The Case for VM-Based Cloudlets in Mobile Computing

Total Page:16

File Type:pdf, Size:1020Kb

The Case for VM-Based Cloudlets in Mobile Computing VIRTUAL MACHINES The Case for VM-Based Cloudlets in Mobile Computing A new vision of mobile computing liberates mobile devices from severe resource constraints by enabling resource-intensive applications to leverage cloud computing free of WAN delays, jitter, congestion, and failures. obile computing is at a to this transformation and proposes a new ar- fork in the road. After two chitecture for overcoming them. In this archi- decades of sustained effort tecture, a mobile user exploits virtual machine by many researchers, we’ve (VM) technology to rapidly instantiate custom- finally developed the core ized service software on a nearby cloudlet and Mconcepts, techniques, and mechanisms to pro- then uses that service over a wireless LAN; the vide a solid foundation for this still fast-growing mobile device typically functions as a thin cli- area. The vision of “information at my finger- ent with respect to the service. A cloudlet is a tips at any time and place” was just a dream in trusted, resource-rich computer or cluster of the mid 1990s; today, ubiquitous email and Web computers that’s well-connected to the Internet access is a reality that millions of users world- and available for use by nearby mobile devices. wide experience through BlackBerries, iPhones, Our strategy of leveraging transiently cus- Windows Mobile, and other mobile devices. On tomized proximate infrastructure as a mobile one path of the fork, mobile Web-based services device moves with its user through the physical and location-aware advertising opportunities world is called cloudlet-based, resource-rich, have begun to appear, and companies are mak- mobile computing. Crisp interactive response, ing large investments in antici- which is essential for seamless augmentation Mahadev Satyanarayanan pation of major profits. of human cognition, is easily achieved in this Carnegie Mellon University Yet, this path also leads mo- architecture because of the cloudlet’s physical bile computing away from its proximity and one-hop network latency. Using Paramvir Bahl true potential. Awaiting dis- a cloudlet also simplifies the challenge of meet- Microsoft Research covery on the other path is an ing the peak bandwidth demand of multiple us- Ramón Cáceres entirely new world in which ers interactively generating and receiving media AT&T Research mobile computing seamlessly such as high-definition video and high-resolu- augments users’ cognitive tion images. Rapid customization of infrastruc- Nigel Davies abilities via compute-intensive ture for diverse applications emerges as a critical Lancaster University capabilities such as speech requirement, and our results from a proof-of- recognition, natural language concept prototype suggest that VM technology processing, computer vision can indeed help meet this requirement. and graphics, machine learning, augmented re- ality, planning, and decision-making. By thus Resource-Poor Mobile Hardware empowering mobile users, we could transform The phrase “resource-rich mobile comput- many areas of human activity (see the sidebar ing” seems like an oxymoron at first glance. for an example). Researchers have long recognized that mobile This article discusses the technical obstacles hardware is necessarily resource-poor relative 2 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$26.00 © 2009 IEEE Help for the Mentally Challenged magine a future in which there are extensive deployments Ron with cognitive assistance. At the heart of this technology I of dense cloudlet infrastructure based on open standards, is a lightweight wearable computer with a head-up display much like Wi-Fi access points today. What kind of new appli- in the form of eyeglasses. Built into the eyeglass frame are a cations can we envision in such a world? camera for scene capture and earphones for audio feedback. These hardware components offer the essentials of an aug- Ron has recently been diagnosed with Alzheimer’s disease. mented-reality system to aid cognition when combined with Due to the sharp decline in his mental acuity, he is often un- software for scene interpretation, facial recognition, context able to remember the names of friends and relatives; he also awareness, and voice synthesis. When Ron looks at a person frequently forgets to do simple daily tasks. He faces an uncer- for a few seconds, that person’s name is whispered in his ear tain future that’s clouded by a lack of close family nearby and along with additional cues to guide Ron’s greeting and inter- limited financial resources for professional caregivers. Even actions; when he looks at his thirsty houseplant, “water me” is modest improvements in his cognitive ability would greatly whispered; when he looks at his long-suffering dog, “take me improve his quality of life, while also reducing the attention out” is whispered. demanded from caregivers. This would allow him to live inde- In this example, low-latency, high-bandwidth wireless access pendently in dignity and comfort for