FOSDEM 2016 Schedule

Total Page:16

File Type:pdf, Size:1020Kb

FOSDEM 2016 Schedule FOSDEM 2016 - Saturday 2016-01-30 (1/9) Janson K.1.105 (La H.2215 (Ferrer) H.1301 (Cornil) H.1302 (Depage) H.1308 (Rolin) H.1309 (Van Rijn) H.2213 H.2214 H.3227 H.3228 AW1.120 Fontaine)… 09:30 Welcome to FOSDEM 2016 09:45 10:00 systemd and Where We Want to Take the Basic Linux Userspace in 2016 10:15 Free Java 2016 Welcom… 10:30 The State of OpenJDK Community Based Growing the MySQL Automated Cloud Transcoding Firefox OS: Why we Testing Ecosystem Implementation of PCI- Architecture with exist DSS compliant solution FFMPEG; Scale and using open-source tools Distribution with 10:45 Kaltura Transcoding MySQL 5.7 & JSON 11:00 AMENDMENT: Cockpit: Digital Hardware This Is Not A Drill - Building add-ons for Identity Management Welcome to the Legal Synchronised multi- Design for All versus A Linux Session in your Design: Why is it still so Preparing for JDK 9 Firefox with with midPoint … device media playback Design for One and Browser hard? WebExtensions Free as in freedom. The with GStreamer Adaptive User importance of FOSS in Interfaces 11:15 the surveillance era What's new in MySQL 5.7? 11:30 The HotSpot Whitebox- Developing addons for Security in IoT; more a Dependency What's new in VLC and GPII Testing API Firefox OS cultural chock than a management and libVLC? technical challenge licencing information 11:45 12:00 Enterprise desktop at GNU Radio for Exploring Rock the Helpful Web Security and privacy in Community impacts of Creating interactive Designing accessible home with FreeIPA and Signals Shenandoah, Theory with SUMO MySQL Group your embedded legal decisions experiences with video applications GNOME and Practice Replication or how good systems 12:15 theory gets into better practice 12:30 AMENDMENT: How well ANALYZE for IoT meets Security When is Distribution not Adding subtitles to the Blender as virtual do you delegate? statements: MariaDB's Distribution? dash.js player studio lighting The AArch32 Project - new tool for diagnosing playground the optimizer 12:45 ARM32 support in our lifetimes Rolling out Global 13:00 Open-sourcing RIPE Vulkan in Open-Source Why develop eco- The use of OpenSource Transaction IDs at Tizen 3.0 platform Why Open Core GPAC/MP4Box.js Tips & Tricks for logo Atlas conscious Libre software in Mozilla Dropbox security model Licensing Sucks!! creation Hardware? 13:15 Running PostgreSQL on MariaDB CONNECT a VAX Storage Engine 13:30 Hunting the bug from How Your Data Helps to USBGuard What will be new in DIY mobile usability Hell Improve Firefox Kodi version 17 testing AMENDMENT: How to 13:45 develop eco-conscious More on gdb for MySQL Libre Hardware DBAs 14:00 What Do Code Reviews Libreboot - free your AMENDMENT: An HTTP/2 update ↴ Can we run C code and Legal and policy issues Implementing a native Open source in non at Microsoft and in BIOS today! ↴ Arguman.org be safe? ↴ around the use of open Daala decoder in software design ↴ Open Source Projects… Clusternaut: Orchestr… source softwar… FFmpeg ↴ FOSDEM 2016 - Saturday 2016-01-30 (2/9) AW1.121 AW1.124 AW1.125 AW1.126 K.3.201 K.3.401 K.4.201 K.4.401 K.4.601 UA2.114 (Baudoux) UA2.220 (Guillissen) UB2.147 09:30 09:45 10:00 BSDCG Exam Session 10:15 Closing the gap between Distros (devs) 10:30 FOSS TCAD/EDA tools Arrival & Informal A CoAP library for The GNU Guile Project AMENDMENT: PJSIP: a and their Users (ops) Migrating the Army, the Opening note An introduction to LXD for semiconductor Discussions making developer's life free and open source Navy and the Air Force, device modeling simplier multimedia in one single move An exploration of the communication library 10:45 Single-pass Graph seL4 kernel from Streaming Analytics Adding GNU/Hurd Eternal Plugfest Genode's perspective with Apache Flink support to GNU Guix Building a WebRTC 11:00 Gnucap and related Welcome A distributed control application Distributions from the Junit-contracts work An Introduction to Ada system for the Internet view of a package From pets to cattle to for Beginning and of Things wisp: simplest Contributing to the help flock of birds—why 11:15 Experienced whitespace Scheme of LibreOffice using the you'll never need to ssh Programmers into a server again and Janus: the general HelpAuthoring extension what else the future will purpose WebRTC brin… 11:30 Qucs: overview, status Accessing Web Services Paving a path to Gateway Building Linux Cleaning up the and roadmap from IoT