AIX Marketplace, Trends & Directions!

Total Page:16

File Type:pdf, Size:1020Kb

AIX Marketplace, Trends & Directions! IBM Power Systems AIX Marketplace, Trends & Directions! Provide a high-value Platform for mission-critical Workloads while Modernizing for Open Source, Cloud & AI Petra Bührer Global Sales Leader, IBM Power Systems AIX and IBM i [email protected] | @PetraBuehrer Carl Burnett Distinguished Engineer, Software Development Power Systems [email protected]| @RodneyBurnett Maria Ward AIX Offering Manager, IBM Power Systems [email protected] | @MariaWard th TechUTalks / Power Systems / AIX Marketplace, Trends & Directions / April 2020 April 7 , 2020 Please Note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice and at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. TechUTalks / Power Systems / AIX Marketplace, Trends & Directions / April 2020 2 © 2020© IBM Corporation Accelerating Customer Transformation Modernize your Infrastructure Open to the Core & Co-optimized OpenPOWER, POWER9 Value OpenCAPI, Open ISA New Workload Integration Linux Foundation Hybrid Multi-Cloud Open Source Workloads, Open Frameworks Enterprise class Linux Cognitive Infrastructure SAP HANA Accelerated Computing (AC922) Simplifying AI dev. & training 2,000+ clients #1 and #2 supercomputers 50+ CSPs PowerAI TechUTalks / Power Systems / AIX Marketplace, Trends & Directions / April 2020 3 © IBM Corporation POWER9 - Infrastructure Matters Modernize your Infrastructure Open to the Core & Co-optimized Big Data Workloads Mission-Critical Workloads! Linux Cluster Systems Enterprise Systems Scale-Out Systems LC922 E980 E950 S922/S914/S924 H922/H924/L922 AI Workloads GPU Systems AC922 IC922 Enterprise class Linux SAP HANA Cognitive Infrastructure PowerAI TechUTalks / Power Systems / AIX Marketplace, Trends & Directions / April 2020 4 © IBM Corporation AIX Strategic Themes — Provide a high value platform for core business production workloads Performance Remote Resilience Availability Security & Scale Management Mission Critical! & Reliability Ø Rock solid Foundation for Application Consolidation with Flexibility – on prem and in the public cloud! Ø E.g. Oracle Applications - On Power / AIX clients can run their Oracle DB, middleware, application (Extended) support servers, as well as countless industry Oracle application on the same platform and bridge to new until at least 2030 for Oracle workloads side by side & SAP on AIX! Ø E.g. SAP Applications – On Power / AIX we support a variety of SAP Components, like SAP BW, or SAP ECC while providing the capability and flexibility to extend to SAP HANA on Power side by side, on the same systems Performance Security Availability Investment Protection AIX Cognitive Open Automation Cloud-Ready TechUTalks / Power Systems / AIX Marketplace, Trends & Directions / April 2020 5 © 2020© IBM Corporation AIX Strategic Themes — Provide a high value platform for core business production workloads Performance Remote Resilience Availability Security & Scale Management Mission Critical! & Reliability — Exploit open technology IBM Cloud Paks — Enable cloud management and flexible infrastructure choices — AIX Cognitive Data Connect IBM DB2 for AIX / Oracle for AIX Performance Security Availability Investment Protection AIX Cognitive Open Automation Cloud-Ready TechUTalks / Power Systems / AIX Marketplace, Trends & Directions / April 2020 6 © 2020© IBM Corporation AIX Support Matrix TCO Security Support New Features / Power AIX 5.3 AIX 6.1 AIX 7.1 AIX 7.2 New Innovation are put in the Offerings Platform most current release stream POWER4 which is AIX 7.2 POWER5 The last AIX 7.1 TL shipped 4Q2017 POWER6 POWER7 AIX 6.1 is in its extended support period Ø AIX 6.1 on Power6: EoS April 2020 POWER8 Ø AIX 6.1 on POWER7 : September 2020 Ø AIX 6.1 on POWER7+ : December 2021 POWER9 Ø AIX 6.1 on POWER8® , or later: April 2022 Support Supported in Supported in expired P6 Mode P8 Mode AIX 5.3 Not Supported in Supported in Supported P7 Mode Native Mode 2019 was end of service for POWER5, POWER6, and POWER7 ! RFA: https://www-01.ibm.com/common/ssi/cgi- bin/ssialias?infotype=AN&subtype=CA&htmlfid=897/ENUS219-448&appname=USN TechUTalks / Power Systems / AIX Marketplace, Trends & Directions / April 2020 7 © IBM Corporation AIX Release Roadmap View 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 AIXnext GA tbd AIX 7.2 GA 12/2015 TL1 TL2 TL3 AIX 7.1 GA 09/2010 TL5 EOM EOS EOL AIX 6.1 GA 11/2007 EOM 4/16 EOS 4/17 EOL Marketed and serviced Technology Level (TL) Serviced only Last TL Fee-based service extension P9 Enablement SPs All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Updated AIX Strategy Paper! (2019) All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only TechUTalks / Power Systems / AIX Marketplace, Trends & Directions / April 2020 8 © IBM Corporation Provide a high value Platform for Mission Critical Workloads while Modernizing for Open Source, Cloud & AI – AIX and other Power Systems SW Highlights