Web Migration Revisited: Addressing Effort and Risk Concerns Doctoral Dissertations in Web Engineering and Web Science Volume 5

Total Page:16

File Type:pdf, Size:1020Kb

Web Migration Revisited: Addressing Effort and Risk Concerns Doctoral Dissertations in Web Engineering and Web Science Volume 5 Sebastian Heil Web Migration Revisited: Addressing Effort and Risk Concerns Doctoral Dissertations in Web Engineering and Web Science Volume 5 Prof. Dr.-Ing. Martin Gaedke (Series Editor) Sebastian Heil Web Migration Revisited Addressing Effort and Risk Concerns Universitätsverlag Chemnitz 2021 Impressum Bibliografische Information der Deutschen Nationalbibliothek Die Deutsche Nationalbibliothek verzeichnet diese Publikation in der Deutschen Nationalbibliografie; detaillierte bibliografische Angaben sind im Internet über https://www.dnb.de abrufbar. Das Werk - ausgenommen Zitate, Cover, Logo TU Chemnitz und Bildmaterial im Text - steht unter der Creative-Commons-Lizenz Namensnennung 4.0 International (CC BY 4.0) https://creativecommons.org/licences/by/4.0/deed.de Titelgrafik: Sebastian Heil Satz/Layout: Sebastian Heil Technische Universität Chemnitz/Universitätsbibliothek Universitätsverlag Chemnitz 09107 Chemnitz https://www.tu-chemnitz.de/ub/univerlag readbox unipress in der readbox publishing GmbH Rheinische Straße 171 44147 Dortmund https://www.readbox.net/unipress/ ISSN 2199-5354 print - ISSN 2199-5362 online ISBN 978-3-96100-125-5 https://nbn-resolving.org/urn:nbn:de:bsz:ch1-qucosa2-723455 Faculty of Computer Science Distributed and Self-Organizing Systems Group Web Migration Revisited Addressing Effort and Risk Concerns Dissertation submitted in fulfillment of the requirements for the degree of Doktoringenieur (Dr.-Ing.) by Sebastian Heil M.Sc. September 24, 2020 Dissertation Committee: Prof. Dr.-Ing. Martin Gaedke Prof. Dr. Maximilian Eibl Assoc.-Prof. Maxim Bakaev, PhD Sebastian Heil M.Sc. Web Migration Revisited: Addressing Effort and Risk Concerns Dissertation Committee: Prof. Dr.-Ing. Martin Gaedke (Technische Universität Chemnitz), Prof. Dr. Maximilian Eibl (Technische Universität Chemnitz) Assoc.-Prof. Maxim Bakaev, PhD (Novosibirsk State Technical University) Submitted on December 12, 2019 Defended on September 24, 2020 Technische Universität Chemnitz Faculty of Computer Science Distributed and Self-Organizing Systems Group Straße der Nationen 62 09111 Chemnitz Abstract Web Systems are widely used and accepted due to their advantages over traditional desktop applications. Modernization of existing non-Web software towards the Web, however, is a complex and challenging task due to the characteristics of Legacy Systems. Independent Software Ven- dors are struggling to commence Web Migration because of the involved effort and risk. Through systematic field research and problem analysis, this situation is further analyzed, deriving a set of requirements that rep- resent the effort and risk concerns and which are used to assess the state of the art in the field. Existing Web Migration research exhibits gaps concerning dedicated approaches for the initial phase and feasibility of the proposed strategies with limited resources and expertise. This thesis proposes a solution to address the shortcomings outlined above and to support Independent Software Vendors to commence Web Migration, focusing on their concerns about effort and risk. The main idea is to provide a set of dedicated solutions to close the identified gaps in the form of a methodology and a supporting toolsuite that transfer paradigms successfully solving similar problems in other areas of computer science into the Web Migration domain. These solutions constitute the proposed approach called Agile Web Migration for SMEs (AWSM), consisting of methods, tools, principles, and formalisms for reverse engineering, risk management, customer impact control, and migration strategy selection. vii The thesis describes the research on the