Home Blog Page 576

How a Small Team Keeps Twitter’s Fail Whale at Bay

Ian Downes is engineering manager for the compute platform team at Twitter. His team of about 10 engineers and a few other staffers buoys a platform providing container infrastructure to much of the stateless services powering twitter.com and its advertising business. Downes spoke recently at Container World on “Twitter’s Micro Services Architecture: Operational & Technical Challenges.”

When people talk about containerization, he says, it’s often about how it can enable scale and disruption, but that doesn’t interest Downes much.

“What I’m more interested in are scaleable operations — independent of what scale you’re at,” he says.

Read more at OpenStack Superuser

Netflix Launches Support for Firefox on Linux

Linux users have a new option if they want to watch Netflix — the streaming service is now compatible with Firefox for the platform. Before this, only Google Chrome could play videos from the website outright. There was even a time when users had to make sure they’re using a version of Chrome with the required Encrypted Media Extension (EME) support. 

Read more at Engadget

Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web

Thou shalt not depend on me: analysing the use of outdated JavaScript libraries on the web Lauinger et al., NDSS 2017

Just based on the paper title alone, if you had to guess what the situation is with outdated JavaScript libraries on the web, you’d probably guess it was pretty bad. It turns out it’s very bad indeed, and we’ve created a huge mess with nowhere near enough attention being paid to the issue. The first step towards better solutions is recognising that we have a problem, and Lauinger et al., do a tremendous job in that regard.

In this paper, we conduct the first comprehensive study of client-side JavaScript library usage and the resulting security implications across the Web. Using data from over 133K websites, we show that 37% of them include at least one library with a known vulnerability; the time lag behind the newest release of a library is measured in the order of years.

Read more at Morning Paper

Persistent Memory Extensions to libstdc++/libc++ by Tomasz Kapela, Intel

https://www.youtube.com/watch?v=uvirBdDE6Fk?list=PLbzoR-pLrL6ovByiWK-8ALCkZoCQAK-i_

Tomasz Kapela of Intel describes the Non-Volatile Memory programming model created by the Storage Networking Industry Association at LinuxCon Europe.
 
 

Easier Persistent Memory Programming with Extensions to libstdc++ and libc++

Persistent memory, unlike volatile memory, retains its contents even if the server has a power failure. However, as Tomasz Kapela, Software Engineer at Intel, points out during his LinuxCon Europe 2016 talk, persistent memory is hard to achieve. Since persistent memory programming is non-trivial, they have been focused on making it easier for the end user and for applications to use persistent memory correctly. 

Kapela starts off by describing the Non-Volatile Memory (NVM) programming model created by the Storage Networking Industry Association (SNIA), which is an organization focused on standards for storage and networking. The NVM programming model basically describes using a persistent memory device that allows you to mmap a file to your virtual memory inside of the process where you can do loads and stores and flushes onto the memory device without really involving the kernel of the file system. 

As part of the NVML team, they have a set of open source libraries designed to work on Linux and tackle the problem of persistent memory programming. The libraries include:

  • libpmem: The basic library, flush to persistence
  • libvmem: Volatile Memory Allocator
  • libvmmalloc: Transparent use of libvmem
  • libpmemblk: Persistent memory carved into blocks
  • libpmemlog: Log file (append-mostly)
  • libpmemobj: Transactional Object Store

To address some of the pain points and limitations of using C for persistent memory, Kapela discussed how they are using C++ to develop persistent memory extensions to libstdc++ and libc++. He talked in detail about how they are encapsulating type info into a smart pointer, and making life easier with RAII and lambdas for transactions. With the increase in container usage, they are also working on a proof of concept for persistent memory containers. 

Watch the video of Kapela’s entire talk to get all of the details about the persistent memory extensions to libstdc++ and libc++.

https://www.youtube.com/watch?v=uvirBdDE6Fk?list=PLbzoR-pLrL6ovByiWK-8ALCkZoCQAK-i_

Interested in speaking at Open Source Summit North America on September 11-13? Submit your proposal by May 6, 2017. Submit now>>

Not interested in speaking but want to attend? Linux.com readers can register now with the discount code, LINUXRD5, for 5% off the all-access attendee registration price. Register now to save over $300!

6 Hot Internet of Things (IoT) Security Technologies

 Last October, Internet service provider Dyn came under an attack that disrupted access to popular websites. The cybercriminals who initiated the attack managed to commandeer a large number of internet-connected devices (mostly DVRs and cameras) to serve as their helpers. As a result, cybersecurity expert Bruce Schneier has called for government regulation of the IoT, concluding that both IoT manufacturers and their customers don’t care about the security of the 8.4 billion internet-connected devices in current use.

Whether because of government regulation or good old-fashioned self-interest, we can expect increased investment in IoT security technologies. In its recently-released TechRadar report for security and risk professionals, Forrester Research discusses the outlook for the 13 most relevant and important IoT security technologies, warning that “there is no single, magic security bullet that can easily fix all IoT security issues.”

