Boot XP Embedded in Under 10 Seconds Alexander Wechsler eMVP Microsoft Regional Director, Germany...

43

Transcript of Boot XP Embedded in Under 10 Seconds Alexander Wechsler eMVP Microsoft Regional Director, Germany...

Boot XP Embedded in Under 10 Seconds

Boot XP Embedded in Under 10 SecondsAlexander WechslereMVPMicrosoft Regional Director, GermanyWechsler Consulting GmbH & CO. [email protected]: http://spaces.msn.com/weconlog

Alexander WechslereMVPMicrosoft Regional Director, GermanyWechsler Consulting GmbH & CO. [email protected]: http://spaces.msn.com/weconlog

Booting a Virtual Machine in HORM Mode

Booting a Virtual Machine in HORM Mode

What is Going on Here?What is Going on Here?

System boots from the hibernation file into a predefined system stateDrivers, services and programs are immediately up and runningSystem boots into this state any time, regardless of the shutdown method you choose.(For example, restart, hibernate, shut down or, even more drastically, cutting power.)File system will not get corrupted -> it is protected

System boots from the hibernation file into a predefined system stateDrivers, services and programs are immediately up and runningSystem boots into this state any time, regardless of the shutdown method you choose.(For example, restart, hibernate, shut down or, even more drastically, cutting power.)File system will not get corrupted -> it is protected

HiberfileRAM

(re-hydrated)

EWFOverlay

System Memory

EWF Protected OS partition

Processor

Windows XP embedded HORM device

Hibernate Once Resume ManyHibernate Once Resume Many

Why Can’t Microsoft Windows XP Do This?Why Can’t Microsoft Windows XP Do This?

HORM requires the heavy use of Windows XP Embedded EEFs (Embedded Enabling Features), not available for Windows XP Some limitations to system functionality to achieve data consistency:

Windows XP invalidates the hibernation file after every reboot

Windows XP requires new creation of the file when entering hibernation mode

HORM requires the heavy use of Windows XP Embedded EEFs (Embedded Enabling Features), not available for Windows XP Some limitations to system functionality to achieve data consistency:

Windows XP invalidates the hibernation file after every reboot

Windows XP requires new creation of the file when entering hibernation mode

Hiberfile System Memory

Unprotected OS partition

Processor

HiberfileRAM

(re-hydrated)

Windows XP embedded HORM device

Windows XP Professional HibernationWindows XP Professional Hibernation

File Headers From Valid and Invalid Windows XP Hibernation Files Shown in Hex-Editor

File Headers From Valid and Invalid Windows XP Hibernation Files Shown in Hex-Editor

HORM Usage Scenarios HORM Usage Scenarios HORM Usage Scenarios HORM Usage Scenarios

Ideal for fixed function devices such as:Ideal for fixed function devices such as:Information kiosksInformation kiosks

Ticket machinesTicket machines

Cash registersCash registers

Automation controllersAutomation controllers

Especially when:Especially when:No data is stored locallyNo data is stored locally

Systems act as service brokers or functional Systems act as service brokers or functional nodesnodes

Ideal for fixed function devices such as:Ideal for fixed function devices such as:Information kiosksInformation kiosks

Ticket machinesTicket machines

Cash registersCash registers

Automation controllersAutomation controllers

Especially when:Especially when:No data is stored locallyNo data is stored locally

Systems act as service brokers or functional Systems act as service brokers or functional nodesnodes

HORM OverviewHORM OverviewHORM OverviewHORM Overview

Hibernate Once Resume Many, benefits:Hibernate Once Resume Many, benefits:

Uses an on-time, create-hibernation file Uses an on-time, create-hibernation file to always boot from it fast and reliablyto always boot from it fast and reliably

Shortens boot time significantlyShortens boot time significantly

User can modify and recreate this file any User can modify and recreate this file any timetime

Protected system partition makes the Protected system partition makes the system robust against e.g. power outage system robust against e.g. power outage and virusesand viruses

Manage the system in well-defined Manage the system in well-defined intervals having complete controlintervals having complete control

Hibernate Once Resume Many, benefits:Hibernate Once Resume Many, benefits:

Uses an on-time, create-hibernation file Uses an on-time, create-hibernation file to always boot from it fast and reliablyto always boot from it fast and reliably

Shortens boot time significantlyShortens boot time significantly

User can modify and recreate this file any User can modify and recreate this file any timetime

Protected system partition makes the Protected system partition makes the system robust against e.g. power outage system robust against e.g. power outage and virusesand viruses

Manage the system in well-defined Manage the system in well-defined intervals having complete controlintervals having complete control

HORM OverviewHORM OverviewHORM OverviewHORM Overview

Hibernate Once Resume Many, drawbacks:Hibernate Once Resume Many, drawbacks:

Persisting information is getting harderPersisting information is getting harder

Deployment and maintenance are more Deployment and maintenance are more difficultdifficult

Not all HW and SW supports HORMNot all HW and SW supports HORM

Mixed configurations having protected Mixed configurations having protected and unprotected volumes are challenging. and unprotected volumes are challenging. Data consistency is an always-present Data consistency is an always-present topic.topic.

Network shares must also be treated Network shares must also be treated specially after waking the system upspecially after waking the system up

Hibernate Once Resume Many, drawbacks:Hibernate Once Resume Many, drawbacks:

Persisting information is getting harderPersisting information is getting harder

Deployment and maintenance are more Deployment and maintenance are more difficultdifficult

Not all HW and SW supports HORMNot all HW and SW supports HORM

Mixed configurations having protected Mixed configurations having protected and unprotected volumes are challenging. and unprotected volumes are challenging. Data consistency is an always-present Data consistency is an always-present topic.topic.

Network shares must also be treated Network shares must also be treated specially after waking the system upspecially after waking the system up

HORM System DesignHORM System DesignHORM System DesignHORM System Design

What Do I Need to Do HORM?What Do I Need to Do HORM?What Do I Need to Do HORM?What Do I Need to Do HORM?

Ingredients:Ingredients:Windows XP Embedded runtime image Windows XP Embedded runtime image for your target devicefor your target device

Hibernation support (power management)Hibernation support (power management)

Enhanced Write Filter in RAM or RAM/Reg modeEnhanced Write Filter in RAM or RAM/Reg mode

An extra file, resmany.datAn extra file, resmany.dat

Optional things like:Optional things like:Enhanced Write Filter (EWF) Manager and APIEnhanced Write Filter (EWF) Manager and API

Windows XP Embedded power management tools and APIWindows XP Embedded power management tools and API

Task SchedulerTask Scheduler

HORM Manager (Demo application)HORM Manager (Demo application)

Ingredients:Ingredients:Windows XP Embedded runtime image Windows XP Embedded runtime image for your target devicefor your target device

Hibernation support (power management)Hibernation support (power management)

Enhanced Write Filter in RAM or RAM/Reg modeEnhanced Write Filter in RAM or RAM/Reg mode

An extra file, resmany.datAn extra file, resmany.dat

Optional things like:Optional things like:Enhanced Write Filter (EWF) Manager and APIEnhanced Write Filter (EWF) Manager and API

Windows XP Embedded power management tools and APIWindows XP Embedded power management tools and API

Task SchedulerTask Scheduler

HORM Manager (Demo application)HORM Manager (Demo application)

EWF EWF Architecture:Architecture:

Filter driverFilter driver EWF NTLDREWF NTLDR EWF EWF

ManagerManager

EWF EWF Architecture:Architecture:

Filter driverFilter driver EWF NTLDREWF NTLDR EWF EWF

ManagerManager

Enhanced Write Filter 1/2Enhanced Write Filter 1/2

DiskDisk RAMRAMProtected Protected partitionpartition Overlay partitionOverlay partition

EWF partitionEWF partitioninfoinfo

EWF Info in RegistryEWF Info in Registry

Enhanced Write Filter 2/2Enhanced Write Filter 2/2

EWF modesDisk overlay

RAM overlay

RAM/Reg overlay

EWF modesDisk overlay

RAM overlay

RAM/Reg overlay

Creating a HORM Image 1/3Creating a HORM Image 1/3

Standard imageConfigure a standard Windows XP Embedded target image as usualUsing Target Analyzer to detect hardware componentsAdd required functionality and custom applications/driversAdd system cloning component (turn off auto-reseal)