Workload Optimization Cloud Continuous Availability Security & Compliance Oracle Certified! New Levels of Workload AIX in the public Cloud Enhanced Scope & Enhanced Security and Scalability Ø AIX in the IBM Cloud Usability for AIX Live Update Compliance Capabilities Ø Improved (de)compression Ø AIX in the Google Cloud Ø Kerberos Support Ø IPSEC Resiliency Improvements performance leveraging Power9 Ø AIX in the Skytap Cloud (e.g. Azure) Ø AutoFS Support Ø Trusted Boot & Secure Install on-chip GZIP accelerator Ø AIX in various other CSPs’ Clouds Ø Improved preview behavior Ø SMB 2.1 support Ø Improved interrupt performance Ø Improved error handling via XIVE enablement PowerVC 1.4.4 PowerSC 1.3 Ø VMM lock scaling for improved PowerVM 3.1.1 Ø Set of new AIX compliance profiles SAP workload performance AIX & Cloud native Apps Ø Enhanced SSP network resiliency Ø DoD STIG 7 Ø High speed network adapter / built-in network failover Ø SAP (100Gb) performance improvements Ø Integration with Cloud native apps Ø CIS / IBM Cloud Paks on OpenShift Ø IBM i Best Practices PowerHA for AIX 7.2.4 AI for data residing on AIX Ø API access to workloads / data Ø PowerSC MFA Integration Ø Cross Cluster Verification Ø Availability of Python based running on AIX Ø MQ Listener Support Machine Learning packages PowerSC MFA 1.2.0.2 on the AIX toolbox AIX & Open Source VM Recovery Manager 1.4 Ø Web Services APIs Ø Tech Preview: Enable scoring / Ø A huge set of added / updated Ø VM workgroups spanning Ø Failover scenario support inferencing capabilities on packages on the AIX Toolbox multiple hosts PowerVM-based Systems Ø Building blocks for AIX patching Ø HA/DR unified management PowerHA for AIX 7.2.4 (via WML CE / H2O DAI) and VIOS update use cases (Ansible, Chef, Puppet) Ø Encrypted password management RFA: https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=AN&subtype=CA&htmlfid=897/ENUS219-448&appname=USN TechUTalks / Power Systems / AIX Marketplace, Trends & Directions / April 2020 9 © 2020© IBM Corporation New Levels of OS Security – Secure Boot and Trusted Installs AIX Secure Boot and Trusted Install / Update Operations allow to verify that the AIX OS Images were provided from IBM and have not been tampered with! Secure Boot (TL3 and above; POWER9 only) — AIX secure boot extends IBM PowerVM firmware secure boot to AIX VMs! Ø The partition firmware validates the digital signature of AIX when booting up the OS Ø Applies for kernel extensions, device drivers, shared libraries, executable binaries, and scripts Trusted Installs and Update Operations (all supported Power Systems HW) — TL3: Enablement - New support for signature-based checks during installation / update operations Ø TL3 and packages contained are not yet shipping with signatures! — TL4: Leveraging the enablement done in TL3 & shipped first official packages that had signatures Ø Beginning with this TL, everything is signed and loaded into the system automatically (everything build with AIX) Ø When applying these, they are validated with AIX trusted installation and update policies — Next: Enable customized packages to allow other teams, partners and clients to add their own signatures (Signature DB support) Ø Packages that are created, delivered and shipped by other offerings like PowerVC, PowerHA, and PowerSC, or Db2 Ø Extension of ‘create package sign’ with APIs to pass product data to it! è Everything installable on AIX could have
Recommended publications
  • TCPDUMP Caution
    TCPDUMP q Refer to book ”Open Source Network Administration” m Online sample chapter: http://www.phptr.com/articles/article.asp?p=170902&seqNum=4 q Some tools are not based directly on the data being transmitted on a network, but information related to that data. m For example, network bandwidth values m System logs on network equipment q Sometimes needs to examine the packets themselves. m Diagnose some particularly tricky network problems q Widely used open source tool for directly analyzing packets: tcpdump m http://www.tcpdump.org/ Network Analyzer 1-1 Caution q Before you use tcpdump or other analyzer: m Will be able to see some private data m Consult/research Legal implication first m Respect the privacy of other users Network Analyzer 1-2 1 What Tcpdump can do for you q View the entire data portion of an Ethernet frame or other link layer protocol m An IP packet m An ARP packet m Or any protocol at a higher layer than Ethernet. q Very useful m Tcpdump is to a network administrator like a microscope to a biologist. m Give a very clear picture of a specific part of your network m Can be used when the problem is simply that something is not working properly. Network Analyzer 1-3 What tcpdump can do for you? q Case1 : Web browser can not load pages from a server – it hangs. m Problem with client? Server? Or between? m Run tcpdump while loading • Watch every stage to see the following – DNS query – HTTP request to server – Server respond q Case 2: help debug denial of service attacks.
