Home Blog Page 543

Surviving in the Wilderness: Integrity Protection and System Update – Patrick Ohly, Intel GmbH

https://www.youtube.com/watch?v=N8V0W0p3YBU?list=PLbzoR-pLrL6pSlkQDW7RpnNLuxPq6WVUR


Patrick Ohly, a software engineer at Intel, discusses integrity protection schemes and system update mechanisms at the recent Embedded Linux Conference.

Keynote: Disruptive Collaboration – The Next Generation of Network Software – John Donovan

https://www.youtube.com/watch?v=l-QjVrVe9Lo?list=PLbzoR-pLrL6p01ZHHvEeSozpGeVFkFBQZ

Watch the video of this Open Networking Summit keynote to get more details about AT&T’s approach to using software and hardware to evolve their network.

Containers Are Not Lightweight VMs

This series provides a preview of the new, self-paced Containers Fundamentals course from The Linux Foundation, which is designed for those who are new to container technologies. The course covers container building blocks, container runtimes, container storage and networking, Dockerfiles, Docker APIs, and more. In the first excerpt, we defined what containers are, and in this installment, we’ll explain a bit further. You can also sign up to access all the free sample chapter videos now.

Note that containers are not lightweight VMs. Both of these tools provide isolation and run applications, but the underlying technologies are completely different. The process of managing them is also different.

VMs are created on top of a hypervisor, which is installed on the host operating system. Containers directly run on the host operating system, without any guest OS of its own. The host operating system provides isolation and does resource allocation to individual containers.

Once you become familiar with containers and would like to deploy them on production, you might ask “Where should I deploy my containers — on VMs, bare metal, in the cloud?”  From the container’s perspective, it does not matter as it can run anywhere. But in reality, many variables affect the decision, such as cost, performance, security, current skill set, and so on.

Find out more in these sample course videos below, taught by Neependra Khare (@neependra), Founder and Principal Consultant at CloudYuga, former Red Hat engineer, Docker Captain, and author of the Docker Cookbook:

Want to learn more? Access all the free sample chapter videos now!

Running Containers in OpenShift

By Sebastien Goasguen – @sebgoa, Kubernetes lead at Bitnami, Founder of Skippbox, O’Reilly Author

OpenShift is Red Hat container application platform. It is based on Kubernetes and to keep things short we are going to call it a PaaS. The new OpenShift v3 represents a big bet by Red Hat to re-write the software entirely in Go and leverage Kubernetes. Indeed when you use OpenShift, you get a Red Hat distribution of Kubernetes plus the OpenShift functionalities around code deployment, automated builds and so on, that you are used to with a typical PaaS.

What stands out with OpenShift, and what Red Hat touts quite often is the focus on security.

Read more at Medium 

Cleaning Up Your Codebase with a Clean Architecture

Let’s talk software architecture. Most of us know MVC, it’s the foundation for pretty much every web framework. As your product grows though, problems with MVC will start to appear. Even a relatively simple product can end up with a bloated and messy codebase. MVC is where we start, but what do you do when you need to evolve past it?

Before we go further, let’s examine why we have so much trouble explaining the answer.

Here’s a common conversation (for developers anyway):

Read more at dev.to

The World’s Very First Spam: A Remembrance

This month saw the 39th anniversary of the world’s very first spam. It was written on May 1st, 1978 — and sent on May 3rd — by then 31-year-old Gary Thuerk, from Chicago. Young Thuerk had served as an officer in the Navy, and had written FORTRAN programs for IBM mainframes. After one year at Digital Equipment Corporation, he’d been promoted to marketing manager in 1976. And two years later, he seemed determined to make his mark with this missive:

“WE INVITE YOU TO COME SEE THE 2020 AND HEAR ABOUT THE DECSYSTEM-20 FAMILY AT THE TWO PRODUCT PRESENTATIONS WE WILL BE GIVING IN CALIFORNIA THIS MONTH…”

Yes, the whole message was capitalized. 

Read more at The New Stack

Bitnami Comes Up from Below Decks – Kubeless

So Bitnami isn’t the kind of company you usually find sunning it on a deckchair. It’s more of an engine room kind of firm. It takes care of a lot of boring plumbing in creating and deploying open source software packages, underpinning image management for Amazon Web Services, Microsoft Azure, Google Cloud Platform Launchpad, and VMware, covering over 140 open source packages including Jenkins, SugarCRM and WordPress.

I caught up with COO Erica Brescia and VP of Engineering Rick Spencer at Microsoft Build this week. When Microsoft points to its Linux images on Microsoft Azure, that’s Bitnami. The startup is is now broadening its portfolio, including work on a GUI based Enterprise Edition. It will be interesting to see how that works out – managing builds for platforms such as Jenkins can be a major enterprise pain point – and Bitnami is aiming to make the final mile of Continuous Deployment and Continuous Integration less painful with a continuous approach to Package management.

Read more at RedMonk

Google Wants to Solve the Android Update Problem Once and For All

In a post on its developer’s blog, Google unveiled a sneak peek at Project Treble, which it says is “the biggest change to the low-level system architecture of Android to date.” In a nutshell, it aims to significantly lessen the burden on third-party smartphone manufacturers so they can deliver updates in a timely fashion.

As Google describes, the current process is enormously time-consuming, forcing smartphone makers to not only update their own implementation but also Google’s OS framework. Basically, there are five steps to follow each time a new version of Android is released:

Read more at InfoWorld

Understanding Deep Learning Requires Re-Thinking Generalization

This paper has a wonderful combination of properties: the results are easy to understand, somewhat surprising, and then leave you pondering over what it all might mean for a long while afterwards!

The question the authors set out to answer was this:

What is it that distinguishes neural networks that generalize well from those that don’t? A satisfying answer to this question would not only help to make neural networks more interpretable, but it might also lead to more principled and reliable model architecture design.

By “generalize well,” the authors simply mean “what causes a network that performs well on training data to also perform well on the (held out) test data?” (As opposed to transfer learning, which involves applying the trained network to a related but different problem). If you think about that for a moment, the question pretty much boils down to “why do neural networks work as well as they do?” 

Read more at The Morning Paper

RDO Ocata packstack AIO Deployment Via the Most Recent Trunk “current-passed-ci”

Post following bellow is just proof of concept that packstack might
be used for RDO Ocata deployment using the same current-passed-ci
delorean Ocata Trunk as it does on regular basis TripleO QuickStart.

I am not doing multinode set up due to known limitation of packstack,
e.g. disability split controller and storage nodes either on bare metal 
or in virtual environment. Looks like it mostly serves as part 
of the testing pipeline that promotes trunk repositories 
to "current-passed-ci".

Complete text may seen here http://dbaxps.blogspot.com/2017/05/rdo-ocata-packstack-aio-deployment-via.html