Standard imageConfigure a standard Windows XP Embedded target image as usualUsing Target Analyzer to detect hardware componentsAdd required functionality and custom applications/driversAdd system cloning component (turn off auto-reseal)

Creating a HORM Image 2/3Creating a HORM Image 2/3

Enhanced Write Filter RAM/Reg

Add enhanced Write Filter components, configure RAM or RAM/Reg mode

Add EWF NT Loader

Add RAM/Reg registry keys

Disable FBAReg.dll Resource in the EWF component

HORM

Add resmany.dat

Enable hibernation

Add Windows XP Embedded power management

Enhanced Write Filter RAM/Reg

Add enhanced Write Filter components, configure RAM or RAM/Reg mode

Add EWF NT Loader

Add RAM/Reg registry keys

Disable FBAReg.dll Resource in the EWF component

HORM

Add resmany.dat

Enable hibernation

Add Windows XP Embedded power management

Creating a HORM Image 3/3Creating a HORM Image 3/3Creating a HORM Image 3/3Creating a HORM Image 3/3

Build and deployBuild and deploy

Run FBARun FBA

Customize imageCustomize image

Reseal the systemReseal the system

HORM field configurationHORM field configuration

Turn off EWFTurn off EWF

Add Resmany.datAdd Resmany.dat

Turn on EWFTurn on EWF

Create hibernation fileCreate hibernation file

Ready to goReady to go

Build and deployBuild and deploy

Run FBARun FBA

Customize imageCustomize image

Reseal the systemReseal the system

HORM field configurationHORM field configuration

Turn off EWFTurn off EWF

Add Resmany.datAdd Resmany.dat

Turn on EWFTurn on EWF

Create hibernation fileCreate hibernation file

Ready to goReady to go

HORM ConfigurationThe necessary steps in Target Designer to enable HORM

HORM ConfigurationThe necessary steps in Target Designer to enable HORM

Application Design Application Design for HORMfor HORMApplication Design Application Design for HORMfor HORM

Making Things HarderMaking Things Harder

Having only protected volumes is the ideal world Reality check!

Mixed protected and unprotected volume configurations are quite common

Complexity to regain data consistency rises

Effects OS as well as running applications

But -> most situations can be handled!

Having only protected volumes is the ideal world Reality check!

Mixed protected and unprotected volume configurations are quite common

Complexity to regain data consistency rises

Effects OS as well as running applications

But -> most situations can be handled!

Where is My Data? 1/3Where is My Data? 1/3

Five ways for applications to persist dataRAM overlay – volatile

Data lost after reboot

Hibernation file – persistentRequires recreation of hibernation file and reboot

Data is reloaded after reboot

Data loss is possible (not fail-safe)

Protected disk - persistentRequires commit of RAM overlay and reboot

After commit new data is part of the protected volume

Data loss is possible (not fail-safe)

Five ways for applications to persist dataRAM overlay – volatile

Data lost after reboot

Hibernation file – persistentRequires recreation of hibernation file and reboot

Data is reloaded after reboot

Data loss is possible (not fail-safe)

Protected disk - persistentRequires commit of RAM overlay and reboot

After commit new data is part of the protected volume

Data loss is possible (not fail-safe)

Where is My Data? 2/3Where is My Data? 2/3Where is My Data? 2/3Where is My Data? 2/3

Unprotected disk - persistentUnprotected disk - persistentNo reboot to persist dataNo reboot to persist data

Risk of data loss is minimizedRisk of data loss is minimized

Network share - persistentNetwork share - persistentNo reboot to persist dataNo reboot to persist data

Risk of data loss is minimizedRisk of data loss is minimized

Unprotected disk - persistentUnprotected disk - persistentNo reboot to persist dataNo reboot to persist data

Risk of data loss is minimizedRisk of data loss is minimized

Network share - persistentNetwork share - persistentNo reboot to persist dataNo reboot to persist data