devised ideas in the context of a collaboration project with an Independent Software Vendor. Ap- plicability and feasibility of the concepts are demonstrated in several evaluation experiments, integrating empirical user studies and objec- tive measurements. The thesis concludes with an evaluation based on requirements assessment and on the application of the solutions in the application scenario, and it provides an outlook towards future work. viii Acknowledgment I would like to express my gratitude to all who have accompanied me throughout the years of research as a PhD student, in particular to: My supervisor Prof. Dr.-Ing. Martin Gaedke for introducing me to the challenging but exciting world of research, for his inspiring vision and ideas, and for giving me the opportunity to learn and grow under his guidance in a supportive and motivating environment that he created and to collaborate with many international researchers. To all my colleagues and dear friends with whom I had the honor to collaborate on various research projects, who have widened my research interests and from whom I have learned so many things, I owe so much. Here, I would like to especially mention Maxim Bakaev, Mahda Noura, Stefan Wild, Alexey Tschudnowsky, Julian Grigera, José Matías Rivero, Bahareh Zarei, and Maximilian Speicher. I am very grateful to all students and colleagues who contributed to my research presented in this thesis: Felix Förster, Valentin Siegert, Tobias Lang, Thomas Weber, Frank Siegel, Anna Scholz, Philipp Oehme, Markus Keller, Stefan Staude, and Hao Li, and to Ralph Sontag, who has always encouraged me and spent countless hours helping me to typeset this thesis. I cordially thank my friend Mahsa Sodeiri for helping me design the book cover for the print version of this thesis. I thank all present and former colleagues at VSR – André Langer, Maik Benndorf, Michael Krug, Fabian Wiedemann, Jörg Anders, Markus Ast, Christoph Brandt, Dang Vu Nguyen Hai, Felix Kettner, and Verena ix Traubinger – for inspiring and fruitful discussions, continuous knowl- edge sharing, and a friendly and welcoming atmosphere that has lead me through the harder times in my PhD student life. Prof. Dr.-Ing. Martin Gaedke did an excellent job in putting the VSR team together. Thank you also to my three reviewers for their encouraging feedback and support to successfully write, defend, and publish this thesis, as well as to the members of the PhD commission, Prof. Dr.-Ing. Janet Siegmund, Dr. Andreas Müller, and Dr. Frank Seifert. Also, I like to thank all student assistants and students advised by me for enabling me to focus on my research and teaching me how to communicate ideas and organize research activities. Finally, I am very grateful to my mother for her ongoing encourage- ment, appreciation, understanding, love and care, and to Michalina Kunecka, Sven R. Kunze, Christian Jager, Bastian Weiß, Gabriela Bosetti, Radka Nacheva and many more of my friends whom I have not already mentioned above, who all supported me, raised me up and kept close contact in spite of the sometimes limited availability resulting from the PhD challenge. x Dissemination In order to substantiate this work and comply with high academic standards, parts of the research results this dissertation is based on have been disseminated before. All relevant publications are listed in the following: Heil, Sebastian, Maxim Bakaev, and Martin Gaedke (2016). “Measuring and Ensuring Similarity of User Interfaces: The Impact of Web Layout”. In: Web Information Systems Engineering – WISE 2016. Ed. by Wojciech Cellary, Mohamed F. Mokbel, Jianmin Wang, et al. Cham: Springer International Publishing, pp. 252–260. Heil, Sebastian, Felix Förster, and Martin Gaedke (2018). “Exploring Crowdsourced Reverse Engineering”. In: Proceedings of the 13th In- ternational Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE. Funchal, Portugal: SciTePress, pp. 147– 158. Heil, Sebastian