many more years, before to cloudlet resources is an essential ingredient for the “magic he has to move to a nursing home. glasses” to be able to execute computer vision algorithms for scene analysis and facial recognition at real-time speeds. This is Fortunately, a new experimental technology might provide only one of many new applications that we can imagine. to static client and server hardware.1 ware’s capabilities. In the lab and with it doesn’t take a giant leap of faith to At any given cost and level of technol- ample computing resources, the state recognize their future potential. The ogy, considerations such as weight, size, of the art for applications such as face real challenge lies in sustaining their battery life, ergonomics, and heat dis- recognition, speech recognition, and state-of-the-art performance and qual- sipation exact a severe penalty in com- language translation is near-human ity in the wild—under highly variable putational resources such as processor in performance and quality. As Fig- conditions on lightweight, energy- speed, memory size, and disk capacity. ure 1a shows, for example, researchers efficient, resource-impoverished mobile From the user’s viewpoint, a mobile de- achieved Spanish-English translation hardware. vice can never be too small or light or comparable to human quality in 2006 have too long a battery life. Although on a 100-node computing engine by us- The Limits of Cloud Computing mobile hardware continues to evolve ing large online corpora and a context- An obvious solution to mobile devices’ and improve, it will always be resource- based machine translation algorithm.2 resource poverty is to leverage cloud poor relative to static hardware—sim- For the IBM BLEU metric used in the computing. A mobile device could ex- ply put, for the hardware that people figure, scores above 0.7 enter the bilin- ecute a resource-intensive application carry or wear for extended periods of gual human translator range and those on a distant high-performance com- time, improving size, weight, and bat- above 0.8 approach the experienced pute server or compute cluster and sup- tery life are higher priorities than en- professional human translator range. port thin-client user interactions with hancing compute power. This isn’t Face recognition using computer vision the application over the Internet. Un- just a temporary limitation of current is another area in which rapid progress fortunately, long WAN latencies are a technology but is intrinsic to mobility. has occurred over the past decade. Fig- fundamental obstacle. Computation on mobile devices will ure 1b, adapted from Andy Adler and thus always involve a compromise. Michael Schucker’s 2007 comparison Why Latency Hurts Resource poverty is a major ob- of human and automatic face recogni- WAN delays in the critical path of stacle for many applications with the tion performance,3 shows that comput- user interaction can hurt usability by potential to seamlessly augment hu- ers and humans are comparable in this degrading the crispness of system re- man cognition because such applica- task today. Although several technical sponse. Even trivial user–application tions typically require processing and improvements for practical deployment interactions incur delays in cloud com- energy that far outstrips mobile hard- are still needed in such applications, puting. Humans are acutely sensitive to OCTOBER–DECEMBER 2009 PERVASIVE computing 3 VIRTUAL MACHINES 0.85 0.8 Year Computer Computer Indeterminate Worse/ Human scoring range worse better (%) Better than than 0.7 human (%) human (%) 1999 87.5 4.2 8.3 21.0 0.6 2001 87.5 8.3 4.2 10.5 0.7447 0.5 0.7289 Bleu scores 2003 45.8 16.7 37.5 2.75 0.5551 0.5610 0.4 0.5137 2005 37.5 33.3 29.2 1.13 0.3859 0.3 Google Google Systran SDL Google CBMT 2006 29.2 37.5 33.3 0.78 Chinese Arabic Spanish Spanish Spanish Spanish (‘06 NIST) (‘05 NIST) ’08 top lang (a) Based on same Spanish test set (b) Figure 1. Near-human quality of cognitive augmentation applications today. Machines are much more capable of matching humans in (a) language translation2 and (b) facial recognition3 than in the past. 100 Min Mean Max Lower bound 90 Thin Thick 80 Berkeley–Canberra 174.0 174.7 176.0 79.9 70 Berkeley–New York 85.0 85.0 85.0 27.4 60 Berkeley–Trondheim 197.0 197.0 197.0 55.6 50 CDF Pittsburgh–Ottawa 44.0 44.1 62.0 4.3 40 Pittsburgh–Hong Kong 217.0 223.1 393.0 85.9 30 Thin 100ms Pittsburgh–Dublin 115.0 115.7 116.0 42.0 Thin 66ms 20 Pittsburgh–Seattle 83.0 83.9 84.0 22.9 Thin 33ms 10 Thick 0 0 10 20 30 40 50 60 70 80 90 (a) Smoothness (frames per second) (b) Network latency hurts interactive performance even with good bandwidth: (a) a highly interactive visualization application’s measured output frame rate under two different configurations: “Thick” (a local machine with hardware graphics acceleration) and “Thin” (a remote compute server on a 100 Mb/s network, with round trip times ranging from 33ms to 100ms) (b) measured Internet2 round trip times between representative sites confirm that the 33-100ms range lies well within the range of observed latencies in the real world.