    [Show full text]
  • I3: Maximizing Packet Capture Performance
    I3: Maximizing Packet Capture Performance Andrew Brown Agenda • Why do captures drop packets, how can you tell? • Software considerations • Hardware considerations • Potential hardware improvements • Test configurations/parameters • Performance results Sharkfest 2014 What is a drop? • Failure to capture a packet that is part of the traffic in which you’re interested • Dropped packets tend to be the most important • Capture filter will not necessarily help Sharkfest 2014 Why do drops occur? • Applications don’t know that their data is being captured • Result: Only one chance to capture a packet • What can go wrong? Let’s look at the life of a packet Sharkfest 2014 Internal packet flow • Path of a packet from NIC to application (Linux) • Switch output queue drops • Interface drops • Kernel drops Sharkfest 2014 Identifying drops • Software reports drops • L4 indicators (TCP ACKed lost segment) • L7 indicators (app-level sequence numbers revealed by dissector) Sharkfest 2014 When is (and isn’t) it necessary to take steps to maximize capture performance? • Not typically necessary when capturing traffic of <= 1G end device • More commonly necessary when capturing uplink traffic from a TAP or SPAN port • Some sort of action is almost always necessary at 10G • Methods described aren’t always necessary • Methods focus on free solutions Sharkfest 2014 Software considerations - Windows • Quit unnecessary programs • Avoid Wireshark for capturing ˗ Saves to TEMP ˗ Additional processing for packet statistics • Uses CPU • Uses memory over time, can lead
    [Show full text]
  • PHP 8.0.2 - Phpinfo() 2021-02-23 14:53
    PHP 8.0.2 - phpinfo() 2021-02-23 14:53 PHP Version 8.0.2 System Linux effa5f35b7e3 5.4.83-v7l+ #1379 SMP Mon Dec 14 13:11:54 GMT 2020 armv7l Build Date Feb 9 2021 12:01:16 Build System Linux 96bc8a22765c 4.15.0-129-generic #132-Ubuntu SMP Thu Dec 10 14:07:05 UTC 2020 armv8l GNU/Linux Configure Command './configure' '--build=arm-linux-gnueabihf' '--with-config-file-path=/usr/local/etc/php' '--with-config-file-scan- dir=/usr/local/etc/php/conf.d' '--enable-option-checking=fatal' '--with-mhash' '--with-pic' '--enable-ftp' '--enable- mbstring' '--enable-mysqlnd' '--with-password-argon2' '--with-sodium=shared' '--with-pdo-sqlite=/usr' '--with- sqlite3=/usr' '--with-curl' '--with-libedit' '--with-openssl' '--with-zlib' '--with-pear' '--with-libdir=lib/arm-linux-gnueabihf' '- -with-apxs2' '--disable-cgi' 'build_alias=arm-linux-gnueabihf' Server API Apache 2.0 Handler Virtual Directory Support disabled Configuration File (php.ini) Path /usr/local/etc/php Loaded Configuration File /usr/local/etc/php/php.ini Scan this dir for additional .ini files /usr/local/etc/php/conf.d Additional .ini files parsed /usr/local/etc/php/conf.d/docker-php-ext-gd.ini, /usr/local/etc/php/conf.d/docker-php-ext-mysqli.ini, /usr/local/etc/php/conf.d/docker-php-ext-pdo_mysql.ini, /usr/local/etc/php/conf.d/docker-php-ext-sodium.ini, /usr/local/etc/php/conf.d/docker-php-ext-zip.ini PHP API 20200930 PHP Extension 20200930 Zend Extension 420200930 Zend Extension Build API420200930,NTS PHP Extension Build API20200930,NTS Debug Build no Thread Safety disabled Zend Signal Handling enabled
    [Show full text]
  • MC-1200 Series Linux Software User's Manual
    MC-1200 Series Linux Software User’s Manual Version 1.0, November 2020 www.moxa.com/product © 2020 Moxa Inc. All rights reserved. MC-1200 Series Linux Software User’s Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice © 2020 Moxa Inc. All rights reserved. Trademarks The MOXA logo is a registered trademark of Moxa Inc. All other trademarks or registered marks in this manual belong to their respective manufacturers. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Moxa China (Shanghai office) Toll-free: 1-888-669-2872 Toll-free: 800-820-5036 Tel: +1-714-528-6777 Tel: +86-21-5258-9955 Fax: +1-714-528-6778 Fax: +86-21-5258-5505 Moxa Europe Moxa Asia-Pacific Tel: +49-89-3 70 03 99-0 Tel: +886-2-8919-1230 Fax: +49-89-3 70 03 99-99 Fax: +886-2-8919-1231 Moxa India Tel: +91-80-4172-9088 Fax: +91-80-4132-1045 Table of Contents 1.