Devices greater network distribution packages spellcheck dictionary Porting HelenOS to freedom with Docker RISC-V What's coming up in 11:45 The openCypher Project The community Guile containers? could have Lowering the bar for new developers Testing interoperability 12:00 Building system-on- Make with Ada - Small Build an IoT platform on A gentle introduction to Real-time Charging for Haiku's package with closed-source LPI Exam Session 1 chips with Migen and Projects to Have Fun Matrix functional package distributed management software through MiSoC with Ada! management with GNU communication scriptable diplomacy Guix platforms using Improving the toolbars 12:15 CGRateS in LibreOffice Docker for Developers Sharp.Xmpp, a 12:30 PostgreSQL features for Your distro is a Scheme multiplatform .NET Introducing game-data- Inside sidebar This is not a lunch IoT library XMPP client library and packager break Android 12:45 Modeling a Philosophical Inquiry: The state of XMPP and UI event fuzzing via Filesystem Testing embedded from MySQL to a graph instant messaging american-fuzzy-lop defragmentation systems database 13:00 GHDL what's new Adopting an Ada Code Orchestration Foreign packages in Homebrew - Things We strategies Program - the GNU Guix Do Differently Experience of Back to the future Whitaker's Words 13:15 Designing High Guile Config Performance RTC Signaling Servers Scaling with 13:30 Digital mixed-language Creating a 3D Game Create Offline IoT VirtualBox Guest LibreOffice Online Tools that helped to Kubernetes, simulators Engine in Windows - Experiences with Additions and Linux internals build HelenOS Automatically! Lessons Learned from Beacons Good news, everybody! Reigniting Openfire distributions Doom 3 BFG 13:45 Real-time scalable Guile 2.2 performance Testing complex graph analytics ↴ notes Mail merge embedding software in CI ↴ A distro for industrial in LibreOffice Writer 14:00 A Free and Open Source Informal Discussions ↴ Smart.JS, a tale of two How awesome ended R&D to be released by CGroups: resources LPI Exam Session 2 ↴ Verilog-to-Bitstream platforms ↴ up with Lua and not Électricité De France management inside Flow for iCE40 FP… Guile ↴ and outside of a Exporting shapes to D… Porting Nix to Genode… contain… FOSDEM 2016 - Saturday 2016-01-30 (3/9) UB2.252A (Lameere) UD2.120 (Chavanne) UD2.218A UD2.Corridor 09:30 09:45 10:00 10:15 10:30 Scheduling in The Age MIPS, the other side of Python tips, tricks and of Virtualization the embedded dark magic 10:45 11:00 Enhance protection AsteroidOS: How to (actually) make from security bugs in architecture of a FOSS games with python the Xen hypervisor smartwatch platform 11:15 11:30 "I find your lack of Why, but why, async threads disturbing" and await keywords have been included in Python 3.5 11:45 12:00 FPGA Manager & Exploring our Python devicetree overlays Interpreter 12:15 QEMU for Xen secure by default 12:30 open source FPGA Camelot for desktop toolchain and hardware and mobile 12:45 13:00 Real-Time Cloud NemoTablet, a FOSS Gunicorn, more than a DIY tablet using WSGI server Raspberry Pi 2 13:15 13:30 Using Python and XMPP to build a decentralized social network 13:45 14:00 Bringing Host Lifecycle Make your own USB Practical execution and Content device without pain and tricks from 10 years of Management into oVirt money! ↴ Mercurial. ↴ ↴ FOSDEM 2016 - Saturday 2016-01-30 (4/9) Janson K.1.105 (La H.2215 (Ferrer) H.1301 (Cornil) H.1302 (Depage) H.1308 (Rolin) H.1309 (Van Rijn) H.2213 H.2214 H.3227 H.3228 AW1.120 Fontaine)… 14:15 ↳ What Do Code ↳ Libreboot - free your ↳ An HTTP/2 update ↳ Clusternaut: ↳ Can we run C code ↳ Legal and policy ↳ Implementing a ↳ Open source in non Reviews at Microsoft BIOS today! Orchestrating Percona and be safe? issues around the use native Daala decoder in … and in Open Source Open-Source XtraDB Cluster with of open source software … Projects Have in Neuroheadset Brain- Kubernetes in public Common? Duino Marlin renderer, a administrations and 14:30 successful fork and join Firefox Performance Lessons learned around the MediaConch Open source design in the OpenJDK 9 project Monitoring running SSL at scale participation of public the UK Government? servants in… Crazyflie 2.0 14:45 Reliable crash detection 15:00 H2O: An Open-Source Rspamd - fast Programming a Board Thermostat for Automated UI testing and failover with An overview Software Patents After What makes Upipe Designing with and for Platform for Machine opensource