Recommended publications
  • Building Blocks for Tomorrow's Mobile App Store
    Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Abstract (0984) Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Copyright c 2012 by Justin G. Manweiler All rights reserved Abstract In our homes and in the enterprise, in our leisure and in our professions, mobile computing is no longer merely “exciting;” it is becoming an essential, ubiquitous tool of the modern world. New and innovative mobile applications continue to inform, entertain, and surprise users. But, to make the daily use of mobile technologies more gratifying and worthwhile, we must move forward with new levels of sophistication. The Mobile App Stores of the future must be built on stronger foundations. This dissertation considers a broad view of the challenges and intuitions behind a diverse selection of such new primitives. Some of these primitives will mitigate exist- ing and fundamental challenges of mobile computing, especially relating to wireless communication. Others will take an application-driven approach, being designed to serve a novel purpose, and be adapted to the unique and varied challenges from their disparate domains.
    [Show full text]
  • Annual Report
    ANNUAL REPORT 2019FISCAL YEAR ACM, the Association for Computing Machinery, is an international scientific and educational organization dedicated to advancing the arts, sciences, and applications of information technology. Letter from the President It’s been quite an eventful year and challenges posed by evolving technology. for ACM. While this annual Education has always been at the foundation of exercise allows us a moment ACM, as reflected in two recent curriculum efforts. First, “ACM’s mission to celebrate some of the many the ACM Task Force on Data Science issued “Comput- hinges on successes and achievements ing Competencies for Undergraduate Data Science Cur- creating a the Association has realized ricula.” The guidelines lay out the computing-specific over the past year, it is also an competencies that should be included when other community that opportunity to focus on new academic departments offer programs in data science encompasses and innovative ways to ensure at the undergraduate level. Second, building on the all who work in ACM remains a vibrant global success of our recent guidelines for 4-year cybersecu- the computing resource for the computing community. rity curricula, the ACM Committee for Computing Edu- ACM’s mission hinges on creating a community cation in Community Colleges created a related cur- and technology that encompasses all who work in the computing and riculum targeted at two-year programs, “Cybersecurity arena” technology arena. This year, ACM established a new Di- Curricular Guidance for Associate-Degree Programs.” versity and Inclusion Council to identify ways to create The following pages offer a sampling of the many environments that are welcoming to new perspectives ACM events and accomplishments that occurred over and will attract an even broader membership from the past fiscal year, none of which would have been around the world.
