Winter 2016 Vol

Total Page:16

File Type:pdf, Size:1020Kb

Winter 2016 Vol ;login WINTER 2016 VOL. 41, NO. 4 : & Your Cores Are Slacking Off Jean-Pierre Lozi, Baptiste Lepers, Justin Funston, Fabien Gaud, Vivien Quéma, and Alexandra Fedorova & BeyondCorp Part III: The Access Proxy Luca Cittadini, Batz Spear, Betsy Beyer, and Max Saltonstall & OpenLambda for Microservices Scott Hendrickson, Stephen Sturdevant, Edward Oakes, Tyler Harter, Venkateshwaran Venkataramani, Andrea Arpaci-Dusseau, and Remzi Arpaci-Dusseau & Tuning ZFS for Databases Allan Jude and Michael W. Lucas & Interview with Fyodor Vaskovich Rik Farrow Columns Understanding Python Metaclasses David Beazley Monitoring Your Monitoring Systems Dave Josephsen Forecasting the Weather with Dark Sky David N. Blank-Edelman Extending Go Applications with Exec Plugins Kelsey Hightower Rising Tide of IoT Devices Dan Geer Idiot-Blockers for the Internet Robert G. Ferrell UPCOMING EVENTS LISA16 USENIX ATC ’17: 2017 USENIX Annual Technical December 4–9, 2016, Boston, MA, USA Conference www.usenix.org/lisa16 July 12-14, 2017, Santa Clara, CA, USA Co-located with LISA16 Submissions due February 7, 2017 www.usenix.org/atc17 SESA ’16: 2016 USENIX Summit for Educators in System Administration Co-located with USENIX ATC ’17 December 6, 2016 HotCloud ’17: 9th USENIX Workshop on Hot Topics www.usenix.org/sesa16 in Cloud Computing July 10-11, 2017, Santa Clara, CA, USA USENIX Journal of Education in System Administration Submissions due March 14, 2017 (JESA) www.usenix.org/hotcloud17 Published in conjunction with SESA www.usenix.org/jesa HotStorage ’17: 9th USENIX Workshop on Hot Topics in Storage and File Systems July 10-11, 2017, Santa Clara, CA, USA Enigma 2017 Submissions due March 16, 2017 January 30–February 1, 2017, Oakland, CA, USA www.usenix.org/hotstorage17 enigma.usenix.org SOUPS 2017: Thirteenth Symposium on Usable Privacy and Security FAST ’17: 15th USENIX Conference on File and July 12-14, 2017, Santa Clara, CA, USA Storage Technologies Paper registrations due March 1, 2017 www.usenix.org/soups2017 February 27–March 2, 2017, Santa Clara, CA, USA www.usenix.org/fast17 USENIX Security ’17: 26th USENIX Security Symposium SREcon17 Americas August 16-18, 2017, Vancouver, B.C., Canada March 13–14, 2017, San Francisco, CA, USA Submissions due February 16, 2017 www.usenix.org/srecon17americas www.usenix.org/sec17 NSDI ’17: 14th USENIX Symposium on Networked SREcon17 Europe/Middle East/Africa Systems Design and Implementation August 30–September 2, 2017, Dublin, Ireland March 27–29, 2017, Boston, MA, USA www.usenix.org/srecon17europe www.usenix.org/nsdi17 SREcon17 Asia/Australia May 22–24, 2017, Singapore www.usenix.org/srecon17asia Do you know about the USENIX open access policy? USENIX is the fi rst computing association to off er free and open access to all of our conferences proceedings and videos. We stand by our mission to foster excellence and innovation while supporting research with a practical bias. Your membership fees play a major role in making this endeavor successful. Please help us support open access. Renew your USENIX membership and ask your colleagues to join or renew today! www.usenix.org/membership www.usenix.org/facebook www.usenix.org/gplus www.usenix.org/linkedin twitter.com/usenix www.usenix.org/youtube WINTER 2016 VOL. 41, NO. 4 EDITOR Rik Farrow [email protected] EDITORIAL MANAGING EDITOR 2 Musings Rik Farrow Michele Nelson [email protected] SYSTEMS COPY EDITORS 6 Your Cores Are Slacking Off—Or Why OS Scheduling Is a Hard Steve Gilmartin Jean-Pierre Lozi, Baptiste Lepers, Justin Funston, Fabien Gaud, Problem Amber Ankerholz Vivien Quéma, and Alexandra Fedorova 14 Serverless Computation with OpenLambda Scott Hendrickson, Stephen PRODUCTION Sturdevant, Edward Oakes, Tyler Harter, Venkateshwaran Venkataramani, Arnold Gatilao Jasmine Murcia Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau 20 Standing on the Shoulders of Giants by Managing Scientific Experiments TYPESETTER Like Software Ivo Jimenez, Michael Sevilla, Noah Watkins, Carlos Maltzahn, Star Type [email protected] Jay Lofstead, Kathryn Mohror, Remzi Arpaci-Dusseau, and Andrea Arpaci-Dusseau USENIX ASSOCIATION SECURITY 2560 Ninth Street, Suite 215 28 BeyondCorp Part III: The Access Proxy Luca Cittadini, Batz Spear, Berkeley, California 94710 Betsy Beyer, and Max Saltonstall Phone: (510) 528-8649 FAX: (510) 548-5738 34 Excavating Web Trackers Using Web Archaeology Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner www.usenix.org 41 The Adblocking Tug-of-War Hamed Haddadi, Rishab Nithyanand, Sheharbano ;login: is the official magazine of the USENIX Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Association. ;login: (ISSN 1044-6397) Julia E. Powles, Emiliano De Cristofaro, and Steven J. Murdoch is published quarterly by the USENIX Association, 2560 Ninth Street, Suite 215, 44 Interview with Gordon Lyon Rik Farrow Berkeley, CA 94710. SYSADMIN $90 of each member’s annual dues is for 48 Tuning OpenZFS Allan Jude and Michael W. Lucas a subscription to ;login:. Subscriptions for non members are $90 per year. Periodicals 52 Lessons from Iraq for Building and Running SRE Teams: postage paid at Berkeley, CA, and additional From the Assembly Line to the Web Kurt Andersen mailing offices. 