Read more at Forbes

The Four Values of a DevOps Transformation

A successful devops transformation sees a change in organisational culture. These changes often come in the way of adoption of specific tools or practices. However, to change culture, you need something more fundamental than just the introduction of new tools, or pushing everyone into Scrum teams.

Just like the agile transformations of the past, there was a difference between ‘Doing Agile’, and ‘Being Agile’. ‘We do standups’ – therefore we are Agile. Are we ‘Doing devops’ or are we ‘Being devops’? Agile cultures have evolved to a deeper understanding that it’s not about the team structure, or even the ceremonies, but it is about the values that they hold.

So if we are to be successful with a devops transformation, what are the values we should be aiming to foster, and why are these important in the first place?

Read more at Cevo

The Cloud Native Application Lifecycle Difference: Continuous Change

Embracing cloud native applications means changing how we think about, develop, and deploy applications. This shift is not just technological. It impacts the structure of organizations, as teams align to common business outcomes.

Analyst Steve O’Grady at Redmonk has a great explanation of cloud native apps:

There is a rough consensus on many cloud Native traits. Containers as an atomic unit, for example. Micro-servicesas a means of both construction and communication. Platform independenceMultiple language support. Automation as a feature of everything from build to deployment. High uptimeEphemeral infrastructure(cattle not pets). And so on

Read more at The New Stack

ZTE’s Approach to Digital Transformation with Software-Defined Networking

Editor’s Note: ZTE is a Gold-level sponsor of Open Networking Summit 2017, to be held April 3-6 in Santa Clara, CA.

The dawn of new services such as 5G, IoT, AR/VR, e-commerce, connected cars,and more, is driving us to digitalization — a massive transition that also requires the network to change.

ZTE’s Network 2020 Vision, along with the corresponding solutions of ‘ElasticNet’ for Digital Transformation, provides a framework for this future network.

ZTE ElasticNetTM  focuses on ‘Triple-layer re-architectures’:

  • Infrastructure re-architecture: To build up a cloud–and-network converged infrastructure layer that is defined as ‘Elastic Cloud Infrastructure.’

  • Network service re-architecture: To construct a virtualized and open service function layer that is defined as ‘Elastic Cloud ServiceTM’

  • Operation re-architecture: To compose a smartly-operated orchestration layer that is defined as ‘MICT-OSTM’.

Figure 1: Triple-layer Re-architectures of Future Network Architecture.

Empowered by cloud computing technologies, big data and SDN/NFV, ElasticNet involves software-defined networks featuring a layered structure, centralized control and unified management.

The ElasticNet architecture and solutions have been deploying in three typical scenarios to accelerate the network evolution.

Central Office (CO) Re-construction

  • Reconstructing the large number of existing central offices and legacy equipment

  • Utilizing these physical resources for ‘telecom cloud’

  • Transforming legacy networks into SDN and NFV-based networks

ZTE’s CO re-construction solution provides an approach to transforming existing architecture from metro access networks (MANs) to ones based on edge-DCs. The control plane will be separated from the forwarding plane and the functions such as BNG, CPE and OLT will be virtualized and centrally deployed on edge-DCs, and further, the vCDN and vEPC-U will be migrated down to the edge-DCs.

High-performance commodity devices will be utilized as the forwarding plane devices and formed to resource pool so that they are able to meet future requirements for ultra-bandwidth processing. Concurrently, by resource sharing, they are able to reduce the quantity of devices and consequently produce savings in Capex and Opex.

Cloud-Native Based Network Slicing

With the impending arrival of 5G, mobile broadband systems will be full-service networks that integrate multiple technologies to meet various application needs. 5G-oriented network slicing is a mechanism that can be used by operators to support network functions running parallel on the same chip,providing on-demand slicing capabilities.

By introducing NFV enhanced ICT (information and communication technology) PaaS Cloud WorksTMZTE’s ElasticNetTM constructs cloud services by intelligent VNF management and an agile DevOps process. This cloud service platform will attract more developers to promote the innovation of personalized and diversified services.

Network on-Demand

To break through the limits of users’ access to the network resources, ZTE network on-demand solution provides essential applications for network capability exposure. With it, the customer will be able to acquire a range of ondemand services. These DIY services include:

  • Flexible and instant network connection services

  • Options on bandwidths, site locations and QoS levels

  • Customized end-to-end reliable automated leased line services

  • Order of service functions, including NAT, firewalls and DPI

Want to learn more about the network of the future? Register now to attend Open Networking Summit 2017, to be held April 3-6 in Santa Clara, CA. Linux.com readers receive 5% off the “attendee” registration to Open Networking Summit with code LINUXRD5.

How to Deploy Kubernetes on the Raspberry Pi

When I became interested in ARM devices, and in the Raspberry Pi in particular, my first project was an OpenVPN server.

By having the Raspberry Pi as a secure gateway to my home network, I could use my phone to control my desktop and remotely play Spotify, open documents, and a bunch of other fun things. I used an existing tutorial for that first project because I was afraid of piping anything into the command line on my own.

Read more at OpenSource.com