    [Show full text]
  • IC2E/Iotdi 2018 Program
    IC2E/IoTDI 2018 Program Room Plaza Int’l Date Time Columbia Columbia Columbia Challenger 40-41 Challenger 38-39 Ballroom G 37 36 34 Level 3 Level 3 Convention Level 3 Level 3 Level 3 Level IC2E Workshop 1 IC2E Workshop 2 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT) (Container) (SocialSens) (IoTSec) Opening remarks Opening remarks 8:30 AM - 8:45 AM 8:30 AM – 8:45 AM Opening: Timothy P Hanratty, Welcome Remarks Keynote 1: “High-Level Keynote: “Container Security” ARL Interoperability in IoT” Salman Baset 8:45 AM – 9:45 AM 8:30 – Damla Turgut, University of IC2E Tutorial 1 8:45 AM - 10:00 AM Keynote: “The Role of 10:00pm Central Florida (Blockchain) Keynote Talk: “Understanding Modeling and Simulation in and Engineering Social IoT Security Research” Signals: A Network- and Data- Prof. David M. Nicol, Driven Perspective” Univeristy of Illinois at Prof. Radu Marculescu, Urbana-Champaign Carnegie Mellon University 9:45 AM – 10:00 AM Q & A Coffee Break IC2E Workshop 1 IC2E Workshop 2 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT: Development (Container) (SocialSens) (IoTSec) Methodologies) Containerizing for Vision Discussions (Session Session I: Attacks and A Metamodel Framework for heterogeneous HPC Chair: Lu Su) Defenses Edge-based Smart applications in the Cloud 10:30 AM - 12 :00 P M 10:30 AM – 10:50 AM Environments Authors: Malik Khan Yuan Gong and Christian Authors: Franco and Anne C. Elster Operating in the New Poellabauer. An Overview of Cicirelli, Giancarlo Fortino, Information Environment: An Vulnerabilities of Voice Antonio Guerrieri, Alessandro Container-based Performance Army Vision of Social Sensing? Controlled Systems Mercuri, Giandomenico Evaluation: A Survey and Authors: Sue Kase and Spezzano and Andrea Vinci Challenges Elizabeth Bowman 10:50 AM – 11:10 AM Authors: Naylor G.
    [Show full text]
  • Mobile Computing: the Next Decade and Beyond Mahadev Satyanarayanan School of Computer Science Carnegie Mellon University
    Mobile Computing: the Next Decade and Beyond Mahadev Satyanarayanan School of Computer Science Carnegie Mellon University Abstract “Information at your fingertips anywhere, anytime” has been the driving vision of mobile computing for the past two decades. Through relentless pursuit of this vision, spurring innovations in wireless technology, energy-efficient portable hardware and adaptive software, we have now largely attained this goal. Ubiquitous email and Web access is a reality that is experienced by millions of users worldwide through their BlackBerries, iPhones, Windows Phone, and other portable devices. What will inspire our research in mobile computing over the next decade and beyond? We observe that our future is being shaped by two different tectonic forces, each with the potential to radically change the mobile computing landscape. One force is the emergence of mobile devices as rich sensors, a role that may soon dominate their current function as communication devices and information appliances. We use the term “rich” to connote the depth and complexity about the real world that is recorded, typically through image capture. This is in contrast to simple scalar data that has typically been the focus of the sensor network community in the context of energy-impoverished “smart-dust” sensors. The other force is the convergence of mobile computing and cloud computing. This will enable the emergence of new near-real-time applications that are no longer limited by energy or computational constraints that are inherent to mobility. The intersection of these immense forces in the next decade will lead to many new research challenges and business opportunities. Bio Satya is an experimental computer scientist who has pioneered research in mobile and pervasive computing.
    [Show full text]
  • Ursa Major Starting to Take Shape
    THE THE NEWSLETTER ON PDL ACTIVITIES AND EVENTS • FALL 2 0 0 4 http://www.pdl.cmu.edu/ AN INFORMAL PUBLICATION FROM Ursa Major Starting to Take Shape ACADEMIA’S PREMIERE STORAGE Greg Ganger SYSTEMS RESEARCH CENTER Ursa Major will be the first full system constructed on PDL’s journey towards DEVOTED TO ADVANCING THE self-* storage. Ursa Major will be a large-scale object store, in the NASD and STATE OF THE ART IN STORAGE OSD style, based on standard server technologies (e.g., rack-mounted servers and SYSTEMS AND INFORMATION gigabit-per-second Ethernet). This article discusses the long-range project goals, some of the progress that has been made on Ursa Major, and near-term plans. INFRASTRUCTURES. The Self-* Storage Vision Human administration of storage systems is a large and growing issue in modern CONTENTS IT infrastructures. PDL’s Self-* Storage project explores new storage architec- tures that integrate automated management functions and simplify the human Ursa Major ........................................... 1 administrative task. Self-* (pronounced “self-star”—a play on the unix shell wild-card character) storage systems should be self-configuring, self-tuning, Director’s Letter ................................... 2 self-organizing, self-healing, self-managing, etc. Ideally, human administrators Year in Review ..................................... 4 should have to do nothing more than provide muscle for component additions, Recent Publications .............................. 5 guidance on acceptable risk levels (e.g., reliability goals), and current levels of satisfaction. PDL News & Awards ........................... 8 We think in terms of systems composed of networked “intelligent” storage bricks, New PDL Faculty ............................... 11 which are small-scale servers consisting of CPU(s), RAM, and a number of disks.