    [Show full text]
  • Implementation of the Programming Language Dino – a Case Study in Dynamic Language Performance
    Implementation of the Programming Language Dino – A Case Study in Dynamic Language Performance Vladimir N. Makarov Red Hat [email protected] Abstract design of the language, its type system and particular features such The article gives a brief overview of the current state of program- as multithreading, heterogeneous extensible arrays, array slices, ming language Dino in order to see where its stands between other associative tables, first-class functions, pattern-matching, as well dynamic programming languages. Then it describes the current im- as Dino’s unique approach to class inheritance via the ‘use’ class plementation, used tools and major implementation decisions in- composition operator. cluding how to implement a stable, portable and simple JIT com- The second part of the article describes Dino’s implementation. piler. We outline the overall structure of the Dino interpreter and just- We study the effect of major implementation decisions on the in-time compiler (JIT) and the design of the byte code and major performance of Dino on x86-64, AARCH64, and Powerpc64. In optimizations. We also describe implementation details such as brief, the performance of some model benchmark on x86-64 was the garbage collection system, the algorithms underlying Dino’s improved by 3.1 times after moving from a stack based virtual data structures, Dino’s built-in profiling system, and the various machine to a register-transfer architecture, a further 1.5 times by tools and libraries used in the implementation. Our goal is to give adding byte code combining, a further 2.3 times through the use an overview of the major implementation decisions involved in of JIT, and a further 4.4 times by performing type inference with a dynamic language, including how to implement a stable and byte code specialization, with a resulting overall performance im- portable JIT.
    [Show full text]
  • Of Mobile Devices: a Survey on Network Traffic Analysis
    1 The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis Mauro Conti, Senior Member, IEEE, QianQian Li, Alberto Maragno, and Riccardo Spolaor*, Member, IEEE. Abstract—In recent years, mobile devices (e.g., smartphones elements enable both smartphones and tablets to have the and tablets) have met an increasing commercial success and same functionalities typically offered by laptops and desktop have become a fundamental element of the everyday life for computers. billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice According to the statistics reported in [1], smartphone calls and messages) but also for more advanced tasks made users were 25:3% of the global population in 2015, and this possible by an enormous amount of multi-purpose applications percentage is expected to grow till 37% in 2020. Similarly, the (e.g., finance, gaming, and shopping). As a result, those devices statistics about tablets reported in [2] indicate a global penetra- generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community tion of 13:8% in 2015, expected to reach 19:2% in 2020. The has been investigating security and privacy issues that are related driving forces of this tremendous success are the ubiquitous to the network traffic generated by mobile devices, which could Internet connectivity, thanks to the worldwide deployment of be analyzed to obtain information useful for a variety of goals cellular and Wi-Fi networks, and a large number of apps (ranging from fine-grained user profiling to device security and available in the official (and unofficial) marketplaces.