and Martin Gaedke (2016). “AWSM – Agile Web Migra- tion for SMEs”. In: Proceedings of the 11th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE. Rome, Italy: SciTePress, pp. 189–194. – (2017). “Web Migration – A Survey Considering the SME Perspective”. In: Proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE. Porto, Portugal: SciTePress, pp. 255–262. Heil, Sebastian, Valentin Siegert, and Martin Gaedke (2018). “ReWaMP: Rapid Web Migration Prototyping Leveraging WebAssembly”. In: Web xi Engineering: Proceedings of 18th International Conference on Web En- gineering (ICWE2018). Ed. by Tommi Mikkonen, Ralf Klamma, and Juan Hernández. Caceres, Spain, pp. 84–92. Heil, Sebastian, Valentin Siegert, and Martin Gaedke (2019). “Crowd- sourced Reverse Engineering: Experiences in Applying Crowdsourc- ing to Concept Assignment”. In: Evaluation of Novel Approaches to Software Engineering, Revised Selected Papers, Communications in Computer and Information Science. Ed. by Ernesto Damiani, George Spanoudakis, and Leszek Maciaszek. Springer, pp. 215–239. Bakaev, Maxim, Sebastian Heil, Vladimir Khvorostov, and Martin Gaedke (2018). “HCI Vision for Automated Analysis and Mining of Web User Interfaces”. In: Web Engineering: Proceedings of the 18th International Conference on Web Engineering (ICWE2018). Ed. by Tommi Mikkonen, Ralf Klamma, and Juan Hernández, pp. 136–144. – (2019). “Auto-Extraction and Integration of Metrics for Web User Interfaces”. In: Journal of Web Engineering 17.6, pp. 561–590. Bakaev, Maxim, Sebastian Heil, Nikita Perminov, and Martin Gaedke (2019). “Integration Platform for Metric-Based Analysis of Web User Interfaces”. In: Web Engineering: Proceedings of 19th International Conference on Web Engineering (ICWE2019). Ed. by Maxim Bakaev, Flavius Frasincar, and In-Young Ko. Daejeon, Korea:
Recommended publications
  • A Virtual Machine Environment for Real Time Systems Laboratories
    AC 2007-904: A VIRTUAL MACHINE ENVIRONMENT FOR REAL-TIME SYSTEMS LABORATORIES Mukul Shirvaikar, University of Texas-Tyler MUKUL SHIRVAIKAR received the Ph.D. degree in Electrical and Computer Engineering from the University of Tennessee in 1993. He is currently an Associate Professor of Electrical Engineering at the University of Texas at Tyler. He has also held positions at Texas Instruments and the University of West Florida. His research interests include real-time imaging, embedded systems, pattern recognition, and dual-core processor architectures. At the University of Texas he has started a new real-time systems lab using dual-core processor technology. He is also the principal investigator for the “Back-To-Basics” project aimed at engineering student retention. Nikhil Satyala, University of Texas-Tyler NIKHIL SATYALA received the Bachelors degree in Electronics and Communication Engineering from the Jawaharlal Nehru Technological University (JNTU), India in 2004. He is currently pursuing his Masters degree at the University of Texas at Tyler, while working as a research assistant. His research interests include embedded systems, dual-core processor architectures and microprocessors. Page 12.152.1 Page © American Society for Engineering Education, 2007 A Virtual Machine Environment for Real Time Systems Laboratories Abstract The goal of this project was to build a superior environment for a real time system laboratory that would allow users to run Windows and Linux embedded application development tools concurrently on a single computer. These requirements were dictated by real-time system applications which are increasingly being implemented on asymmetric dual-core processors running different operating systems. A real time systems laboratory curriculum based on dual- core architectures has been presented in this forum in the past.2 It was designed for a senior elective course in real time systems at the University of Texas at Tyler that combines lectures along with an integrated lab.