    [Show full text]
  • Contributors to This Issue
    Contributors to This Issue Brian N. Bershad is an Assistant Professor of Computer Science at the University of Washington in Seattle, V/ashington. Dr. Bershad's research interests include archi- tecture, operating system support for parallel and distributed computation, and high performance networking. Prior to his appointment in Seattle, he was on the faculty at Carngie Mellon University in Pittsburgh, PA. He received his M.S. (1989) and Ph.D. (1990) degrees in Computer Science from the University of Washington. He received his Bachelor's Degree (1986) in Electrical Engineering and Computer Sci- ence from the University of California at Berkeley. Dr. Bershad received an NSF PYI award in 1990, an ONR TIA award in 1994, and is a member of IEEE and ACM. Dr. Bershad's cuffent research includes the SPIN project and Memory system design. Fred Douglis is an MTS at AT&T Bell Laboratories in Murray Hill, NJ. Prior to that he was a scientist at the Matsushita Information Technology Laboratory, and a post- doctoral fellow at the Vrije Universiteit in Amsterdam. His interests include the V/orld Wide Web, mobile computing, distributed computing, and file systems. He worked on the Sprite network operating system from its inception in 1984 until the fall of 1990, and built its process migration facility as part of his doctoral research. He received a B.S. in Computer Science from Yale University in 1984, an M.S. in Computer Science from the University of California, Berkeley, in 1987, and a Ph.D. in Computer Science from U.C. Berkeley in 1990.
    [Show full text]
  • Edge Analytics in the Internet of Things
    Edge Analytics in the Internet of Things Mahadev Satyanarayanany, Pieter Simoensz, Yu Xiao•, Padmanabhan Pillai?, Zhuo Cheny, Kiryong Hay, Wenlu Huy, Brandon Amosy yCarnegie Mellon University, zGhent University - iMinds, •Aalto University, ?Intel Labs ABSTRACT itory for crowd-sourced video content, with strong enforce- High data rate sensors such as video cameras are becoming ubiq- ment of privacy preferences and access controls, would be uitous in the Internet of Things. This paper describes GigaSight, a valuable global resource. In this paper, we examine the an Internet-scale repository of crowd-sourced video content, with strong enforcement of privacy preferences and access controls. The technical challenges involved in creating such a repository. GigaSight architecture is a federated system of VM-based cloudlets For reasons that will become clear in Section 2, this will be that perform video analytics at the edge of the Internet, thus re- ducing demand for ingress bandwidth into the cloud. Denaturing, a physically distributed and federated repository rather than which is the owner-specific reduction in fidelity of video content to a monolithic entity. preserve privacy, is one form of analytics on cloudlets. Content-based indexing for search is another form of cloudlet-based analytics. Video is not the only data type that could benefit from such a global repository. Any data type in the IoT that has 1. Ubiquitous Imaging and Sensing high data rate can potentially benefit. For example, each GE jet aircraft engine generates 1 TB of sensor data every 24 Many of the “things” in the Internet of Things (IoT) are hours [6]. The airframe of the Boeing 787 generates half video cameras.