57 Interrupt Reduction Projects Betsy Beyer, John Tobin, and Liz Fong-Jones POSTMASTER: Send address changes to ;login:, USENIX Association, 2560 Ninth Street, COLUMNS Suite 215, Berkeley, CA 94710. 64 In Praise of Metaclasses! David Beazley ©2016 USENIX Association 70 Practical Perl Tools: The Whether Man David N. Blank-Edelman USENIX is a registered trademark of the 75 iVoyeur: Dogfood and the Art of Self-Awareness Dave Josephsen USENIX Association. Many of the designa- tions used by manufacturers and sellers 78 For Good Measure: Implications of the IoT Dan Geer to distinguish their products are claimed 80 Extending Go Applications with Exec Plugins Kelsey Hightower as trademarks. USENIX acknowledges all trademarks herein. Where those desig- 84 /dev/random Robert G. Ferrell nations appear in this publication and USENIX is aware of a trademark claim, BOOKS the designations have been printed in caps 86 Book Reviews Mark Lamourine or initial caps. USENIX NOTES 89 USENIX: It’s Not What You Might Think Cat Allman 90 Impressive Results for Team USA at 2016 International Olympiad in Informatics Brian C. Dean 91 Thanks to Our Volunteers Casey Henderson 93 USENIX Association Financial Statements for 2015 Musings RIK FARROWEDITORIAL Rik is the editor of ;login:. our times a year, I sit down at my desk and try to come up with some- [email protected] thing different to write. I’ve been writing a column for ;login: since F1996, although back then it was about Java [1], and I was not the editor. To be honest, I wouldn’t still be editing ;login: if I didn’t love doing it. I enjoy working with the members and people who attend conferences, and the USENIX staff. Coming up with articles for each issue is always a chal- lenge, one that I welcome you to help with. Perhaps I should explain what I’ve been trying to do with ;login:, since I was first asked to edit special issues on security in 1998. I actually had written a proposal to the USENIX Board of Directors in 1996 about how I would go about editing ;login:, a proposal I found in 2006 when I was tasked with creating an updated version. Goals I strive to collect articles about emerging research, new tools, and techniques that I believe will benefit a broad cross-section of the USENIX membership. It’s a challenging goal, as the membership ranges from industry to academic, from programmers to system administrators and SREs. USENIX has conferences on systems, security, file systems and storage, dis- tributed systems, system administration, cloud computing, and site reliability engineering (SRE). Finding topics that may be useful to at least two of these categories, and hopefully more, has always been my goal. Like any Program Committee member, I don’t want to ever publish (or accept) bad research. In the case of ;login:, I can often sidestep that issue because I ask the authors of accepted papers to write about their research. But that only works for topics that have been covered by papers. When the author or authors haven’t produced a paper, I look for other indications of compe- tency in the topic at hand. I also check out references, by asking some of the many people I’ve gotten to know in attending USENIX conferences over the years, about the authors I have in mind. And there’s also the quality detector: you probably have one of these as well [2], and I highly recommend paying attention to any alerts it produces. For me, these alerts come when I notice that the draft I am reading fails to tell me anything useful, or covers the same territory as found online. Other times, the writer will contradict him or herself, or write things that sound just plain wrong. Again, the Web can be your friend. Finally, timeliness is an important goal. There is lag time inherent in print publications, and I start searching for good topics six months before an issue comes out. That’s a very long time when part of my goal is to cover emerging topics. I plan on editing ;login: into the foreseeable future and welcome new ideas and input. If you’d be interested in contributing to ;login:’s process, and if you have suggestions for topics that should be covered, please do let us know by contacting us at [email protected]. 2 WINTER 2016 VOL. 41, NO. 4 www.usenix.org EDITORIAL Musings The Lineup I interview Gordon Lyon, perhaps better known as Fyodor. We start out this issue with several articles with the theme of Fyodor started working on the Nmap scanner back in the mid- systems. Lozi et al.
