Thoughts about Archiving Experimental Computer Science Artifacts (including Experiments) Jack W. Davidson Department of Computer Science University of.

Slides:



Advertisements
Similar presentations
Virtualisation and Visualisation – Improving Teaching and Learning in Computer Science Seán Duignan School of Science GMIT Tony Hall Education Department.
Advertisements

Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
By: Chris Jones. Information About the Company They are a rapidly growing engineering services firm located in Northern VA.
5205 – IT Service Delivery and Support
Greg Porter, MCITP: EA, Cal Poly October 17, 2010.
To run the program: To run the program: You need the OS: You need the OS:
Red Hat Installation. Installing Red Hat Linux is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on.
LabMan Conference: June 8 & 9, 2010 Lauren Nicholas, Moravian College
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Symantec Ghost Effective Disk Cloning Software. What is Ghost? “Ghost is a software product from Symantec that can clone (copy) the entire contents of.
Herb Brown Appalachian State University. State of Networking Instruction  Many programs are adding networking instruction  Networking instruction is.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Experiences with Virtualisation in DCU Mahon Macnamara Computer Services Department DCU.
Thinking in Parallel Adopting the TCPP Core Curriculum in Computer Systems Principles Tim Richards University of Massachusetts Amherst.
Content Project Goals. Term A Goals. Quick Overview of Term A Goals. Term B Goals. Gantt Chart. Requests.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Introduction to VMware Virtualization
Virtual Machines: Versatile Platforms for Systems and Processes
Virtual Servers Harry Dickens Arkansas Public School Resource Center Harry Dickens Arkansas Public School Resource Center.
1 Operating System Security Research David Lie Department of Electrical and Computer Engineering University of Toronto.
The Cluster Computing Project Robert L. Tureman Paul D. Camp Community College.
Introduction 1-1 Introduction to Virtual Machines From “Virtual Machines” Smith and Nair Chapter 1.
Presented by John Marian, Andrew Buhr, and Alvin Chen.
Cloud Computing Instructor: Pankaj Mehra Teaching Assistant: Raghav Gautam Lec. 5 April 22, 2010 ISM 158.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
Mike Gore School of Computer Science. This talk is on the Web in TWIKI format A more detailed copy of this talk can be access on with web page. Including.
Levels of Abstraction Computer Organization. Level of Abstraction u Provides users with concepts/tools to solve problem at that level u Implementation.
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
Desktop Virtualization
Dakota Valley and our search for a solution. Why Virtualize desktops Gateway/MPC Reduced maintenance Improved performance Improved manageability Power.
ARM offers a broad range of processor cores to address a wide variety of applications while delivering optimum performance, power consumption and system.
1 컴퓨터 교육 2 학기 김혜원 Teaching Networking and Operating System to Information Systems Majors D. Robert Adams and Carl Erickson Department of computer Science.
Introduction Why are virtual machines interesting?
The difficulty in development and maintenance of Open-Source Software Masahiko ISHIKAWA Software Research Associates, Inc. Network engineer Web-based system.
Virtual Machines. A virtual machine takes the layered approach to its logical conclusion. It treats hardware and the operating system kernel as though.
Jaime Frey Computer Sciences Department University of Wisconsin-Madison Condor and Virtual Machines.
ECE 424 Embedded Systems Design Lecture 1: Course Overview & Administrative Details Ning Weng Friday, August 17, 2012.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
INTRODUCTION TO CLOUD COMPUTING. CLOUD  The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear.
TECH RELATED TOPIC PRESENTATION MICROPROCESSOR: CSE341 COURSE INSTRUCTOR DR. JIA UDDIN Assistant Professor Department of Computer Science and Engineering.
Unit 3 Virtualization.
Outline Installing Gem5 SPEC2006 for Gem5 Configuring Gem5.
Introduction to VMware Virtualization
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
CSC227: Operating Systems
Computer Organization
Guy D. Falsetti Sr. Systems Architect University of Iowa
Effective Disk Cloning Software
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Virtual Machines: Versatile Platforms for Systems and Processes
Operating System Structure
R
Drupal VM and Docker4Drupal For Drupal Development Platform
Virtual Machines.
Drupal VM and Docker4Drupal as Consistent Drupal Development Platform
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Mobile Handset Virtual Machine
Cloudy with a Chance of Data
Introduction to desktop virtualization
CS170 Computer Organization and Architecture I
An Introduction to Software Engineering
CompTIA Security+ Study Guide (SY0-501)
Topics discussed in this section:
Topics discussed in this section:
Virtualization.
An introduction to the Linux environment v
Different types of Linux installation
Introduction to Virtual Machines
Introduction to Virtual Machines
From Custom CPU to Hello World in 30 Minutes
Presentation transcript:

Thoughts about Archiving Experimental Computer Science Artifacts (including Experiments) Jack W. Davidson Department of Computer Science University of Virginia

Platforms Good News Fewer architectures in the desktop high- performance area X86, PowerPC Hardware performance counters Fewer operating systems Linux, Windows Accessible software infrastructures gcc, llvm, jikes, openjdk, etc. Available benchmark suites SPEC, DaCapo, Parsec, etc.

Platforms Bad News Rapid changes in microarchitecture Same ISA, but very different microarchitecture Hardware performance counters are often not documented correctly GPUs becoming important Still lots of embedded architectures— although ARM seems to be becoming dominant All Linuxes are not the same

Platforms Bad News Existing software infrastructures are sometimes impediments to experimentation Cloud computing and public queue systems make controlling the environment difficult Push to lock-down configurations because of security concerns Embedded benchmarks, especially hard real- time benchmarks, are difficult to obtain because of proprietary concerns

Virtual Machines Good News Virtual machines allow entire platforms (OS, software tools, etc) to be packaged and delivered Very useful in security research where exploits are very fragile Bad News Hides machine details (not working on bare metal) Longevity of VM images an issue Licensing issues with Windows

Final Thoughts Education Most graduate students don’t know how to do experimental computer science Hard to teach—only learn by doing Can we create a course that teaches fundamental concepts? Incentives Need good incentives for archiving Can be in conflict with faculty entrepreneurs