Bell Labs, the Innovation Engine of Lucent

Total Page:16

File Type:pdf, Size:1020Kb

Bell Labs, the Innovation Engine of Lucent INTERNSHIPS FOR RESEARCH ENGINEERS/COMPUTER SCIENTISTS BELL LABS DUBLIN (IRELAND) – BELL LABS STUTTGART (GERMANY) Background Candidates are expected to have some experience related to the following topics: Bell Laboratories is a leading end-to-end systems and • Operating systems, virtualisation and computer solutions research lab working in the areas of cloud architectures. and distributed computing, platforms for real-time • big-data streaming and analytics, wireless networks, Software development skills (C/C++, Python). • semantic data access, services-centric operations and Computer networks and distributed systems. thermal management. The lab is embedded in the • Optimisation techniques and algorithms. great traditions of the Bell Labs systems research, in- • Probabilistic modelling of systems performance. ternationally renowned as the birthplace of modern The following skills or interests are also desirable: information theory, UNIX, the C/C++ programming • languages, Awk, Plan 9 from Bell Labs, Inferno, the Experience with OpenStack or OpenNebula or Spin formal verification tool, and many other sys- other cloud infrastructure management software. • tems, languages, and tools. Kernel-level programming (drivers, scheduler,...). • Xen, KVM and Linux scripting/administration. We offer summer internships in our Cloud • Parallel and distributed systems programming Computing team, spread across the facilities in Dublin (Ireland) and Stuttgart (Germany), focusing (MPI, OpenMP, CUDA, MapReduce, StarSs, …). • on research enabling future cloud and distributed Simulation of distributed systems. computing applications, virtualised network • OpenFlow, Mininet functions, software-defined networks and real-time communications. Key attributes • A successful candidate will have strong experience in Good written and oral communication skills, able distributed systems, computer networks, operating to participate in robust discussions in English. systems, virtualisation, multimedia systems, and is • Provable experience with programming and OS expected to be able to design and build systems. administration (Linux, UNIX). • Able to autonomously develop software. Role description Benefits • Design and develop components, tools, middleware supporting challenging research The candidate will have the opportunity to acquire activities on cloud and distributed computing, system-level experience and competencies in the area with a particular focus on adaptive and elastic of cloud and distributed computing, focusing on services. latency and performance control for cloud • Publish the outcomes of the research in major applications. These skills are at the heart of nowadays scientific venues worldwide, including top con- industrial and research efforts building the IT systems ferences and journals. of tomorrow. Also, the candidate will get familiarity • Contribute in a positive manner to the creative with, and will have an opportunity to contribute to, and innovative atmosphere in Bell Labs. the unique dynamic research environment of Bell Labs, the innovation engine of Alcatel-Lucent. Qualifications, skills, and experience Application The ideal candidate is a PhD student in computer science or engineering or any related field, with a In order to apply, please, send an e-mail of interest research program involving cloud and distributed enclosing your full CV and a research statement letter computing and associated networking technologies. to: [email protected]. He or she must possess excellent problem solving skills, be an autonomous developer and a self-starter, and be a team player. A successful candidate is a versatile, flexible and hands-on person. AT THE SPEED OF IDEASTM.
Recommended publications
  • Java Implementation of the Graphical User Interface of the Octopus Distributed Operating System
    Java implementation of the graphical user interface of the Octopus distributed operating system Submitted by Aram Sadogidis Advisor Prof. Spyros Lalis University of Thessaly Volos, Greece October 2012 Acknowledgements I am sincerely grateful for all the people that supported me during my Uni- versity studies. Special thanks to professor Spyros Lalis, my mentor, who had decisive influence in shaping my character as an engineer. Also many thanks to my family and friends, whose support all these years, encouraged me to keep moving forward. 1 Contents 1 Introduction 4 2 System software technologies 6 2.1 Inferno OS . 6 2.2 JavaSE and Android framework . 8 2.3 Synthetic file systems . 10 2.3.1 Styx . 10 2.3.2 Op . 12 3 Octopus OS 14 3.1 UpperWare architecture . 14 3.2 Omero, a filesystem based window system . 16 3.3 Olive, the Omero viewer . 19 3.4 Ox, the Octopus shell . 21 4 Java Octopus Terminal 23 4.1 JOlive . 24 4.2 Desktop version . 25 4.2.1 Omero package . 26 4.2.2 ui package . 27 4.3 Android version . 28 4.3.1 com.jolive.Omero . 28 4.3.2 com.jolive.ui . 29 4.3.3 Pull application's UI . 30 5 Future perspective 33 5.1 GPS resources . 33 5.2 JOp . 34 5.3 Authentication device . 34 5.4 Remote Voice commander . 34 5.5 Conclusion . 35 6 Thesis preview in Greek 38 2 List of Figures 2.1 An application operates on a synthetic file as if it is a disk file, effectively communicating with a synthetic file system server.
