS, tasks and software configurations exist on the same physical machine.
    [Show full text]
  • It Worked Yesterday: on (Re-) Performing Electroacoustic Music
    University of Huddersfield Repository Berweck, Sebastian It worked yesterday: On (re-)performing electroacoustic music Original Citation Berweck, Sebastian (2012) It worked yesterday: On (re-)performing electroacoustic music. Doctoral thesis, University of Huddersfield. This version is available at http://eprints.hud.ac.uk/id/eprint/17540/ The University Repository is a digital collection of the research output of the University, available on Open Access. Copyright and Moral Rights for the items on this site are retained by the individual author and/or other copyright owners. Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any format or medium for personal research or study, educational or not-for-profit purposes without prior permission or charge, provided: • The authors, title and full bibliographic details is credited in any copy; • A hyperlink and/or URL is included for the original metadata page; and • The content is not changed in any way. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected]. http://eprints.hud.ac.uk/ It worked yesterday On (re-)performing electroacoustic music A thesis submitted to the University of Huddersfield in partial fulfilment of the requirements for the degree of Doctor of Philosophy Sebastian Berweck, August 2012 Abstract Playing electroacoustic music raises a number of challenges for performers such as dealing with obsolete or malfunctioning technology and incomplete technical documentation. Together with the generally higher workload due to the additional technical requirements the time available for musical work is significantly reduced.
    [Show full text]
  • International Journal for Scientific Research & Development
    IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 02, 2014 | ISSN (online): 2321-0613 Virtualization : A Novice Approach Amithchand Sheety1 Mahesh Poola2 Pradeep Bhat3 Dhiraj Mishra4 1,2,3,4 Padmabhushan Vasantdada Patil Pratishthan’s College of Engineering, Eastern Express Highway, Near Everard Nagar, Sion-Chunabhatti, Mumbai-400 022, India. Abstract— Virtualization provides many benefits – greater as CPU. Although hardware is consolidated, typically efficiency in CPU utilization, greener IT with less power OS are not. Instead, each OS running on a physical consumption, better management through central server becomes converted to a distinct OS running inside environment control, more availability, reduced project a virtual machine. The large server can "host" many such timelines by eliminating hardware procurement, improved "guest" virtual machines. This is known as Physical-to- disaster recovery capability, more central control of the Virtual (P2V) transformation. desktop, and improved outsourcing services. With these 2) Consolidating servers can also have the added benefit of benefits, it is no wondered that virtualization has had a reducing energy consumption. A typical server runs at meteoric rise to the 2008 Top 10 IT Projects! This white 425W [4] and VMware estimates an average server paper presents a brief look at virtualization, its benefits and consolidation ratio of 10:1. weaknesses, and today’s “best practices” regarding 3) A virtual machine can be more easily controlled and virtualization. inspected from outside than a physical one, and its configuration is more flexible. This is very useful in I. INTRODUCTION kernel development and for teaching operating system Virtualization, in computing, is a term that refers to the courses.
    [Show full text]
  • MX-19.2 Users Manual
    MX-19.2 Users Manual v. 20200801 manual AT mxlinux DOT org Ctrl-F = Search this Manual Ctrl+Home = Return to top Table of Contents 1 Introduction...................................................................................................................................4 1.1 About MX Linux................................................................................................................4 1.2 About this Manual..............................................................................................................4 1.3 System requirements..........................................................................................................5 1.4 Support and EOL................................................................................................................6 1.5 Bugs, issues and requests...................................................................................................6 1.6 Migration............................................................................................................................7 1.7 Our positions......................................................................................................................8 1.8 Notes for Translators.............................................................................................................8 2 Installation...................................................................................................................................10 2.1 Introduction......................................................................................................................10
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]
  • Challenges in Firmware Re-Hosting, Emulation, and Analysis
    Challenges in Firmware Re-Hosting, Emulation, and Analysis CHRISTOPHER WRIGHT, Purdue University WILLIAM A. MOEGLEIN, Sandia National Laboratories SAURABH BAGCHI, Purdue University MILIND KULKARNI, Purdue University ABRAHAM A. CLEMENTS, Sandia National Laboratories System emulation and firmware re-hosting have become popular techniques to answer various security and performance related questions, such as, does a firmware contain security vulnerabilities or meet timing requirements when run on a specific hardware platform. While this motivation for emulation and binary analysis has previously been explored and reported, starting to either work or research in the field is difficult. To this end, we provide a comprehensive guide for the practitioner or system emulation researcher. We layout common challenges faced during firmware re-hosting, explaining successive steps and surveying common tools used to overcome these challenges. We provide classification techniques on five different axes, including emulator methods, system type, fidelity, emulator purpose, and control. These classifications and comparison criteria enable the practitioner to determine the appropriate tool for emulation. We use our classifications to categorize popular works in the field and present 28 common challenges faced when creating, emulating and analyzing a system, from obtaining firmwares to post emulation analysis. CCS Concepts: • Computer systems organization → Embedded and cyber-physical systems; Firmware; Embedded hardware; Embedded software; Real-time systems; • Hardware → Simulation and emulation. Additional Key Words and Phrases: Firmware re-hosting, system emulation, embedded systems, emulation fidelity, emulator classification, binary analysis, reverse engineering, emulation challenges ACM Reference Format: Christopher Wright, William A. Moeglein, Saurabh Bagchi, Milind Kulkarni, and Abraham A. Clements. 2020. Challenges in Firmware Re-Hosting, Emulation, and Analysis.
    [Show full text]
  • The Black Art of DOS Emulation on Raspberry Pi
    The Black Art of DOS emulation on Raspberry Pi Using FastDOSBox. By : [email protected] www.norisc-nofun.co.uk Version 1.0 – May 2013, Author : Franck / NoRiscNoFun , [email protected] – twitter : @Noriscnofun1 Table of Contents What is DOS emulation for who and for what ?..................................................................................3 Why choosing FastDOSBox for DOS emulation on the Rpi ?............................................................4 Installing FastDOSBox on the Raspberry Pi........................................................................................5 For RISC OS....................................................................................................................................5 For Raspbian....................................................................................................................................5 Recommended Raspberry Pi CPU settings for FastDOSBox..............................................................6 Recommended configuration settings for FastDOSBox......................................................................7 [dosbox] Section..............................................................................................................................7 [render] Section................................................................................................................................7 [cpu] Section....................................................................................................................................7
    [Show full text]