    [Show full text]
  • GPU Virtualization on Vmware's Hosted I/O Architecture
    GPU Virtualization on VMware’s Hosted I/O Architecture Micah Dowty, Jeremy Sugerman VMware, Inc. 3401 Hillview Ave, Palo Alto, CA 94304 [email protected], [email protected] Abstract more computational performance than CPUs. At the Modern graphics co-processors (GPUs) can produce same time, GPU acceleration has extended beyond en- high fidelity images several orders of magnitude faster tertainment (e.g., games and video) into the basic win- than general purpose CPUs, and this performance expec- dowing systems of recent operating systems and is start- tation is rapidly becoming ubiquitous in personal com- ing to be applied to non-graphical high-performance ap- puters. Despite this, GPU virtualization is a nascent field plications including protein folding, financial modeling, of research. This paper introduces a taxonomy of strate- and medical image processing. The rise in applications gies for GPU virtualization and describes in detail the that exploit, or even assume, GPU acceleration makes specific GPU virtualization architecture developed for it increasingly important to expose the physical graph- VMware’s hosted products (VMware Workstation and ics hardware in virtualized environments. Additionally, VMware Fusion). virtual desktop infrastructure (VDI) initiatives have led We analyze the performance of our GPU virtualiza- many enterprises to try to simplify their desktop man- tion with a combination of applications and microbench- agement by delivering VMs to their users. Graphics vir- marks. We also compare against software rendering, the tualization is extremely important to a user whose pri- GPU virtualization in Parallels Desktop 3.0, and the na- mary desktop runs inside a VM. tive GPU. We find that taking advantage of hardware GPUs pose a unique challenge in the field of virtu- acceleration significantly closes the gap between pure alization.
    [Show full text]
  • KVM Based Virtualization and Remote Management Srinath Reddy Pasunuru St
    St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 5-2018 KVM Based Virtualization and Remote Management Srinath Reddy Pasunuru St. Cloud State University, [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Pasunuru, Srinath Reddy, "KVM Based Virtualization and Remote Management" (2018). Culminating Projects in Information Assurance. 53. https://repository.stcloudstate.edu/msia_etds/53 This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. 1 KVM Based Virtualization and Remote Management by Srinath Reddy Pasunuru A Starred Paper Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Assurance May, 2018 Starred Paper Committee Susantha Herath, Chairperson Ezzat Kirmani Sneh Kalia 2 Abstract In the recent past, cloud computing is the most significant shifts and Kernel Virtual Machine (KVM) is the most commonly deployed hypervisor which are used in the IaaS layer of the cloud computing systems. The Hypervisor is the one which provides the complete virtualization environment which will intend to virtualize as much as hardware and systems which will include the CPUs, Memory, network interfaces and so on. Because of the virtualization technologies such as the KVM and others such as ESXi, there has been a significant decrease in the usage if the resources and decrease in the costs involved.
    [Show full text]
  • Demystifying Desktop Virtualization
    Proceedings of the 9th WSEAS International Conference on APPLIED COMPUTER SCIENCE Demystifying desktop virtualization TOMISLAV PETROVIĆ Vetropack Straža d.d. Hum na Sutli Hum na Sutli 203, 49231 Hum na Sutli CROATIA [email protected] http://www.vetropack.hr KREŠIMIR FERTALJ University of Zagreb Faculty of Electrical Engineering and Computing, Unska 3 CROATIA [email protected] http://www.fer.hr Abstract: - This paper presents concepts of virtualization techniques. Both server virtualization and desktop virtualization are briefly presented, but desktop virtualization is discussed in more details. As the size of computer systems grows every day with new applications, and with new client and market requirements, it is obvious that something must be done to ease the administration and effectively secure data. Additionally, disaster recovery plans must be improved too. Virtualization has solved many of these requirements and has become more and more popular so that many companies decided to implement a virtual server, virtual storage or/and virtual desktops. The paper lists the reasons why to implement virtual desktops and servers and what are the main benefits of such implementations. Virtual environments the also have some downsides, which are presented, explained and compared to the advantages. Key-Words: - desktop virtualization, virtual machine, infrastructure client, connection manager, thin client 1 Introduction access, etc. Manual administration of many separate computers is In this paper we describe the concept of virtualization, hard, tedious and time consuming job. A variety of use of desktop virtualization within leading companies, choices exists for installing and reinstalling of different discuss reasons for its usage and give main advantages, software and hardware by a user at a local computer.