Risk of data loss is minimizedRisk of data loss is minimized

DiskDisk RAMRAMProtected Protected PartitionPartition

Overlay partitionOverlay partition

NetworkNetworkShareShare

Unprotected Unprotected PartitionPartition

ApplicationApplication

HiberfileHiberfile

direct writedirect write

RAMRAM

directdirectwritewrite

volatile write

volatile write

Persisted at checkpointPersisted at checkpointby application or OSby application or OS

Intermediate write

Intermediate write

Where is My Data? 3/3Where is My Data? 3/3Where is My Data? 3/3Where is My Data? 3/3

Application Design for HORM 1/2Application Design for HORM 1/2Mixed configurations of protected and

unprotected partitionsRequires data management strategies to achieve data consistency

Mount and unmount drives to keep unprotected data out of the hibernation file (see MSDN article: Dismounting Volumes in a Hibernate Once/Resume Many Configuration)

Start and Stop applications and services before hibernating

Restart applications and services after waking up

Applications (especially custom shells) ideally should be HORM enabled using the Windows XP Embedded PM and EWF APIs

Control HORM and manage Volumes

Control EWF from the application

Mixed configurations of protected and unprotected partitionsRequires data management strategies to achieve data consistency

Mount and unmount drives to keep unprotected data out of the hibernation file (see MSDN article: Dismounting Volumes in a Hibernate Once/Resume Many Configuration)

Start and Stop applications and services before hibernating

Restart applications and services after waking up

Applications (especially custom shells) ideally should be HORM enabled using the Windows XP Embedded PM and EWF APIs

Control HORM and manage Volumes

Control EWF from the application

Application Design for HORM Application Design for HORM 2/22/2Use of Network sharesUse of Network shares

Applications should use UNC names not Applications should use UNC names not drive letters to connectdrive letters to connect

Avoids security and reconnection problemsAvoids security and reconnection problemsEspecially when running headless and as services Especially when running headless and as services (no common desktop or drive letters)(no common desktop or drive letters)

Defensive programming rules should be Defensive programming rules should be applied applied

Retries if first connection attempts failRetries if first connection attempts fail

Offline capabilities often desirable (smart Offline capabilities often desirable (smart clients!)clients!)

Use of Network sharesUse of Network shares

Applications should use UNC names not Applications should use UNC names not drive letters to connectdrive letters to connect

Avoids security and reconnection problemsAvoids security and reconnection problemsEspecially when running headless and as services Especially when running headless and as services (no common desktop or drive letters)(no common desktop or drive letters)

Defensive programming rules should be Defensive programming rules should be applied applied

Retries if first connection attempts failRetries if first connection attempts fail

Offline capabilities often desirable (smart Offline capabilities often desirable (smart clients!)clients!)

EWF APIEWF APIEWF APIEWF API

Disabling/enabling EWF for a protected Disabling/enabling EWF for a protected volume volume

Restoring or discarding an overlay level Restoring or discarding an overlay level

Creating a checkpoint by adding Creating a checkpoint by adding an overlay level an overlay level

Committing the current overlay Committing the current overlay

Persisting data through a reboot Persisting data through a reboot

API files can be found at: API files can be found at:

[Program Files]\ Embedded\Installer\disk3\ewfapi [Program Files]\ Embedded\Installer\disk3\ewfapi

on your development systemon your development system

Disabling/enabling EWF for a protected Disabling/enabling EWF for a protected volume volume

Restoring or discarding an overlay level Restoring or discarding an overlay level

Creating a checkpoint by adding Creating a checkpoint by adding an overlay level an overlay level

Committing the current overlay Committing the current overlay

Persisting data through a reboot Persisting data through a reboot

API files can be found at: API files can be found at:

[Program Files]\ Embedded\Installer\disk3\ewfapi [Program Files]\ Embedded\Installer\disk3\ewfapi

on your development systemon your development system

FunctionFunction DescritionDescrition

XPE_RestartXPE_Restart Restarts the systemRestarts the system

XPE_ShutdownXPE_Shutdown Shuts system downShuts system down

XPE_StandbyXPE_Standby Enters standby mode Enters standby mode

XPE_HibernateXPE_Hibernate Hibernates the systemHibernates the system

APIAPI is located in the VALUEADD\MSFT\XPEPM folder of disk 1 is located in the VALUEADD\MSFT\XPEPM folder of disk 1 of Windows Embedded Studioof Windows Embedded Studio

The files xpepm.dll, xpepm.lib and xpepm.h are required.The files xpepm.dll, xpepm.lib and xpepm.h are required.