    [Show full text]
  • A Distributed File System for Distributed Conferencing System
    A DISTRIBUTED FILE SYSTEM FOR DISTRIBUTED CONFERENCING SYSTEM By PHILIP S. YEAGER A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE UNIVERSITY OF FLORIDA 2003 Copyright 2003 by Philip S. Yeager ACKNOWLEDGMENTS I would like to thank Dr. Richard Newman for his help and guidance with this project. I would like to express my gratitude to Dr. Jonathan C.L. Liu and Dr. Beverly Sanders for serving on my committee. I would like to thank Dr. Joseph Wilson for serving as a substitute at my defense. I would also like to thank Vijay Manian and the other DCS group members for their advice and contributions. I thank my parents and friends for their encouragement and support. Finally, I would like to thank Candice Williams for everything she has done. Without these people this work would not have been possible. iii TABLE OF CONTENTS Page ACKNOWLEDGMENTS ................................................................................................. iii LIST OF FIGURES ......................................................................................................... viii ABSTRACT....................................................................................................................... ix CHAPTER 1 INTRODUCTION ........................................................................................................1 1.1 Introduction........................................................................................................1
    [Show full text]
  • The Third ACM/IEEE Symposium on Edge Computing
    The Third ACM/IEEE Symposium on Edge Computing SEC 2018 Program at a Glance THURSDAY, OCTOBER 25 (Auditorium) 08:00 – 08:50 Breakfast (Foyer of Auditorium/Maple) 08:50 – 09:00 Opening Remarks and Awards 09:00 – 10:00 Keynote Speech 1 10:00 – 10:40 Coffee break (Auditorium Foyer) 10:40 – 12:00 Session I - Supporting Edge Applications 12:00 – 13:00 Lunch (Eques) 13:00 – 14:00 Panel 14:00 – 15:20 Session II – Privacy and Security 15:20 – 15:40 Coffee break (Auditorium Foyer) 15:40 – 17:00 Session III – Video at the Edge 17:00 – 18:30 Poster Session (Juniper and Larch) 18:30 – 20:30 Banquet and Awards (Regency Ballroom D, E, F, G) FRIDAY, OCTOBER 26 (Auditorium) 08:00 – 08:50 Breakfast (Foyer of Auditorium/Maple) 08:50 – 10:00 Keynote Speech 2 10:00 – 10:40 Coffee break (Auditorium Foyer) 10:40 – 12:00 Session IV – Edge Computing and IoT 12:00 – 13:00 Lunch (Foyer of Auditorium/Maple) 13:00 – 14:20 Session V – Infrastructure and Placement 14:20 – 14:50 Coffee break (3rd Floor Foyer) 14:50 – 15:50 Session VI – Edge-Cloud Interactions 16:00 – 17:45 Ph.D. Forum SATURDAY, OCTOBER 27 ArchEdge (Auditorium) EdgeSP (Larch) HotWoT (Larch) 09:00 – 10:00 Keynote Speech 3 (Auditorium) TBA 13:00 – 17:00 Session 10:05 – 12:05 Session SEC 2018 Technical Program THURSDAY, OCTOBER 25 (Auditorium) 08:00 – 08:50 Breakfast (Foyer of Auditorium/Maple) Opening Remarks and Awards 08:50 – 09:00 (Victor Bahl, Jason Flinn, Weisong Shi, Dinesh Verma) Keynote Speech 1: 09:00 – 10:00 Kenneth L.
    [Show full text]
  • Transient Pcs Everywhere
    Bringing the Cloud Down to Earth: Transient PCs Everywhere Mahadev Satyanarayanan, Stephen Smaldone†, Benjamin Gilbert, Jan Harkes, Liviu Iftode† September 2010 CMU-CS-10-143 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 †Rutgers University To appear in: Proceedings of the International Workshop on Mobile Computing and Clouds, October 2010, Santa Clara, CA This research was supported by the National Science Foundation (NSF) under grant numbers CNS-0509004, CNS-0833882 and CNS-0831268, by Qualcomm, and by an IBM Open Collaborative Research grant. Any opinions, findings, conclusions or recommenda- tions expressed in this material are those of the authors and do not necessarily represent the views of the NSF, Qualcomm, IBM, Rutgers University, or Carnegie Mellon University. Keywords: cloud computing, mobile computing, centralization, au- tonomy, interdependence, virtual machines, Andrew project, Internet Sus- pend/Resume, portable storage) Abstract The convergence of cloud computing and mobile computing is the latest chapter in a long-running dialectic between centralization and decentraliza- tion in system design. Cloud computing represents a thrust in which the forces of centralization are ascendant. Mobile computing, on the other hand, represents a thrust in which the forces of decentralization dominate. In this paper, we show how use of virtual machine technology can lead to new “sweet spots” in the space of system architectures that try to reconcile the tradeoffs between centralization and decentralization. Notably, it yields the Transient PC computing model which preserves the centralization benefits of cloud computing without sacrificing mobility or usability. 1 The Roots of Cloud Computing The intersection of cloud computing with mobile computing is a hot topic today.