Recommended publications
  • Performance Counters in Htop 3.0
    Slide: [ ] Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command Performance counters in htop 3.0 Hisham Muhammad @[email protected] https://hisham.hm Slide: [ 2 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command About me original author of htop, a project started in 2004 http://hisham.hm/htop/ lead dev of LuaRocks, package manager for Lua http://luarocks.org/ co-founder of the GoboLinux distribution http://gobolinux.org/ developer at Kong – FLOSS API gateway http://getkong.org/ (we’re hiring!) Slide: [ 3 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command What is htop an interactive process manager intended to be “a better top” by this all I originally meant was: scrolling! (versions of top improved a lot since!) Slide: [ 4 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command Hello, htop! Slide: [ 5 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command htop beyond Linux Linux MacOS FreeBSD OpenBSD DragonFlyBSD Solaris (illumos) Slide: [ 6 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command Then Apple released a broken kernel..
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • 20 Linux System Monitoring Tools Every Sysadmin Should Know by Nixcraft on June 27, 2009 · 315 Comments · Last Updated November 6, 2012
    About Forum Howtos & FAQs Low graphics Shell Scripts RSS/Feed nixcraft - insight into linux admin work 20 Linux System Monitoring Tools Every SysAdmin Should Know by nixCraft on June 27, 2009 · 315 comments · Last updated November 6, 2012 Need to monitor Linux server performance? Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as: 1. Finding out bottlenecks. 2. Disk (storage) bottlenecks. 3. CPU and memory bottlenecks. 4. Network bottlenecks. #1: top - Process Activity Command The top program provides a dynamic real-time view of a running system i.e. actual process activity. By default, it displays the most CPU-intensive tasks running on the server and updates the list every five seconds. Fig.01: Linux top command Commonly Used Hot Keys The top command provides several useful hot keys: Hot Usage Key t Displays summary information off and on. m Displays memory information off and on. Sorts the display by top consumers of various system resources. Useful for quick identification of performance- A hungry tasks on a system. f Enters an interactive configuration screen for top. Helpful for setting up top for a specific task. o Enables you to interactively select the ordering within top. r Issues renice command.
    [Show full text]
  • Volume 2014, No. 1 Law Office Computing Page Puritas Springs Software Law Office Computing
    Volume 2014, No. 1 Law Office Computing Page Puritas Springs Software Law Office Computing VOLUME 2014 NO. 1 $ 7 . 9 9 PURITAS SPRINGS SOFTWARE Best Home Pages We think the importance of the through which you accessed INSIDE THIS ISSUE: home page has been greatly the world wide web. Once 1-3 reduced due to the invention of tabbed browsers arrived on the tabbed browsers. Although scene it was possible to create 1,4,5 conceived a group of 4 earlier in 1988, home pages Digital Inklings 6,7 tabbed brows- with each page Child Support 8 ing didn’t go being able to Spousal Support 10 mainstream “specialize” in a Uniform DR Forms 12 until the re- specific area of lease of Micro- your interest. Family Law Documents 13 soft’s Windows Take the Probate Forms 14 Internet Ex- weather for Ohio Estate Tax 16 plorer 7 in example. Every U.S. Income Tax (1041) 18 2006. Until then, your Home good home page should have Ohio Fiduciary Tax 19 page was the sole portal a minimal weather information; (Continued on page 2) Ohio Adoption Forms 20 OH Guardianship Forms 21 OH Wrongful Death 22 Loan Amortizer 23 # More Law Office Tech Tips Advanced Techniques 24 Deed & Document Pro 25 Bankruptcy Forms 26 XX. Quick Launch. The patch the application that you’re Law Office Management 28 of little icons to the right of the working in is maximized. If OH Business Forms 30 Start button is called the Quick you’re interested, take a look Launch toolbar. Sure, you can at the sidebar on page XX of Business Dissolutions 31 put much-used shortcuts on this issue.