Console power management application gives access via Console power management application gives access via command linecommand line

APIAPI is located in the VALUEADD\MSFT\XPEPM folder of disk 1 is located in the VALUEADD\MSFT\XPEPM folder of disk 1 of Windows Embedded Studioof Windows Embedded Studio

The files xpepm.dll, xpepm.lib and xpepm.h are required.The files xpepm.dll, xpepm.lib and xpepm.h are required.

Console power management application gives access via Console power management application gives access via command linecommand line

Tip:Tip: XPE_Hibernate does not lock the desktop after waking upXPE_Hibernate does not lock the desktop after waking up Normal hibernation via Shut Down -> Hibernate does!Normal hibernation via Shut Down -> Hibernate does!

Tip:Tip: XPE_Hibernate does not lock the desktop after waking upXPE_Hibernate does not lock the desktop after waking up Normal hibernation via Shut Down -> Hibernate does!Normal hibernation via Shut Down -> Hibernate does!

Windows XP Embedded Windows XP Embedded Power ManagementPower ManagementWindows XP Embedded Windows XP Embedded Power ManagementPower Management

Data Inconsistencies in Mixed ConfigurationsUsage of EWF API and Windows XP Embedded Power Management API to Achieve Data Consistency

Data Inconsistencies in Mixed ConfigurationsUsage of EWF API and Windows XP Embedded Power Management API to Achieve Data Consistency

Maintenance Maintenance and Deploymentand DeploymentMaintenance Maintenance and Deploymentand Deployment

HORM Change Management 1/3HORM Change Management 1/3HORM Change Management 1/3HORM Change Management 1/3

ChallengesChallenges

Fighting EWF protection for maintenance Fighting EWF protection for maintenance and installationsand installations

OS as well as application updates are need OS as well as application updates are need to be consideredto be considered

Again our different ways to persist data Again our different ways to persist data in the systemin the system

On disk (persistent)On disk (persistent)

In hibernation file (persistent)In hibernation file (persistent)

In RAM overlay (volatile)In RAM overlay (volatile)

-> Need to develop a fitting strategy-> Need to develop a fitting strategy

ChallengesChallenges

Fighting EWF protection for maintenance Fighting EWF protection for maintenance and installationsand installations

OS as well as application updates are need OS as well as application updates are need to be consideredto be considered

Again our different ways to persist data Again our different ways to persist data in the systemin the system

On disk (persistent)On disk (persistent)

In hibernation file (persistent)In hibernation file (persistent)

In RAM overlay (volatile)In RAM overlay (volatile)

-> Need to develop a fitting strategy-> Need to develop a fitting strategy

HORM Change Management 2/3HORM Change Management 2/3HORM Change Management 2/3HORM Change Management 2/3

Best practicesBest practicesUse a maintenance window to apply updatesUse a maintenance window to apply updates

Integration into enterprise change management Integration into enterprise change management systems is desirablesystems is desirable

SMS ServerSMS Server

WSUS (OS patches only!)WSUS (OS patches only!)

Third-party solutions, such as Tivoli (client componentization Third-party solutions, such as Tivoli (client componentization issues)issues)

Virus and malware scanners (client componentization issues)Virus and malware scanners (client componentization issues)

Embedded and customized solutionsEmbedded and customized solutionsAutomated field deployment using scripts and RUN registry Automated field deployment using scripts and RUN registry keys. (Do not forget to seal your devices!)keys. (Do not forget to seal your devices!)

Device Update AgentDevice Update Agent

Roll your own update solutionRoll your own update solution

Plan for high availability and robustnessPlan for high availability and robustness

Best practicesBest practicesUse a maintenance window to apply updatesUse a maintenance window to apply updates

Integration into enterprise change management Integration into enterprise change management systems is desirablesystems is desirable

SMS ServerSMS Server

WSUS (OS patches only!)WSUS (OS patches only!)