    [Show full text]
  • PF: the Openbsd Packet Filter
    PF: The OpenBSD Packet Filter Languages: [en] [de] [es] [fr] [id] [ja] [pl] [up to FAQ] [Next: Getting Started] PF: The OpenBSD Packet Filter Table of Contents ● Basic Configuration ❍ Getting Started ❍ Lists and Macros ❍ Tables ❍ Packet Filtering ❍ Network Address Translation ❍ Traffic Redirection (Port Forwarding) ❍ Shortcuts For Creating Rulesets ● Advanced Configuration ❍ Runtime Options ❍ Scrub (Packet Normalization) ❍ Anchors and Named (Sub) Rulesets ❍ Packet Queueing and Prioritization ❍ Address Pools and Load Balancing ❍ Packet Tagging ● Additional Topics ❍ Logging ❍ Performance ❍ Issues with FTP ❍ Authpf: User Shell for Authenticating Gateways ● Example Rulesets ❍ Example: Firewall for Home or Small Office Packet Filter (from here on referred to as PF) is OpenBSD's system for filtering TCP/IP traffic and doing Network Address Translation. PF is also capable of normalizing and conditioning TCP/IP traffic and providing bandwidth control and packet prioritization. PF has been a part of the GENERIC OpenBSD kernel since OpenBSD 3.0. Previous OpenBSD releases used a different firewall/NAT package which is no longer supported. PF was originally developed by Daniel Hartmeier and is now maintained and developed by Daniel and the rest of the OpenBSD team. This set of documents is intended as a general introduction to the PF system as run on OpenBSD. It is intended to be used as a supplement to the man pages, not as a replacement for them. This document covers all of PF's major features. For a complete and http://www.openbsd.org/faq/pf/index.html (1 of 2) [02/06/2005 14:54:58] PF: The OpenBSD Packet Filter in-depth view of what PF can do, please start by reading the pf(4) man page.
    [Show full text]
  • Red Hat Virtualization 4.4 Package Manifest
    Red Hat Virtualization 4.4 Package Manifest Package listing for Red Hat Virtualization 4.4 Last Updated: 2021-09-09 Red Hat Virtualization 4.4 Package Manifest Package listing for Red Hat Virtualization 4.4 Red Hat Virtualization Documentation Team Red Hat Customer Content Services [email protected] Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • Tcpdump Basics
    TCPdump Basics What we will cover: What is/are TCPdump/WinDump? Why use TCPdump? Installation of TCPdump on Unix/Windows It’s installed, now what? Changing the amount of data collected Reading TCPdump/WinDump Output TCP Flags in TCPdump/WinDump Absolute & Relative Sequence Numbers Dumping TCPdump/WinDump output in hexadecimal format TCPdump ManPage TCPdump is a tool we can use for packet analysis. We will not use ethereal (wireshark) because it does “too much” for us. TCPdump will keep everything “raw” and that’s the way we like it! *note: it is expected that the reader will try out all the TCPdump/WinDump commands listed in the lesson on their own computers as well as the practical exercises. You have to actually run the commands to learn how to use the tool. What is/are TCPdump/WinDump? TCPdump, and its cousin WinDump, is software that allows us to see inside the traffic activity that occurs on a network. TCPdump is a Unix tool used to gather data from the network, decipher the bits, and display the output in a human readable format (granted it does take a little bit of instruction to learn the TCPdump language). Why use TCPdump? Network traffic travels in data packets; each data packet contains the information that it needs to travel across the network. This information is contained in a TCP header. A TCP header will contain the destination and source address, state information, and protocol identifiers. The rest of the packet contains the data that is being sent. Devices that are responsible for routing read the information in these packets and send them to their correct destination.
    [Show full text]
  • BSD Projects IV – BSD Certification • Main Features • Community • Future Directions a (Very) Brief History of BSD
    BSD Overview Jim Brown May 24, 2012 BSD Overview - 5/24/2012 - Jim Brown, ISD BSD Overview I – A Brief History of BSD III – Cool Hot Stuff • ATT UCB Partnership • Batteries Included • ATT(USL) Lawsuit • ZFS , Hammer • BSD Family Tree • pf Firewall, pfSense • BSD License • Capsicum • Virtualization Topics • Jails, Xen, etc. • Desktop PC-BSD II – The Core BSD Projects IV – BSD Certification • Main Features • Community • Future Directions A (Very) Brief History of BSD 1971 – ATT cheaply licenses Unix source code to many organizations, including UCB as educational material 1975 – Ken Thompson takes a sabbatical from ATT, brings the latest Unix source on tape to UCB his alma mater to run on a PDP 11 which UCB provided. (Industry/academic partnerships were much more common back then.) Computer Science students (notably Bill Joy and Chuck Haley) at UCB begin to make numerous improvements to Unix and make them available on tape as the “Berkeley Software Distribution” - BSD A (Very) Brief History of BSD Some notable CSRG • 1980 – Computer Science Research Group members (CSRG) forms at UCB with DARPA funding to make many more improvements to Unix - job control, autoreboot, fast filesystem, gigabit address space, Lisp, IPC, sockets, TCP/IP stack + applications, r* utils, machine independence, rewriting almost all ATT code with UCB/CSRG code, including many ports • 1991 – The Networking Release 2 tape is released on the Internet via anon FTP. A 386 port quickly follows by Bill and Lynne Jolitz. The NetBSD group is formed- the first Open Source community entirely on the Internet • 1992 – A commercial version, BSDI (sold for $995, 1-800-ITS-UNIX) draws the ire of USL/ATT.