spam filter Game Developers on FxOS Orchestrator openconnect VPN Alice: A Long and Sad great for video developers Learning and Big Tail processing Data/Big Math 15:15 Java with syslog-ng PERFORMANCE_SCHEM A and SYS Schema 15:30 AMENDMENT: Fault Xen Project Security Broadcast-to-IP Designers Vs Injection Testing With Response War Stories conversion for Wifi developers C Code Refactoring BMUnit indoor coverage 15:45 MySQL operations in Docker 16:00 Gluster roadmap, Applying band-aids Converting WebIDL: the language Ramping up Security at Copyleft For the Next Building a wireless Designer's recent improvements over security wounds LiquidThreads to Flow of Web APIs an open-source startup: Decade camera from off-the- compromises in Open and upcoming features with systemtap Introducing new SQL Lessons learned.
Recommended publications
  • Checkpoint and Restoration of Micro-Service in Docker Containers
    3rd International Conference on Mechatronics and Industrial Informatics (ICMII 2015) Checkpoint and Restoration of Micro-service in Docker Containers Chen Yang School of Information Security Engineering, Shanghai Jiao Tong University, China 200240 [email protected] Keywords: Lightweight Virtualization, Checkpoint/restore, Docker. Abstract. In the present days of rapid adoption of micro-service, it is imperative to build a system to support and ensure the high performance and high availability for micro-services. Lightweight virtualization, which we also called container, has the ability to run multiple isolated sets of processes under a single kernel instance. Because of the possibility of obtaining a low overhead comparable to the near-native performance of a bare server, the container techniques, such as openvz, lxc, docker, they are widely used for micro-service [1]. In this paper, we present the high availability of micro-service in containers. We investigate capabilities provided by container (docker, openvz) to model and build the Micro-service infrastructure and compare different checkpoint and restore technologies for high availability. Finally, we present preliminary performance results of the infrastructure tuned to the micro-service. Introduction Lightweight virtualization, named the operating system level virtualization technology, partitions the physical machines resource, creating multiple isolated user-space instances. Each container acts exactly like a stand-alone server. A container can be rebooted independently and have root access, users, IP address, memory, processes, files, etc. Unlike traditional virtualization with the hypervisor layer, containerization takes place at the kernel level. Most modern operating system kernels now support the primitives necessary for containerization, including Linux with openvz, vserver and more recently lxc, Solaris with zones, and FreeBSD with Jails [2].
    [Show full text]
  • Tarantool Enterprise Manual Release 1.10.4-1
    Tarantool Enterprise manual Release 1.10.4-1 Mail.Ru, Tarantool team Sep 28, 2021 Contents 1 Setup 1 1.1 System requirements.........................................1 1.2 Package contents...........................................2 1.3 Installation..............................................3 2 Developer’s guide 4 2.1 Implementing LDAP authorization in the web interface.....................5 2.2 Delivering environment-independent applications.........................5 2.3 Running sample applications....................................8 3 Cluster administrator’s guide 11 3.1 Exploring spaces........................................... 11 3.2 Upgrading in production...................................... 13 4 Security hardening guide 15 4.1 Built-in security features...................................... 15 4.2 Recommendations on security hardening............................. 17 5 Security audit 18 5.1 Encryption of external iproto traffic................................ 18 5.2 Closed iproto ports......................................... 18 5.3 HTTPS connection termination.................................. 18 5.4 Closed HTTP ports......................................... 19 5.5 Restricted access to the administrative console.......................... 19 5.6 Limiting the guest user....................................... 19 5.7 Authorization in the web UI.................................... 19 5.8 Running under the tarantool user................................. 20 5.9 Limiting access to the tarantool user...............................
