article thumbnail

AWS EC2 Virtualization 2017: Introducing Nitro

Brendan Gregg

Hardware virtualization for cloud computing has come a long way, improving performance using technologies such as VT-x, SR-IOV, VT-d, NVMe, and APICv. The latest AWS hypervisor, Nitro, uses everything to provide a new hardware-assisted hypervisor that is easy to use and has near bare-metal performance. I'd expect between 0.1%

article thumbnail

USENIX LISA2021 Computing Performance: On the Horizon

Brendan Gregg

This was a chance to talk about other things I've been working on, such as the present and future of hardware performance. The video is on [youtube]: The slides are on [slideshare] or as a [PDF]: I work on many areas of performance, but recently I've had a lot of demand to talk about BPF.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

AWS EC2 Virtualization 2017: Introducing Nitro

Brendan Gregg

Hardware virtualization for cloud computing has come a long way, improving performance using technologies such as VT-x, SR-IOV, VT-d, NVMe, and APICv. The latest AWS hypervisor, Nitro, uses everything to provide a new hardware-assisted hypervisor that is easy to use and has near bare-metal performance. I'd expect between 0.1%

article thumbnail

What is cloud application security?

Dynatrace

Incorporating cloud application security practices is an effective way for organizations to avoid application security risks, ensure a smoothly running software development lifecycle (SDLC), and establish an overall strong security posture. However, open source software is often a vector for security vulnerabilities.

Cloud 181
article thumbnail

USENIX SREcon APAC 2022: Computing Performance: What's on the Horizon

Brendan Gregg

link] 2021 - [Trader 21] Tiffany Trader, “Cerebras Second-Gen 7nm Wafer Scale Engine Doubles AI Performance Over First-Gen Chip ,” [link] Apr 2021 - [Ghigoff 21] Yoann Ghigoff, et al., "BMC:

article thumbnail

Evolving Container Security With Linux User Namespaces

The Netflix TechBlog

Running many different workloads multi-tenant on a host necessitates the prevention lateral movement, a technique in which the attacker compromises a single piece of software running in a container on the system, and uses that to compromise other containers on the same system. To mitigate this, we run containers as unprivileged users?—?making

Media 286
article thumbnail

Solaris to Linux Migration 2017

Brendan Gregg

Linux has been adding tracing technologies over the years: kprobes (kernel dynamic tracing), uprobes (user-level dynamic tracing), tracepoints (static tracing), and perf_events (profiling and hardware counters). They use third-party software like Docker or Kubernetes to simplify their administration. People rarely create them manually.