    [Show full text]
  • Persistent 9P Sessions for Plan 9
    Persistent 9P Sessions for Plan 9 Gorka Guardiola, [email protected] Russ Cox, [email protected] Eric Van Hensbergen, [email protected] ABSTRACT Traditionally, Plan 9 [5] runs mainly on local networks, where lost connections are rare. As a result, most programs, including the kernel, do not bother to plan for their file server connections to fail. These programs must be restarted when a connection does fail. If the kernel’s connection to the root file server fails, the machine must be rebooted. This approach suffices only because lost connections are rare. Across long distance networks, where connection failures are more common, it becomes woefully inadequate. To address this problem, we wrote a program called recover, which proxies a 9P session on behalf of a client and takes care of redialing the remote server and reestablishing con- nection state as necessary, hiding network failures from the client. This paper presents the design and implementation of recover, along with performance benchmarks on Plan 9 and on Linux. 1. Introduction Plan 9 is a distributed system developed at Bell Labs [5]. Resources in Plan 9 are presented as synthetic file systems served to clients via 9P, a simple file protocol. Unlike file protocols such as NFS, 9P is stateful: per-connection state such as which files are opened by which clients is maintained by servers. Maintaining per-connection state allows 9P to be used for resources with sophisticated access control poli- cies, such as exclusive-use lock files and chat session multiplexers. It also makes servers easier to imple- ment, since they can forget about file ids once a connection is lost.
    [Show full text]
  • Plan 9 from Bell Labs
    Plan 9 from Bell Labs “UNIX++ Anyone?” Anant Narayanan Malaviya National Institute of Technology FOSS.IN 2007 What is it? Advanced technology transferred via mind-control from aliens in outer space Humans are not expected to understand it (Due apologies to lisperati.com) Yeah Right • More realistically, a distributed operating system • Designed by the creators of C, UNIX, AWK, UTF-8, TROFF etc. etc. • Widely acknowledged as UNIX’s true successor • Distributed under terms of the Lucent Public License, which appears on the OSI’s list of approved licenses, also considered free software by the FSF What For? “Not only is UNIX dead, it’s starting to smell really bad.” -- Rob Pike (circa 1991) • UNIX was a fantastic idea... • ...in it’s time - 1970’s • Designed primarily as a “time-sharing” system, before the PC era A closer look at Unix TODAY It Works! But that doesn’t mean we don’t develop superior alternates GNU/Linux • GNU’s not UNIX, but it is! • Linux was inspired by Minix, which was in turn inspired by UNIX • GNU/Linux (mostly) conforms to ANSI and POSIX requirements • GNU/Linux, on the desktop, is playing “catch-up” with Windows or Mac OS X, offering little in terms of technological innovation Ok, and... • Most of the “modern ideas” we use today were “bolted” on an ancient underlying system • Don’t believe me? A “modern” UNIX Terminal Where did it go wrong? • Early UNIX, “everything is a file” • Brilliant! • Only until people started adding “features” to the system... Why you shouldn’t be working with GNU/Linux • The Socket API • POSIX • X11 • The Bindings “rat-race” • 300 system calls and counting..