    [Show full text]
  • Building Large Tarantool Cluster with 100+ Nodes Yaroslav Dynnikov
    Building large Tarantool cluster with 100+ nodes Yaroslav Dynnikov Tarantool, Mail.Ru Group 10 October 2019 Slides: rosik.github.io/2019-bigdatadays 1 / 40 Tarantool = + Database Application server (Lua) (Transactions, WAL) (Business logics, HTTP) 2 / 40 Core team 20 C developers Product development Solution team 35 Lua developers Commertial projects 3 / 40 Core team 20 C developers Product development Solution team 35 Lua developers Commertial projects Common goals Make development fast and reliable 4 / 40 In-memory no-SQL Not only in-memory: vinyl disk engine Supports SQL (since v.2) 5 / 40 In-memory no-SQL Not only in-memory: vinyl disk engine Supports SQL (since v.2) But We need scaling (horizontal) 6 / 40 Vshard - horizontal scaling in tarantool Vshard assigns data to virtual buckets Buckets are distributed across servers 7 / 40 Vshard - horizontal scaling in tarantool Vshard assigns data to virtual buckets Buckets are distributed across servers 8 / 40 Vshard - horizontal scaling in tarantool Vshard assigns data to virtual buckets Buckets are distributed across servers 9 / 40 Vshard - horizontal scaling in tarantool Vshard assigns data to virtual buckets Buckets are distributed across servers 10 / 40 Vshard - horizontal scaling in tarantool Vshard assigns data to virtual buckets Buckets are distributed across servers 11 / 40 Vshard - horizontal scaling in tarantool Vshard assigns data to virtual buckets Buckets are distributed across servers 12 / 40 Vshard configuration Lua tables sharding_cfg = { ['cbf06940-0790-498b-948d-042b62cf3d29'] = { replicas = { ... }, }, ['ac522f65-aa94-4134-9f64-51ee384f1a54'] = { replicas = { ... }, }, } vshard.router.cfg(...) vshard.storage.cfg(...) 13 / 40 Vshard automation. Options Deployment scripts Docker compose Zookeeper 14 / 40 Vshard automation.
    [Show full text]
  • GNU Guix Cookbook Tutorials and Examples for Using the GNU Guix Functional Package Manager
    GNU Guix Cookbook Tutorials and examples for using the GNU Guix Functional Package Manager The GNU Guix Developers Copyright c 2019 Ricardo Wurmus Copyright c 2019 Efraim Flashner Copyright c 2019 Pierre Neidhardt Copyright c 2020 Oleg Pykhalov Copyright c 2020 Matthew Brooks Copyright c 2020 Marcin Karpezo Copyright c 2020 Brice Waegeneire Copyright c 2020 Andr´eBatista Copyright c 2020 Christine Lemmer-Webber Copyright c 2021 Joshua Branson Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents GNU Guix Cookbook ::::::::::::::::::::::::::::::: 1 1 Scheme tutorials ::::::::::::::::::::::::::::::::: 2 1.1 A Scheme Crash Course :::::::::::::::::::::::::::::::::::::::: 2 2 Packaging :::::::::::::::::::::::::::::::::::::::: 5 2.1 Packaging Tutorial:::::::::::::::::::::::::::::::::::::::::::::: 5 2.1.1 A \Hello World" package :::::::::::::::::::::::::::::::::: 5 2.1.2 Setup:::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.1.2.1 Local file ::::::::::::::::::::::::::::::::::::::::::::: 8 2.1.2.2 `GUIX_PACKAGE_PATH' ::::::::::::::::::::::::::::::::: 9 2.1.2.3 Guix channels ::::::::::::::::::::::::::::::::::::::: 10 2.1.2.4 Direct checkout hacking:::::::::::::::::::::::::::::: 10 2.1.3 Extended example ::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • LIST of NOSQL DATABASES [Currently 150]
    Your Ultimate Guide to the Non - Relational Universe! [the best selected nosql link Archive in the web] ...never miss a conceptual article again... News Feed covering all changes here! NoSQL DEFINITION: Next Generation Databases mostly addressing some of the points: being non-relational, distributed, open-source and horizontally scalable. The original intention has been modern web-scale databases. The movement began early 2009 and is growing rapidly. Often more characteristics apply such as: schema-free, easy replication support, simple API, eventually consistent / BASE (not ACID), a huge amount of data and more. So the misleading term "nosql" (the community now translates it mostly with "not only sql") should be seen as an alias to something like the definition above. [based on 7 sources, 14 constructive feedback emails (thanks!) and 1 disliking comment . Agree / Disagree? Tell me so! By the way: this is a strong definition and it is out there here since 2009!] LIST OF NOSQL DATABASES [currently 150] Core NoSQL Systems: [Mostly originated out of a Web 2.0 need] Wide Column Store / Column Families Hadoop / HBase API: Java / any writer, Protocol: any write call, Query Method: MapReduce Java / any exec, Replication: HDFS Replication, Written in: Java, Concurrency: ?, Misc: Links: 3 Books [1, 2, 3] Cassandra massively scalable, partitioned row store, masterless architecture, linear scale performance, no single points of failure, read/write support across multiple data centers & cloud availability zones. API / Query Method: CQL and Thrift, replication: peer-to-peer, written in: Java, Concurrency: tunable consistency, Misc: built-in data compression, MapReduce support, primary/secondary indexes, security features.