    [Show full text]
  • VIRTUAL DESKTOP INFRASTRUCTURE an Rcpsolution Spotlight on a Joint Effort by Microsoft and Citrix to Bring a VDI Solution to the Market
    0309rcp_Supp.v5 2/10/09 4:53 PM Page C1 SPECIAL PULLOUT SECTION Partner’s Guide to VIRTUAL DESKTOP INFRASTRUCTURE An RCPSolution Spotlight on a joint effort by Microsoft and Citrix to bring a VDI solution to the market. By Scott Bekker ChannelRedmond Partner Project15 2/4/09 3:07 PM Page 1 Project15 2/4/09 3:08 PM Page 1 0309rcp_Supp.v5 2/10/09 4:53 PM Page 2 VIRTUAL DESKTOP INFRASTRUCTURE icrosoft and Citrix Systems Inc. are working together on a joint go-to-market strategy for partners to take Virtual MDesktop Infrastructure (VDI) solutions to the market. VDI is a special subset of desktop virtualization, itself a subset of virtualization in general. While virtualization separates hardware from workers, for users who need access to their work software, Microsoft’s overall virtualization environment from anywhere, including from a non- approaches fit into four broad buckets—server virtu- company-owned PC, as well as enterprise customers alization, desktop virtualization, presentation virtu- with a centralized desktop strategy for office work- alization and application virtualization. ers,” the Microsoft materials explain. That’s not to The biggest part of the virtualization market to date say everyone is appropriate for VDI, even when a fat has been consolidating multiple software servers client isn’t the answer for some reason. onto comparatively fewer hardware servers. “Terminal Services, which has been widely Such server consolidation is still a growth adopted for virtualizing the presentation of entire industry, especially in a down economy, in which desktops or individual applications, is an alternative there are savings to be gained by reducing hardware centralized desktop delivery solution from and power expenses.
    [Show full text]
  • Desktop Virtualization: Not for Every User – but It Is for Every Company
    Desktop Virtualization: Not for every user – but it is for every company Industry researchers are forecasting steady growth in the desktop virtualization market. According to Gartner, “HVD (hosted virtual 1 Source: Gartner, “Emerging desktop) deployments are forecast to reach 74 million users by Technology Analysis: Servers 1 Deployed to Support Hosted Virtual 2014 or 15% of professional desktop users.” in addition, Gartner Desktops,” 18 March 2010. also states, “while the installed base is relatively small today, 2 Source: Gartner, “Hosted Virtual Gartner has spoken to clients with deployment plans that include Desktops Are the Catalyst Behind Changing How Organizations 2 tens of thousands of employees using HVDs in an organization.” Manage Storage,” October 2009. Tech Dossier If you think desktop virtualization should only be discussed in theoretical terms, or put on the back burner because it’s not ready for today’s environ- ment, think again. Desktop virtualization products and services are viable and available; it behooves IT and business executives to begin exploring how the technology can transform the way people work. Desktop virtualization may well turn out to be the most disruptive technology innovation since server virtualization in the 1990’s and even perhaps since the advent of the personal computer itself. Decision makers should look at it as a new way of computing that leads to enhanced IT controls, improved intellectual property management and substantial employee productivity improvements. Industry researchers are forecasting broad economic impact on organiza- Desktop solution with 15 desktops us- steady growth in the desktop virtual- tions. As with most organizations the ing Dell™ OptiPlex™ flexible comput- ization market.
    [Show full text]
  • Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform Shuen-Tai Wang, Hsi-Ya Chang
    World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:8, No:8, 2014 Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform Shuen-Tai Wang, Hsi-Ya Chang purpose of cloud platforms and services, and it is a promising Abstract —Cloud virtualization technologies are becoming more approach to consolidating multiple services onto a smaller and more prevalent, cloud users usually encounter the problem of how number of computing resources. A virtualized server to access to the virtualized remote desktops easily over the web environment allows computing resources to be shared among without requiring the installation of special clients. To resolve this multiple performance-isolated platforms called virtual issue, we took advantage of the HTML5 technology and developed web-based remote desktop. It permits users to access the terminal machines [4], [5]. A virtual machine is a software which running in our cloud platform from anywhere. We implemented implementation of a machine that executes related programs a sketch of web interface following the cloud computing concept that like a physical machine. Each virtual machine includes its own seeks to enable collaboration and communication among users for system kernel, OS, supporting libraries and applications. A high performance computing. Given the development of remote hypervisor provides a uniform abstraction of the underlying desktop virtualization, it allows to shift the user’s desktop from the physical machine, and multiple virtual machines can execute traditional PC environment to the cloud platform, which is stored on a remote virtual machine rather than locally. This proposed effort has simultaneously on a single hypervisor.