    [Show full text]
  • Security of OS-Level Virtualization Technologies: Technical Report
    Security of OS-level virtualization technologies Elena Reshetova1, Janne Karhunen2, Thomas Nyman3, N. Asokan4 1 Intel OTC, Finland 2 Ericsson, Finland 3 University of Helsinki, Finland 4 Aalto University and University of Helsinki, Finland Abstract. The need for flexible, low-overhead virtualization is evident on many fronts ranging from high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study of OS-level virtualization from the point of view of security. In this report, we conduct a comparative study of several OS- level virtualization systems, discuss their security and identify some gaps in current solutions. 1 Introduction During the past couple of decades the use of different virtualization technolo- gies has been on a steady rise. Since IBM CP-40 [19], the first virtual machine prototype in 1966, many different types of virtualization and their uses have been actively explored both by the research community and by the industry. A relatively recent approach, which is becoming increasingly popular due to its light-weight nature, is Operating System-Level Virtualization, where a number of distinct user space instances, often referred to as containers, are run on top of a shared operating system kernel. A fundamental difference between OS-level virtualization and more established competitors, such as Xen hypervisor [24], VMWare [48] and Linux Kernel Virtual Machine [29] (KVM), is that in OS-level virtualization, the virtualized artifacts are global kernel resources, as opposed to hardware.
    [Show full text]
  • A Flexible Framework for File System Benchmarking &Pivot
    ;login SPRING 2016 VOL. 41, NO. 1 : & Filebench: A Flexible Framework for File System Benchmarking Vasily Tarasov, Erez Zadok, and Spencer Shepler & Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems Jonathan Mace, Ryan Roelke, and Rodrigo Fonseca & Streaming Systems and Architectures: Kafka, Spark, Storm, and Flink Jayant Shekhar and Amandeep Khurana & BeyondCorp: Design to Deployment at Google Barclay Osborn, Justin McWilliams, Betsy Beyer, and Max Saltonstall Columns Red/Blue Functions: How Python 3.5’s Async IO Creates a Division Among Function David Beazley Using RPCs in Go Kelsey Hightower Defining Interfaces with Swagger David N. Blank-Edelman Getting Beyond the Hero Sysadmin and Monitoring Silos Dave Josephsen Betting on Growth vs Magnitude Dan Geer Supporting RFCs and Pondering New Protocols Robert G. Ferrell UPCOMING EVENTS NSDI ’16: 13th USENIX Symposium on Networked USENIX Security ’16: 25th USENIX Security Systems Design and Implementation Symposium March 16–18, 2016, Santa Clara, CA, USA August 10–12, 2016, Austin, TX, USA www.usenix.org/nsdi16 www.usenix.org/sec16 Co-located with NSDI ’16 Co-located with USENIX Security ’16 CoolDC ’16: USENIX Workshop on Cool Topics on WOOT ’16: 10th USENIX Workshop on Offensive Sustainable Data Centers Technologies March 19, 2016 August 8–9, 2016 www.usenix.org/cooldc16 Submissions due May 17, 2016 www.usenix.org/woot16 SREcon16 CSET ’16: 9th Workshop on Cyber Security April 7–8, 2016, Santa Clara, CA, USA Experimentation and Test www.usenix.org/srecon16 August 8, 2016 Submissions
    [Show full text]
  • Operating Systems – the Code We Love to Hate
    U.S. Department of Energy Office of Science Operating Systems – the Code We Love to Hate (Operating and Runtime Systems: Status, Challenges and Futures) Fred Johnson Senior Technical Manager for Computer Science Office of Advanced Scientific Computing Research DOE Office of Science Salishan – April 2005 1 U.S. Department of Energy The Office of Science Office of Science Supports basic research that underpins DOE missions. Constructs and operates large scientific facilities for the U.S. scientific community. Accelerators, synchrotron light sources, neutron sources, etc. Six Offices Basic Energy Sciences Biological and Environmental Research Fusion Energy Sciences High Energy Nuclear Physics Advanced Scientific Computing Research Salishan – April 2005 2 U.S. Department of Energy Simulation Capability Needs -- FY2005 Timeframe Office of Science Sustained Application Simulation Need Computational Significance Capability Needed (Tflops) Climate Calculate chemical balances Provides U.S. policymakers with Science in atmosphere, including > 50 leadership data to support policy clouds, rivers, and decisions. Properly represent and vegetation. predict extreme weather conditions in changing climate. Magnetic Optimize balance between > 50 Underpins U.S. decisions about future Fusion Energy self-heating of plasma and international fusion collaborations. heat leakage caused by Integrated simulations of burning electromagnetic turbulence. plasma crucial for quantifying prospects for commercial fusion. Combustion Understand interactions > 50 Understand detonation dynamics (e.g. Science between combustion and engine knock) in combustion turbulent fluctuations in systems. Solve the “soot “ problem burning fluid. in diesel engines. Environmental Reliably predict chemical > 100 Develop innovative technologies to Molecular and physical properties of remediate contaminated soils and Science radioactive substances. groundwater. Astrophysics Realistically simulate the >> 100 Measure size and age of Universe and explosion of a supernova for rate of expansion of Universe.