    [Show full text]
  • Technical Impacts of DNS Privacy and Security on Network Service Scenarios
    - Technical Impacts of DNS Privacy and Security on Network Service Scenarios ATIS-I-0000079 | April 2020 Abstract The domain name system (DNS) is a key network function used to resolve domain names (e.g., atis.org) into routable addresses and other data. Most DNS signalling today is sent using protocols that do not support security provisions (e.g., cryptographic confidentiality protection and integrity protection). This may create privacy and security risks for users due to on-path nodes being able to read or modify DNS signalling. In response to these concerns, particularly for DNS privacy, new protocols have been specified that implement cryptographic DNS security. Support for these protocols is being rapidly introduced in client software (particularly web browsers) and in some DNS servers. The implementation of DNS security protocols can have a range of positive benefits, but it can also conflict with important network services that are currently widely implemented based on DNS. These services include techniques to mitigate malware and to fulfill legal obligations placed on network operators. This report describes the technical impacts of DNS security protocols in a range of network scenarios. This analysis is used to derive recommendations for deploying DNS security protocols and for further industry collaboration. The aim of these recommendations is to maximize the benefits of DNS security support while reducing problem areas. Foreword As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions (ATIS) brings together the top global ICT companies to advance the industry’s business priorities. ATIS’ 150 member companies are currently working to address network reliability, 5G, robocall mitigation, smart cities, artificial intelligence-enabled networks, distributed ledger/blockchain technology, cybersecurity, IoT, emergency services, quality of service, billing support, operations and much more.
    [Show full text]
  • Guide De Protection Numérique Des Sources Journalistiques
    Guide de Protection numérique des Sources journalistiques Mise en œuvre simplifiée Par Hector Sudan Version du document : 23.04.2021 Mises à jour disponibles gratuitement sur https://sourcesguard.ch/publications Guide de Protection numérique des Sources journalistiques Les journalistes ne sont pas suffisamment sensibilisés aux risques numé- riques et ne disposent pas assez d'outils pour s'en protéger. C'est la consta- tation finale d'une première recherche sociologique dans le domaine jour- nalistique en Suisse romande. Ce GPS (Guide de Protection numérique des Sources) est le premier résultat des recommandations de cette étude. Un GPS qui ne parle pas, mais qui va droit au but en proposant des solutions concrètes pour la sécurité numérique des journalistes et de leurs sources. Il vous est proposé une approche andragogique et tactique, de manière résumée, afin que vous puissiez mettre en œuvre rapidement des mesures visant à améliorer votre sécurité numérique, tout en vous permettant d'être efficient. Même sans être journaliste d'investigation, vos informations et votre protection sont importantes. Vous n'êtes peut-être pas directement la cible, mais pouvez être le vecteur d'une attaque visant une personne dont vous avez les informations de contact. Hector Sudan est informaticien au bénéfice d'un Brevet fédéral en technique des sys- tèmes et d'un MAS en lutte contre la crimina- lité économique. Avec son travail de master l'Artiste responsable et ce GPS, il se posi- tionne comme chercheur, formateur et consul- tant actif dans le domaine de la sécurité numé- rique pour les médias et journalistes. +41 76 556 43 19 keybase.io/hectorsudan [email protected] SourcesGuard Avant propos Ce GPS (Guide de Protection numérique des Sources journalistes) est à l’image de son acronyme : concis, clair, allant droit au but, tout en offrant la possibilité de passer par des chemins techniquement complexes.