    [Show full text]
  • Ovirt Architecture
    oVirt Architecture Itamar Heim Director, RHEV-M Engineering, Red Hat oVirt Engine Architecture 1 oVirt Engine Large scale, centralized management for server and desktop virtualization Based on leading performance, scalability and security infrastructure technologies oVirt Engine Architecture 2 Kenrel-based Virtual Machine (KVM) ● Included in Linux kernel since 2006 ● Runs Linux, Windows and other operating system guests ● Advanced features ● Live migration ● Memory page sharing ● Thin provisioning ● PCI Pass-through ● KVM architecture provides high “feature-velocity” – leverages the power of Linux oVirt Engine Architecture 3 Linux as a Hypervisor? ● What makes up a hypervisor ? ● Hardware management ● Device drivers ● I/O Stack ● Resource Management ● Scheduling ● Access Control ● Power Management ● Memory Manager ● Device Model (emulation) ● Virtual Machine Monitor oVirt Engine Architecture 4 Linux as a Hypervisor? ● What makes up a hypervisor ? ● Hardware management ● Device drivers ● I/O Stack ● Resource Management Operating System Kernel ● Scheduling ● Access Control ● Power Management ● } Memory Manager ● Device Model (emulation) ● Virtual Machine Monitor oVirt Engine Architecture 5 Linux as a Hypervisor? How well does Linux perform as a hypervisor? Isn't Linux a general purpose operating system? Linux is architected to scale from the smallest embedded systems through to the largest multi-socket servers ● From cell phones through to mainframes KVM benefits from mature, time tested infrastructure ● Powerful, scalable memory manager
    [Show full text]
  • Course Outline
    Course Outline Implementing and Managing Microsoft Desktop Virtualization Course 10324A: 5 days Instructor Led About this Course This five-day, instructor-led course provides you with the knowledge and skills to implement and manage desktop virtualization solutions. This course provides an overview of virtualization and the various Microsoft products that you can use to implement and deploy a virtualization solution. The course explains how to configure and manage a MED-V deployment. Then, it describes the procedures for deploying an App-V solution by implementing App-V servers and clients and by sequencing applications. The course then covers the configuration of Remote Desktop Services and RemoteApp programs. Finally, the course describes the concept of user state virtualization and procedures for configuring the Virtual Desktop Infrastructure (VDI). Audience Profile This course is intended for Microsoft Windows Server 2008 system and desktop administrators who will manage and implement desktop and application virtualization technologies within their networks. The students for this course typically are responsible for implementing their organizations’ desktop and application virtualization, or their information technology (IT) management has directed them to research and/or implement desktop and application virtualization in the existing environment. Students should have a minimum of 1.5 years of experience working with Windows Server 2008 as a server or desktop administrator. This course does not require prior experience with virtualization. However, we highly recommend familiarity with virtualization concepts and management tools. At Course Completion After completing this course, students will be able to: Plan desktop virtualization scenarios. Implement and configure Windows Virtual PC and the Windows XP mode.