Third-party solutions, such as Tivoli (client componentization Third-party solutions, such as Tivoli (client componentization issues)issues)

Virus and malware scanners (client componentization issues)Virus and malware scanners (client componentization issues)

Embedded and customized solutionsEmbedded and customized solutionsAutomated field deployment using scripts and RUN registry Automated field deployment using scripts and RUN registry keys. (Do not forget to seal your devices!)keys. (Do not forget to seal your devices!)

Device Update AgentDevice Update Agent

Roll your own update solutionRoll your own update solution

Plan for high availability and robustnessPlan for high availability and robustness

HORM Change Management 3/3HORM Change Management 3/3HORM Change Management 3/3HORM Change Management 3/3

All approaches adhere to two basic All approaches adhere to two basic scenariosscenariosTurn off HORM/EWF and update (fail-safe)Turn off HORM/EWF and update (fail-safe)

Updates are applied and persisted directly to diskUpdates are applied and persisted directly to disk

Update live and commit (dangerous)Update live and commit (dangerous)Updates are applied in memory overlay and then persisted to Updates are applied in memory overlay and then persisted to diskdisk

Danger of overflowing the RAM overlay!Danger of overflowing the RAM overlay!

Things to keep in mindThings to keep in mind

Recreate the hibernation file after successful update Recreate the hibernation file after successful update to re-enable HORMto re-enable HORM

Applying XP Pro patches will grow Your image (CF card - Applying XP Pro patches will grow Your image (CF card - size!)size!)

-> Having an OS deployment strategy at hand is very useful-> Having an OS deployment strategy at hand is very useful

All approaches adhere to two basic All approaches adhere to two basic scenariosscenariosTurn off HORM/EWF and update (fail-safe)Turn off HORM/EWF and update (fail-safe)

Updates are applied and persisted directly to diskUpdates are applied and persisted directly to disk

Update live and commit (dangerous)Update live and commit (dangerous)Updates are applied in memory overlay and then persisted to Updates are applied in memory overlay and then persisted to diskdisk

Danger of overflowing the RAM overlay!Danger of overflowing the RAM overlay!

Things to keep in mindThings to keep in mind

Recreate the hibernation file after successful update Recreate the hibernation file after successful update to re-enable HORMto re-enable HORM

Applying XP Pro patches will grow Your image (CF card - Applying XP Pro patches will grow Your image (CF card - size!)size!)

-> Having an OS deployment strategy at hand is very useful-> Having an OS deployment strategy at hand is very useful

OS DeploymentOS DeploymentOS DeploymentOS Deployment

Basically all Windows XP Embedded Basically all Windows XP Embedded deployment options are possible deployment options are possible

Cloning / Windows PE Deployment (CD/DVD)Cloning / Windows PE Deployment (CD/DVD)-> Think about sealing issues! -> Think about sealing issues! Seal with EWF turned off!Seal with EWF turned off!

PXE / RISPXE / RIS

Challenges:Challenges:Manual or automated field configuration Manual or automated field configuration of EWF / HORM requiredof EWF / HORM required

Console applications for EWF and Windows XP Console applications for EWF and Windows XP Embedded PM can be used in batch filesEmbedded PM can be used in batch files

Use “Run”-registry keys to start scriptsUse “Run”-registry keys to start scripts

Basically all Windows XP Embedded Basically all Windows XP Embedded deployment options are possible deployment options are possible

Cloning / Windows PE Deployment (CD/DVD)Cloning / Windows PE Deployment (CD/DVD)-> Think about sealing issues! -> Think about sealing issues! Seal with EWF turned off!Seal with EWF turned off!