    [Show full text]
  • MEDIA ADVISORY CONTACT: Jim Ormond 212-626-0505 [email protected]
    MEDIA ADVISORY CONTACT: Jim Ormond 212-626-0505 [email protected] ACM CELEBRATES 50 YEARS OF THE TURING AWARD WITH TWO-DAY CONFERENCE ON DEVELOPMENT AND FUTURE OF COMPUTING Twenty-Three Turing Laureates to Attend Livestreamed Event NEW YORK, NY, June 6, 2017 – Through the years, the ACM A.M. Turing Award has become the most prestigious technical award in the computing field. In celebration of five decades of the award, ACM today announced program details for a two-day conference that will explore how computing has evolved and where the field is headed. WHO: ACM, the Association for Computing Machinery www.acm.org, is the premier global community of computing professionals and students with nearly 100,000 members in more than 170 countries interacting with more than 2 million computing professionals worldwide. WHAT: Celebration of 50 Years of the ACM Turing Award conference featuring ACM Turing laureates, ACM award recipients and other ACM experts in moderated panel discussions on the most pressing issues in computing today. WHEN and WHERE: June 23-24, 2017 at the Westin St. Francis in San Francisco, and via live video streaming at http://www.acm.org/turing-award-50 MEDIA REGISTRATION: Contact Jim Ormond at [email protected] PROGRAM OVERVIEW: Day 1, Friday, June 23rd Impact of Turing Recipients’ Work Speaker: Barbara Liskov (2008 Turing Laureate) Advances in Deep Neural Networks How are deep neural networks changing our world and our jobs, and what breakthroughs may we imagine going forward? Moderator: Judea Pearl (2011 Turing Laureate)
    [Show full text]
  • Victor Bahl Microsoft Corporation
    Victor Bahl Microsoft Corporation SIGCOMM MobiArch 2007, August 2007 Source: Victoria Poncini, MS IT ~7, 000 Access Points ~65,000 XP & Vista Clients December 2006 ~40,000 connections/day ~35,000 handheld devices 100% 80% 39,6% 37,3% 42,2% 45,8% 47,1% 60% 40% 39,8% 39,7% 34,2% 44,2% 35,3% 20% 18,1% 20,1% 16,2% 17,6% 22,9% 0% Worldwide Americas w/o PS Puget Sound EMEA APJ Very SfSatisfied SSfSomewhat Satisfied SfSomewhat Dissatisfied or Very Dissati fied 2 Victor Bahl Microsoft’s IT Dept. logs several hundred complaints / month 70% calls are about client connectivity issues (e. g. ping-ponging between APs) 30% (and growing) are about performance problems due to interference End-users complain about Lack of RF coverage, performance & reliability Connectivity & authentication problems Network administrators worry about Providing adequate coverage, performance Security and unauthorized access Corporations spend lots of $$ on WLAN infrastructure WLAN hardware business to reach $2.6 billion in 2007. (Forester 2006) Heavy VC funding in this area (e.g. AirTight $36M in the last 16 months) 3 Victor Bahl 4 Victor Bahl FY05 Cost Element View Functional View Breakdown People 72% Applications 60% Data & Voice 16% App Development (29%) App Support (31%) Hardware 5% Facilities 5% Infrastructure 40% Software* 2% Network (14%) * 5% If MS software were included Data Center (7%) Employee Services (5%) Voice (5%) 30% Helpdesk (5%) New Increases Security (3%) Capability value 45% New 70% Capability Sustaining & Running Decreases Existing maintenance 55% Capability delivery Existing Capability 5 Victor Bahl Timeline HotNets’05 , MobiSys’ 06, NSDI ‘07 ACM CCR ’ 06 MobiCom’ 04 MobiSys’ 06 6 Victor Bahl Heterogeneous world Multiple technologies: 802.
    [Show full text]