Загрузка страницы

LISA21 - More Performant Cluster State Management Using Open Source Firmware and a Kraken

More Performant Cluster State Management Using Open Source Firmware and a Kraken

Devon Bautista and J. Lowell Wofford, Los Alamos National Laboratory

Often, vendor-provided firmware is proprietary and closed, which can present some hurdles in high-performance computing (HPC). Vendor firmware usually provides a generic way for bootstrapping systems, having to accommodate for many situations, but purpose-built clusters would benefit from more purpose-built firmware. The ability to customize the system initialization more granularly would provide more control over the hardware. This could potentially increase boot efficiency and reduce boot times by eliminating unused features and introducing more useful ones, but proprietary firmware tends to limit the amount of fine tuning that is possible. This talk will demonstrate a use case for open firmware in the context of HPC with the integration of Kraken, a distributed state management tool focused on managing stateless HPC clusters. It will demonstrate how open firmware can be leveraged for eliminating nonnecessities in the boot process of nodes, as well as for provisioning them more reliably.

View the full LISA21 program at https://www.usenix.org/conference/lisa21/program

Видео LISA21 - More Performant Cluster State Management Using Open Source Firmware and a Kraken канала USENIX
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
9 июня 2021 г. 22:01:53
00:30:39
Другие видео канала
LISA16 - Building a Billion User Load BalancerLISA16 - Building a Billion User Load BalancerUSENIX Security '20 - Everything Old is New Again: Binary Security of WebAssemblyUSENIX Security '20 - Everything Old is New Again: Binary Security of WebAssemblyOSDI '21 - Marius: Learning Massive Graph Embeddings on a Single MachineOSDI '21 - Marius: Learning Massive Graph Embeddings on a Single MachineNSDI '22 - SCALE: Automatically Finding RFC Compliance Bugs in DNS NameserversNSDI '22 - SCALE: Automatically Finding RFC Compliance Bugs in DNS NameserversSREcon22 Asia/Pacific - Principles of Safety and Reliability Learned from US Navy Landing Signal...SREcon22 Asia/Pacific - Principles of Safety and Reliability Learned from US Navy Landing Signal...NSDI '21 - One Protocol to Rule Them All: Wireless Network-on-Chip using Deep Reinforcement LearningNSDI '21 - One Protocol to Rule Them All: Wireless Network-on-Chip using Deep Reinforcement LearningUSENIX ATC '21 - FaaSNet: Scalable and Fast Provisioning of Custom Serverless Container Runtimes...USENIX ATC '21 - FaaSNet: Scalable and Fast Provisioning of Custom Serverless Container Runtimes...USENIX Security '22 - Under the Hood of DANE Mismanagement in SMTPUSENIX Security '22 - Under the Hood of DANE Mismanagement in SMTPSREcon19 Europe/Middle East/Africa - Building Resilience: How to Learn More from IncidentsSREcon19 Europe/Middle East/Africa - Building Resilience: How to Learn More from IncidentsLISA21 - Can Infrastructure as Code Apply to Bare Metal?LISA21 - Can Infrastructure as Code Apply to Bare Metal?NSDI '21 - Ownership: A Distributed Futures System for Fine-Grained TasksNSDI '21 - Ownership: A Distributed Futures System for Fine-Grained TasksUSENIX Security '19 - Small World with High Risks: A Study of Security Threats in the npm EcosystemUSENIX Security '19 - Small World with High Risks: A Study of Security Threats in the npm EcosystemUSENIX ATC '19 - Evaluating File System Reliability on Solid State DrivesUSENIX ATC '19 - Evaluating File System Reliability on Solid State DrivesUSENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over RemoteUSENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over RemoteUSENIX Security '20 - Datalog DisassemblyUSENIX Security '20 - Datalog DisassemblyUSENIX Security '22 - Poison Forensics: Traceback of Data Poisoning Attacks in Neural NetworksUSENIX Security '22 - Poison Forensics: Traceback of Data Poisoning Attacks in Neural NetworksUSENIX Security '22 - Lumos: Identifying and Localizing Diverse Hidden IoT Devices...USENIX Security '22 - Lumos: Identifying and Localizing Diverse Hidden IoT Devices...NSDI '22 - Runtime Programmable SwitchesNSDI '22 - Runtime Programmable SwitchesUSENIX Security '21 - Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNSUSENIX Security '21 - Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNSLISA16 - Network-Based LUKS Volume Decryption with TangLISA16 - Network-Based LUKS Volume Decryption with TangNSDI '22 - MLaaS in the Wild: Workload Analysis and Scheduling in Large-Scale Heterogeneous GPU...NSDI '22 - MLaaS in the Wild: Workload Analysis and Scheduling in Large-Scale Heterogeneous GPU...
Яндекс.Метрика