PXE / RISPXE / RIS

Challenges:Challenges:Manual or automated field configuration Manual or automated field configuration of EWF / HORM requiredof EWF / HORM required

Console applications for EWF and Windows XP Console applications for EWF and Windows XP Embedded PM can be used in batch filesEmbedded PM can be used in batch files

Use “Run”-registry keys to start scriptsUse “Run”-registry keys to start scripts

TroubleshootingTroubleshootingHORMHORMTroubleshootingTroubleshootingHORMHORM

ChecklistChecklist

Enable hibernation support in the Windows XP Embedded imageEWF must be activeHiberfile must be created once with EWF turned off!Resmany.dat needs to be existingBe aware that committing EWF turns off HORM! (Hiberfile must be recreated)

Enable hibernation support in the Windows XP Embedded imageEWF must be activeHiberfile must be created once with EWF turned off!Resmany.dat needs to be existingBe aware that committing EWF turns off HORM! (Hiberfile must be recreated)

Avoiding Common PitfallsAvoiding Common Pitfalls

HORM is notnot working on diskless systemsEl Torito CD boot

Network RAM Boot

Reason: The hiberfile is a dedicated system resource that cannot be shared between different systems

Changing HW configurationTake care with plugging in/out peripherals, especially when using custom shells

Starting applicationsRun entries work most reliably if persisted into the protected volume

HORM is notnot working on diskless systemsEl Torito CD boot

Network RAM Boot

Reason: The hiberfile is a dedicated system resource that cannot be shared between different systems

Changing HW configurationTake care with plugging in/out peripherals, especially when using custom shells

Starting applicationsRun entries work most reliably if persisted into the protected volume

Tuning Boot TimeTuning Boot Time

Use fast boot devices such as HD or flash disk. Normal CF cards are slow.Limit the hiberfile by using just the system memory required. Reading a 2GB hiberfile will never be fast!Use the BootVis utility to profile and optimize your Windows XP Embedded system for fast boot in factory (before sealing the image)Be aware that network timeouts of not connected NICs can slow boot time significantly. (Disable them if not used.)

Use fast boot devices such as HD or flash disk. Normal CF cards are slow.Limit the hiberfile by using just the system memory required. Reading a 2GB hiberfile will never be fast!Use the BootVis utility to profile and optimize your Windows XP Embedded system for fast boot in factory (before sealing the image)Be aware that network timeouts of not connected NICs can slow boot time significantly. (Disable them if not used.)

Known IssuesKnown Issues

Overflow of RAM overlay message:Windows: Delayed Write Failed. Windows was unable to save all data for the file. The data has been lost. This error may be caused by a failure of your computer hardware or network connection.

Counter measures:In the Enhanced Write Filter component in your configuration, on the EWF Configuration Setting tab, click the Use Less Overlay Space and less Writes check box

Rule out any unnecessary disk I/O (especially write requests). NTFS is a good candidate!

Make sure that the disk defragmenting tool is not running in

the background

Overflow of RAM overlay message:Windows: Delayed Write Failed. Windows was unable to save all data for the file. The data has been lost. This error may be caused by a failure of your computer hardware or network connection.

Counter measures:In the Enhanced Write Filter component in your configuration, on the EWF Configuration Setting tab, click the Use Less Overlay Space and less Writes check box

Rule out any unnecessary disk I/O (especially write requests). NTFS is a good candidate!

Make sure that the disk defragmenting tool is not running in

the background

SummarySummarySummarySummary

HORM is able to add significant value to a HORM is able to add significant value to a Windows XP Embedded systemWindows XP Embedded system

Fast boot timesFast boot times

RobustnessRobustness

High availabilityHigh availability

It does not come for freeIt does not come for freeHigher complexity keeping data consistentHigher complexity keeping data consistent

Higher deployment and change management effortsHigher deployment and change management efforts

Application design considerations using mixed Application design considerations using mixed configurationsconfigurations

But, you can make it if you try! But, you can make it if you try!

HORM is able to add significant value to a HORM is able to add significant value to a Windows XP Embedded systemWindows XP Embedded system

Fast boot timesFast boot times

RobustnessRobustness

High availabilityHigh availability

It does not come for freeIt does not come for freeHigher complexity keeping data consistentHigher complexity keeping data consistent

Higher deployment and change management effortsHigher deployment and change management efforts

Application design considerations using mixed Application design considerations using mixed configurationsconfigurations

But, you can make it if you try! But, you can make it if you try!

Stop by the MED Content Publishing Team Station in the Microsoft Pavilion or visit the MED Content Publishing Team Wiki site:http://msdn.microsoft.com/mobility/wiki

ResourcesResources

Need developer resources on this subject? Need developer resources on this subject?

[email protected]

Alexander Wechsler

© 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it

should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.