    [Show full text]
  • A Repository of Unix History and Evolution
    http://www.dmst.aueb.gr/dds/pubs/jrnl/2016-EMPSE-unix-history/html/unix-history.html This is an HTML rendering of a working paper draft that led to a publication. The publication should always be cited in preference to this draft using the following reference: Diomidis Spinellis. A repository of Unix History and evolution. Empirical Software Engineering, 22(3):1372–1404, 2017. (doi:10.1007/s10664-016-9445-5) This document is also available in PDF format. The final publication is available at Springer via doi:10.1007/s10664-016-9445-5. The document's metadata is available in BibTeX format. Find the publication on Google Scholar This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Diomidis Spinellis Publications A Repository of Unix History and Evolution1 Diomidis Spinellis Abstract The history and evolution of the Unix operating system is made available as a revision management repository, covering the period from its inception in 1972 as a five thousand line kernel, to 2016 as a widely-used 27 million line system. The 1.1GB repository contains 496 thousand commits and 2,523 branch merges. The repository employs the commonly used Git version control system for its storage, and is hosted on the popular GitHub archive.
    [Show full text]
  • C Programming in Plan 9 from Bell Labs
    C Programming in Plan 9 from Bell Labs Pietro Gagliardi ABSTRACT 6DEI F=FAH EI =n EnJHo@K?JEon Jo FHoCH=mmEnC MEJD 2l=n ' BHom *All L=>I MEJD JDA + l=nCK=CA. 2l=n ' FHoLE@AI noJ onlO = IECnEBE?=nJlO EmFHoLA@ LAHIEon oB +, >KJ =lIo = nKm>AH oB FHoCH=mmEnC lE>H=HEAI Jo IEmFlEBO ?omFlE?=JA@ J=IkI. 6DEI F=FAH EI mA=nJ Jo >A = IKFFlAmAnJ Jo JDA m=nK=l F=CAI, oJDAH @o?KmAnJI FHoLE@A@ >O JDA IOIJAm En /sys/doc,=n@=FHoCH=mmAHߣIlEJAH=JKHA?ollA?JEon. 1. Introduction 2l=n ' BHom *All L=>I D=I =lM=OI >AAn = IOIJAm =>oLA JDA HAIJ: IEmFlA, FoHJ=>lA, =n@ BA=JKHA-?omFlAJA. 1J EInߣJ 7N1:;® H=JDAH, EJ EmFHoLAI on JDA >=IE?I oB 7N1: >O FHoLE@­ EnC = nKm>AH oB BA=JKHAI =>IAnJ BHom moIJ oJDAH oFAH=JEnC IOIJAmI. OnA oB JDoIA BA=­ JKHAI EI = CHA=J FHoCH=mmEnC AnLEHonmAnJ JD=J HEL=lI 7N1:ߣI. 2l=n ' EI BKllO 7nE?o@A- ?onBoHm=nJ JDHoKCD EJI nA=HlO KnELAHI=l KIA oB JDA 76.-& An?o@EnC, >HoKCDJ Jo KI >O JMo oB JDA FAoFlA JD=J >HoKCDJ KI 2l=n '. 1J noJ onlO kAAFI JDA + l=nCK=CA oB ol@, >KJ JDHoKCD JDA MoHk oB KAn 6DomFIon, EJ FHoLE@AI = + JD=J m=kAI IomA oJDAHMEIA ?omFlE­ ?=JA@ ?onIJHK?JI IJH=ECDJBoHM=H@. *=?kEnC JDEI nAM + KF EI !! FHoCH=mm=>ElEJO lE>H=HEAI JD=J IECnEBE?=nJlO HA@K?A JDA =moKnJ oB ?o@A = FHoCH=mmAH nAA@I Jo MHEJA.
