article thumbnail

AWS EC2 Virtualization 2017: Introducing Nitro

Brendan Gregg

Virtualized in Software**: While this can support an unmodified guest OS, many operations are emulated and slow. It's using software and coordination between the hypervisor and guest to improve performance. But not all workloads: some are network bound (proxies) and storage bound (databases). ## 5. The AMI and boot are now HVM.

article thumbnail

What is cloud application security?

Dynatrace

Incorporating cloud application security practices is an effective way for organizations to avoid application security risks, ensure a smoothly running software development lifecycle (SDLC), and establish an overall strong security posture. However, open source software is often a vector for security vulnerabilities.

Cloud 181
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

AWS EC2 Virtualization 2017: Introducing Nitro

Brendan Gregg

Virtualized in Software**: While this can support an unmodified guest OS, many operations are emulated and slow. It's using software and coordination between the hypervisor and guest to improve performance. But not all workloads: some are network bound (proxies) and storage bound (databases). ## 5. The AMI and boot are now HVM.

article thumbnail

USENIX LISA2021 Computing Performance: On the Horizon

Brendan Gregg

AWS Graviton2); for memory with the arrival of DDR5 and High Bandwidth Memory (HBM) on-processor; for storage including new uses for 3D Xpoint as a 3D NAND accelerator; for networking with the rise of QUIC and eXpress Data Path (XDP); and so on.

article thumbnail

USENIX SREcon APAC 2022: Computing Performance: What's on the Horizon

Brendan Gregg

Titus, the Netflix container management platform, is now open source,” [link] Apr 2018 - [Cutress 19] Dr. DDR6: Here's What to Expect in RAM Modules,” [link] Nov 2020 - [Salter 20] Jim Salter, “Western Digital releases new 18TB, 20TB EAMR drives,” [link] Jul 2020 - [Spier 20] Martin Spier, Brendan Gregg, et al.,

article thumbnail

Solaris to Linux Migration 2017

Brendan Gregg

They use third-party software like Docker or Kubernetes to simplify their administration. There are workarounds: I can use the perf_events cgroup ID, provided the container software is configuring it (they do). At my employer we sometimes use SR-IOV for direct network interface access, and NVMe for direct disk access.

article thumbnail

The Performance Inequality Gap, 2024

Alex Russell

It's time once again to update our priors regarding the global device and network situation. seconds on the target device and network profile, consuming 120KiB of critical path resources to become interactive, only 8KiB of which is script. What's changed since last year? and 75KiB of JavaScript. These are generous targets.