    [Show full text]
  • Evaluating and Improving LXC Container Migration Between
    Evaluating and Improving LXC Container Migration between Cloudlets Using Multipath TCP By Yuqing Qiu A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Master of Applied Science in Electrical and Computer Engineering Carleton University Ottawa, Ontario © 2016, Yuqing Qiu Abstract The advent of the Cloudlet concept—a “small data center” close to users at the edge is to improve the Quality of Experience (QoE) of end users by providing resources within a one-hop distance. Many researchers have proposed using virtual machines (VMs) as such service-provisioning servers. However, seeing the potentiality of containers, this thesis adopts Linux Containers (LXC) as Cloudlet platforms. To facilitate container migration between Cloudlets, Checkpoint and Restore in Userspace (CRIU) has been chosen as the migration tool. Since the migration process goes through the Wide Area Network (WAN), which may experience network failures, the Multipath TCP (MPTCP) protocol is adopted to address the challenge. The multiple subflows established within a MPTCP connection can improve the resilience of the migration process and reduce migration time. Experimental results show that LXC containers are suitable candidates for the problem and MPTCP protocol is effective in enhancing the migration process. i Acknowledgement I would like to express my sincerest gratitude to my principal supervisor Dr. Chung-Horng Lung who has provided me with valuable guidance throughout the entire research experience. His professionalism, patience, understanding and encouragement have always been my beacons of light whenever I go through difficulties. My gratitude also goes to my co-supervisor Dr.
    [Show full text]
  • The Aurora Operating System
    The Aurora Operating System Revisiting the Single Level Store Emil Tsalapatis Ryan Hancock Tavian Barnes RCS Lab, University of Waterloo RCS Lab, University of Waterloo RCS Lab, University of Waterloo [email protected] [email protected] [email protected] Ali José Mashtizadeh RCS Lab, University of Waterloo [email protected] ABSTRACT KEYWORDS Applications on modern operating systems manage their single level stores, transparent persistence, snapshots, check- ephemeral state in memory, and persistent state on disk. En- point/restore suring consistency between them is a source of significant developer effort, yet still a source of significant bugs inma- ACM Reference Format: ture applications. We present the Aurora single level store Emil Tsalapatis, Ryan Hancock, Tavian Barnes, and Ali José Mash- (SLS), an OS that simplifies persistence by automatically per- tizadeh. 2021. The Aurora Operating System: Revisiting the Single sisting all traditionally ephemeral application state. With Level Store. In Workshop on Hot Topics in Operating Systems (HotOS recent storage hardware like NVMe SSDs and NVDIMMs, ’21), June 1-June 3, 2021, Ann Arbor, MI, USA. ACM, New York, NY, Aurora is able to continuously checkpoint entire applications USA, 8 pages. https://doi.org/10.1145/3458336.3465285 with millisecond granularity. Aurora is the first full POSIX single level store to han- dle complex applications ranging from databases to web 1 INTRODUCTION browsers. Moreover, by providing new ways to interact with Single level storage (SLS) systems provide persistence of and manipulate application state, it enables applications to applications as an operating system service. Their advantage provide features that would otherwise be prohibitively dif- lies in removing the semantic gap between the in-memory ficult to implement.