    [Show full text]
  • Real Time in a Real Operating System.Pdf
    30 Real Time in a Real Operating System Sape J. Mullender, Pierre G. Jansen Introduction The quality of an operating system is more a subject of religious debate than of technical merit. The Windows community is like the Catholic Church; it has the largest following, and its members are mostly laymen who do not participate much in religious debates. The community is organized on strong hierarchical lines. The Unix community is like the mainstream Protestant Church; it has not as large a following as the Windows community, and its members define the system and run the community. Like the Protestant Church, there are many flavors of observance: Linux, FreeBSD, NetBSD, Mach; the list is as long as the list of protestant variants. Most are highly evangelical—a good Protestant trait—with Linux perhaps being the most fanatical. The Macintosh community hangs somewhere in the lurch between Windows and Unix, the Catholics and the Protestants, a bit like the Anglican Church; they’re Protestants acting like Catholics. Plan 9 from Bell Labs is like the Quakers: distinguished by its stress on the ‘Inner Light,’ noted for simplicity of life, in particular for plainness of speech. Like the Quakers, Plan 9 does not proselytize. Plan 9 is relatively little known and has but a small user community (a few thousand installations). Nevertheless, it is a complete operating system, and it is the only operating system booted by many of its users. Plan 9 is also used in sev- eral embedded environments. For instance, it is the system inside the Viaduct,a computer system the size of a packet of cigarettes that provides an encrypted bridge between Lucent employees’ home computers and the corporate intranet.
    [Show full text]
  • Dash1.Looksgreatinmothra.Pdf
    6DEI >ook M=I JOFAIAJ troff -ms -mpictures|lp -dstdout|ps2pdf En LK?E@= 5=nI >O JDA =KJDoH, KIEnC = LAnoLo 6DEnk2=@ : ! 6=>lAJ HKnnEnC JDA 'BHonJ oFAH=JEnC IOI­ JAm. 4An@AHA@: $- - '.4ON6 'BHonJ.oHC 6DEI EI = MoHk oB BE?JEon. N=mAI, ?D=H=?JAHI, Fl=?AI =n@ En?E@AnJI AEJDAH =HA JDA FHo@K?J oB JDA =KJDoHߣI Em=CEn=JEon oH =HA KIA@ BE?JEJEoKIlO, =n@ =nO HAIAm>l=n?A Jo =?JK=l FAH­ IonI,lELEnCoH@A=@,>KIEnAIIAI,?omF=nEAI,ALAnJIoHlo?=lAIEIAnJEHAlO?oEn?E@AnJ=l. M16/++/2K>lE?,om=En 9FRONT FREQUENTLY QUESTIONED ANSWERS Those who can do, those who can’t write and those who can’t write make ezines. ߞ 5=FAMKllAn@AH ACHTUNG! 6DEI @o?KmAnJߣI 5647+674- ߞ =n@ IomA oB EJI 6-:6 ߞ EI Fl=CE=HEzA@ ߞ BHomJDAO2-N*5,.)3 ACHTUNG! 601515NO6)52)+- ACHTUNG! 1nBoHm=JEon FHoLE@A@ >O JDEI @o?KmAnJ m=O >A oKJ@=JA@ oH jKIJ Fl=En MHonC.7IAOoKH>H=En.NO4-.7N,5. _sl’s info is incorrect. ߞ =nJD_N i really hate the openbsd content in the fqa ߞ =EjK 0 − Introduction to Plan 9 .-9D=JEI2l=n'? ..-2l=n'EInoJ7N1: ...-2l=n'EInoJFl=n'FoHJ ... -2l=n'EInoJ1nBAHno .. -2l=n'EInoJ=FHo@K?J ..!-2l=n'EInoJBoHOoK . -9DO2l=n'? . .-9D=J@oFAoFlAlEkA=>oKJ2l=n'? . ..-9D=J@oOoKKIA2l=n'BoH? . -9D=J@oFAoFlAD=JA=>oKJ2l=n'? . .-9D=JEInoJEn2l=n' . .!-9DO@E@2l=n'ߣI?HA=JoHICELAKFon2l=n'? . ."-9D=JEIJDA@A=lMEJD2l=n'ߣIMAEH@lE?AnIA? . .".-4E?D=H@5J=llm=nD=JAIJDA2l=nNEnAlE?AnIA?EH?= .