    [Show full text]
  • Vmware Fusion Infographic
    VMware Fusion for Mac Mac Virtualization for Everyone VMware Fusion Pro and VMware Fusion let anyone run Windows and hundreds of other operating systems on a Mac, without rebooting. Freeing You to Innovate in Your Own Space This is VMware Fusion At VMware, we refused to choose. We weren’t satisfied with running only Mac applications on our Macs. We wanted more than rebooting. We needed to be more productive, we needed to be more agile, and we needed to do it all more securely than ever before. To solve this, our innovative engineers brought our enterprise hypervisor to the Mac. Delivering a simple, fast and reliable way to run nearly any application without rebooting or compromising. VMware is a leader in virtualization. Oracle and MS are still playing catch up. - Rehman Memon, Consultant, Manager Runs Nearly Any Makes Windows Feel Operating System at Home on the Mac Running Windows on the Mac is the Fusion blends your Windows tip of the iceberg. You now have the experience seamlessly with the Mac power to stay on the cutting edge of you love. You have the flexibility to technology. VMware Fusion lets you keep the two worlds securely apart, choose among hundreds of or integrate them as one seamless operating systems, from experience. Install a fresh OS like lesser-known Linux distributions to Windows 10 or easily convert an the latest Windows 10 release. older PC into a virtual one. Companion to vSphere Simplifies Development for Any Platform IT pros use Fusion every day to DevOps and developers use securely connect with vSphere, ESXi Fusion every day to build the next and Workstation servers to launch, big thing.
    [Show full text]
  • Challenges of Remote Access to Emulation of Original Environments
    Challenges of Remote Access to Emulation of Original Environments Functional Longterm Archiving Group Albert-Ludwigs University Freiburg Hermann-Herder Str. 10 79104 Freiburg i. B., Germany ABSTRACT Offering emulation services in the cloud (remotely) gener- ates several issues as the user does not interact directly with an emulator but moderated through a network connection. Additionally to the challenges of proper translation of user input from the client side a network link introduces the prob- lem of limited bandwidth and delayed responsiveness to user interaction. As the requirements for remote digital environ- ment access share similarities with thin client computing and desktop virtualization, there are a couple of implemen- tations available which can be considered and evaluated for remote emulation. While standard desktop remote access is solved, especially multimedia streams and fast interactive applications still pose a challenge. Different to a couple of Figure 1: Display Pipeline of GUI systems remote desktop protocol implementations which have a cer- tain knowledge on the screen content to be transferred, this information is mostly missing for abstract emulator frame- [3]. Emulators can also be a source for remote displays and buffer output. Due to technical limitations like bandwidth, audio like desktops or server management consoles. The processing and network delay the possible solutions depend generated streams need to be properly grabbed, transcoded on user expectations. if required and transported to the user's client. While rather static remote screen access is accomplished 1. INTRODUCTION for a while, dynamic content like multimedia streams or highly interactive software with fast screen refreshes require The shift of the usually non-trivial task of emulation of more complex solutions.
    [Show full text]
  • Virtualization Technologies from Hypervisors to Containers: Overview, Security Considerations, and Performance Comparisons
    Alma Mater Studiorum · Università di Bologna Campus di Cesena Scuola di Ingegneria e Architettura Corso di Laurea Magistrale in Ingegneria e Scienze Informatiche Virtualization technologies from hypervisors to containers: overview, security considerations, and performance comparisons Tesi in Sicurezza delle Reti Relatore: Presentata da: GABRIELE D’ANGELO ALESSANDRO FANTINI Sessione III Anno Accademico 2015/2016 iii To my parents, Davide and Letizia, for always supporting me. v Abstract (Italian) In un’epoca in cui quasi tutte le persone utilizzano quotidianamente ap- plicazioni basate su cloud senza nemmeno farci caso e le organizzazioni del settore IT stanno investendo notevoli risorse in questo campo, non tutti sanno che il cloud computing non sarebbe stato possibile senza la virtualizzazione, una tecnica software che ha le sue radici nei primi anni sessanta. Lo scopo di questa tesi è fornire una panoramica delle tecnolo- gie di virtualizzazione, dalla virtualizzazione hardware e gli hypervisor fino alla virtualizzazione a livello di sistema operativo basata su con- tainer, analizzare le loro architetture e fare considerazioni relative alla sicurezza. Inoltre, dal momento che le tecnologie basate su container si fondano su funzioni specifiche di contenimento del kernel Linux, al- cune sezioni sono utilizzate per introdurre ed analizzare quest’ultime singolarmente, al livello di dettaglio appropriato. L’ultima parte di questo lavoro è dedicata al confronto quantitativo delle prestazioni delle tecnologie basate su container. In particolare,
    [Show full text]