    [Show full text]
  • Checkpoint and Restore of Singularity Containers
    Universitat politecnica` de catalunya (UPC) - BarcelonaTech Facultat d'informatica` de Barcelona (FIB) Checkpoint and restore of Singularity containers Grado en ingenier´ıa informatica´ Tecnolog´ıas de la Informacion´ Memoria 25/04/2019 Director: Autor: Jordi Guitart Fernandez Enrique Serrano G´omez Departament: Arquitectura de Computadors 1 Abstract Singularity es una tecnolog´ıade contenedores software creada seg´unlas necesidades de cient´ıficos para ser utilizada en entornos de computaci´onde altas prestaciones. Hace ya 2 a~nosdesde que los usuarios empezaron a pedir una integraci´onde la fun- cionalidad de Checkpoint/Restore, con CRIU, en contenedores Singularity. Esta inte- graci´onayudar´ıaen gran medida a mejorar la gesti´onde los recursos computacionales de las m´aquinas. Permite a los usuarios guardar el estado de una aplicaci´on(ejecut´andose en un contenedor Singularity) para poder restaurarla en cualquier momento, sin perder el trabajo realizado anteriormente. Por lo que la posible interrupci´onde una aplicaci´on, debido a un fallo o voluntariamente, no es una p´erdidade tiempo de computaci´on. Este proyecto muestra como es posible realizar esa integraci´on. Singularity ´esuna tecnologia de contenidors software creada segons les necessitats de cient´ıfics,per ser utilitzada a entorns de computaci´od'altes prestacions. Fa 2 anys desde que els usuaris van comen¸cara demanar una integraci´ode la funcional- itat de Checkpoint/Restore, amb CRIU, a contenidors Singularity. Aquesta integraci´o ajudaria molt a millorar la gesti´odels recursos computacionals de les m`aquines.Permet als usuaris guardar l'estat d'una aplicaci´o(executant-se a un contenidor Singularity) per poder restaurar-la en qualsevol moment, sense perdre el treball realitzat anteriorment.
    [Show full text]
  • Some Ethical Hacking Possibilities in Kali Linux Environment
    Vol. 9, No. 4, 2019 pp. 129-149 http://doi.org/10.24368/jates.v9i4.139 21 129 Journal of Applied Technical and Educational Sciences jATES ISSN 2560-5429 http://jates.org Some ethical hacking possibilities in Kali Linux environment Petar Cisara, Robert Pinterb aUniversity of Criminal Investigation and Police Studies, Cara Dusana 196, 11080 Zemun, Serbia, [email protected] bSubotica Tech - College of Applied Sciences, Marka Oreskovica 16, 24000 Subotica, Serbia, [email protected] Abstract This paper deals with the problem of ethical hacking and security of computer systems. When we talk about security of an information system, we actually mean the primary three attributes of the system: confidentiality, integrity and availability. There are various approaches with aim to identify existing security weaknesses and security assessment. One of them is using Kali Linux operating system with its integrated effective tools specially adapted to the realization of various types of attacks. The paper gives a general overview of some Kali attacking possibilities on client and server side and highlights their specificities. The undoubted benefit of this operating system is a large collection of different hacking tools in one place which significantly facilitates vulnerability assessment and security testing. Keywords: Kali Linux; tools; attack; security; ethical hacking 1. Introduction In general, four main categories (or phases) of information security assessments can be identified (Hertzog, 2017): a vulnerability assessment, a compliance (audit) test, a traditional internal/external penetration test, and an application assessment. There are various methods with aim to identify existing security weaknesses and security assessment (Allen, 2014).
    [Show full text]
  • Op E N So U R C E Yea R B O O K 2 0
    OPEN SOURCE YEARBOOK 2016 ..... ........ .... ... .. .... .. .. ... .. OPENSOURCE.COM Opensource.com publishes stories about creating, adopting, and sharing open source solutions. Visit Opensource.com to learn more about how the open source way is improving technologies, education, business, government, health, law, entertainment, humanitarian efforts, and more. Submit a story idea: https://opensource.com/story Email us: [email protected] Chat with us in Freenode IRC: #opensource.com . OPEN SOURCE YEARBOOK 2016 . OPENSOURCE.COM 3 ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ OPENSOURCE.COM...... ........ .. .. .. ... .... ........ WRITE FOR US ..... .. .. .. ... .... 7 big reasons to contribute to Opensource.com: Career benefits: “I probably would not have gotten my most recent job if it had not been for my articles on 1 Opensource.com.” Raise awareness: “The platform and publicity that is available through Opensource.com is extremely 2 valuable.” Grow your network: “I met a lot of interesting people after that, boosted my blog stats immediately, and 3 even got some business offers!” Contribute back to open source communities: “Writing for Opensource.com has allowed me to give 4 back to a community of users and developers from whom I have truly benefited for many years.” Receive free, professional editing services: “The team helps me, through feedback, on improving my 5 writing skills.” We’re loveable: “I love the Opensource.com team. I have known some of them for years and they are 6 good people.” 7 Writing for us is easy: “I couldn't have been more pleased with my writing experience.” Email us to learn more or to share your feedback about writing for us: https://opensource.com/story Visit our Participate page to more about joining in the Opensource.com community: https://opensource.com/participate Find our editorial team, moderators, authors, and readers on Freenode IRC at #opensource.com: https://opensource.com/irc .
    [Show full text]