    [Show full text]
  • Performance Evaluation of Tcpdump
    Performance Evaluation of Tcpdump Farhan Jiva University of Georgia Abstract performed relatively similar with respect to packet loss. FreeBSD performed the worst out of the op- With the onset of high-speed networks, using erating systems tested, while Windows usually dis- tcpdump in a reliable fashion can become prob- plays seemingly random spikes of packet loss. For lematic when facing the poor performance of mod- each of the datasets we tested, we found that Fedora ern operating systems. Because of this limitation, performs the best. The rest of the paper is laid out the amount of packet loss a user is willing to face as follows: is an important factor when choosing an operating system for a specific task. In this paper, we evaluate the performance of tcpdump on five modern operat- • In Section 2 we discuss some related work. ing systems. 1 Introduction • Section 3 covers our evaluation, along with our experimental setup and experimental results. The reliable usage of tcpdump as a network an- alyzing/debugging/monitoring tool is arguably a non-trivial task. With the onset of high-speed net- • In Section 4, we discuss our conclusions. works, using tcpdump in a reliable fashion can become problematic when facing the poor perfor- mance of modern operating systems. It is because of this limitation that the amount of packet loss be- 2 Related Work comes an inevitable factor when choosing an oper- ating system for a specific task. For example, a re- One approach to increasing the performance of searcher who needs to extract binary executable files packet capturing is explained by Deri et al.
    [Show full text]
  • PHP Credits Configuration
    PHP Version 5.0.1 www.entropy.ch Release 1 System Darwin G4-500.local 7.7.0 Darwin Kernel Version 7.7.0: Sun Nov 7 16:06:51 PST 2004; root:xnu/xnu-517.9.5.obj~1/RELEASE_PPC Power Macintosh Build Date Aug 13 2004 15:03:31 Configure './configure' '--prefix=/usr/local/php5' '--with-config-file-path=/usr/local/php5/lib' '--with-apxs' '- Command -with-iconv' '--with-openssl=/usr' '--with-zlib=/usr' '--with-mysql=/Users/marc/cvs/entropy/php- module/src/mysql-standard-*' '--with-mysqli=/usr/local/mysql/bin/mysql_config' '--with- xsl=/usr/local/php5' '--with-pdflib=/usr/local/php5' '--with-pgsql=/Users/marc/cvs/entropy/php- module/build/postgresql-build' '--with-gd' '--with-jpeg-dir=/usr/local/php5' '--with-png- dir=/usr/local/php5' '--with-zlib-dir=/usr' '--with-freetype-dir=/usr/local/php5' '--with- t1lib=/usr/local/php5' '--with-imap=../imap-2002d' '--with-imap-ssl=/usr' '--with- gettext=/usr/local/php5' '--with-ming=/Users/marc/cvs/entropy/php-module/build/ming-build' '- -with-ldap' '--with-mime-magic=/usr/local/php5/etc/magic.mime' '--with-iodbc=/usr' '--with- xmlrpc' '--with-expat -dir=/usr/local/php5' '--with-iconv-dir=/usr' '--with-curl=/usr/local/php5' '-- enable-exif' '--enable-wddx' '--enable-soap' '--enable-sqlite-utf8' '--enable-ftp' '--enable- sockets' '--enable-dbx' '--enable-dbase' '--enable-mbstring' '--enable-calendar' '--with- bz2=/usr' '--with-mcrypt=/usr/local/php5' '--with-mhash=/usr/local/php5' '--with- mssql=/usr/local/php5' '--with-fbsql=/Users/marc/cvs/entropy/php-module/build/frontbase- build/Library/FrontBase' Server
    [Show full text]