    [Show full text]
  • Introduction to Operating Systems Abstractions Using Plan 9 from Bell
    Introduction to Operating Systems Abstractions Using Plan 9 from Bell Labs (Draft ߞ 9/18/2006) Francisco J Ballesteros Copyright © 2006 Francisco J Ballesteros Plan 9 is Copyright © 2002 Lucent Technologies Inc. All Rights Reserved. Preface Using effectively the operating system is very important for anyone working with computers. It can be the difference between performing most tasks by hand, and asking the computer to perform them. Traditionally, Operating Systems courses used UNIX to do this. However, today there is no such thing as UNIX. Linux is a huge system, full of inconsistencies, with programs that do multiple tasks and do not perform them well. Linux manual pages just cannot be read. These lecture notes use Plan 9 from Bell Labs to teach a first (practical!) course on operating sys- tems. The system is easy to use for programmers, and is an excellent example of high-quality system design and software development. Studying its code reveals how simplicity can be more effective than contortions made by other systems. The first Operating Systems course at Rey Juan Carlos University is focused on practice. Because in theory, theory is like practice, but in practice it is not. What is important is for you to use the system, and to learn to solve problems. Theory will come later to fill the gaps and try to give more insight about what a system does and how can it be used. The whole text assumes that you have been already exposed to computer, and used at least a com- puter running Windows. This is so common that it makes no sense to drop this assumption.
    [Show full text]
  • PLAN 9 from BELL LABS PROGRAMMER's MANUAL
    PLAN 9 from BELL LABS PROGRAMMER’S MANUAL First Edition Computing Science Research Center AT&T Bell Laboratories Murray Hill, New Jersey -- Copyright © 1993 AT&T Unpublished and not for publication All Rights Reserved PostScript and ThinkJet are registered trademarks. PERMUTED INDEX Manual pages for all sections are accessible on line through m a n(1). To save space, neighboring references to the same page have been collapsed into a single reference. This should cause no difficulty in cases like ‘atan’ and ‘atan2’, but is somewhat obscure in the case of ‘strcat’ and ‘strchr’. Disclabel – / . home, 40meg, 80meg, 100meg, newkernel, personalize, update, . home(8) floyd, halftone, hysteresis – create 1-bit images by dithering . floyd(9.1) hp – emulate an HP 2621 terminal . hp(1) 2a, 6a, 8a, ka, va, za – assemblers . 2a(1) 2c, 6c, 8c, kc, vc, zc – C compilers . 2c(1) 2l, 6l, 8l, kl, vl, zl – loaders . 2l(1) c++/2c, c++/kc, c++/vc, c++/8c, c++/zc, c++/ 2l, c++/kl, c++/vl, c++/8l, c++/zl – C++/ . c++(1) picture color compression . 3to1, mcut, improve, quantize, dither – . quantize(9.1) update, Disclabel – administration for/ . home, 40meg, 80meg, 100meg, newkernel, personalize, . home(8) smiley, life, fsim, clock, catclock,/ . 4s, 5s, ana, gnuchess, juggle, mandel, plumb, quiz, . games(1) 2a, 6a, 8a, ka, va, za – assemblers . 2a(1) 2c, 6c, 8c, kc, vc, zc – C compilers . 2c(1) 2l, 6l, 8l, kl, vl, zl – loaders . 2l(1) 8½ – window system files . 8½(4) 8½, label, window, wloc – window system . 8½(1) Disclabel – administration for/ . home, 40meg, 80meg, 100meg, newkernel, personalize, update, .
    [Show full text]