    [Show full text]
  • Slurm Overview and Elasticsearch Plugin
    Slurm Workload Manager Overview SC15 Alejandro Sanchez [email protected] Copyright 2015 SchedMD LLC http://www.schedmd.com Slurm Workload Manager Overview ● Originally intended as simple resource manager, but has evolved into sophisticated batch scheduler ● Able to satisfy scheduling requirements for major computer centers with use of optional plugins ● No single point of failure, backup daemons, fault-tolerant job options ● Highly scalable (3.1M core Tianhe-2 at NUDT) ● Highly portable (autoconf, extensive plugins for various environments) ● Open source (GPL v2) ● Operating on many of the world's largest computers ● About 500,000 lines of code today (plus test suite and documentation) Copyright 2015 SchedMD LLC http://www.schedmd.com Enterprise Architecture Copyright 2015 SchedMD LLC http://www.schedmd.com Architecture ● Kernel with core functions plus about 100 plugins to support various architectures and features ● Easily configured using building-block approach ● Easy to enhance for new architectures or features, typically just by adding new plugins Copyright 2015 SchedMD LLC http://www.schedmd.com Elasticsearch Plugin Copyright 2015 SchedMD LLC http://www.schedmd.com Scheduling Capabilities ● Fair-share scheduling with hierarchical bank accounts ● Preemptive and gang scheduling (time-slicing parallel jobs) ● Integrated with database for accounting and configuration ● Resource allocations optimized for topology ● Advanced resource reservations ● Manages resources across an enterprise Copyright 2015 SchedMD LLC http://www.schedmd.com
    [Show full text]
  • Strategic Use of Ict and Communication Tools
    02/2021 STRATEGIC USE OF ICT AND COMMUNICATION TOOLS CE RESPONSIBLE | BRODTO | Branimir Radaković Module I - ICT Module II - Module III - tools for Social media Impact tools optimization of working for for SEs everyday work social enterprise TAKING COOPERATION FORWARD 2 Module I - ICT tools for optimization of everyday work Project management / work tracking tools Project management tools in this case mean delegating tasks and internal project segmenting, but most of the chosen categories below can be characterised as project management tools as well. They are a must for a modern company or organization, especially for working remotely. They improve work tracking by superiors or peers, but also allows team members to organize their work in an easy and effective way. Considering the nature of a social enterprise and heterogenic business elements, they are highly recommendable. a) Asana b) Basecamp c) ProofHub d) Trello e) Airtable TAKING COOPERATION FORWARD 3 Module I - ICT tools for optimization of everyday work Project management / work tracking tools Asana Description - a web and mobile application designed to help teams organize, track, and manage work - project management, task management and delegation, productivity software Key features: - categorized by projects - every member has his or her own “profile” viewable by others - task can also be viewed in calendar mode which gives extra plainness in work organisation Pros: - combining factors as file storage, collaboration - helping to manage projects without email Cons: - free version
    [Show full text]
  • Absolute BSD—The Ultimate Guide to Freebsd Table of Contents Absolute BSD—The Ultimate Guide to Freebsd
    Absolute BSD—The Ultimate Guide to FreeBSD Table of Contents Absolute BSD—The Ultimate Guide to FreeBSD............................................................................1 Dedication..........................................................................................................................................3 Foreword............................................................................................................................................4 Introduction........................................................................................................................................5 What Is FreeBSD?...................................................................................................................5 How Did FreeBSD Get Here?..................................................................................................5 The BSD License: BSD Goes Public.......................................................................................6 The Birth of Modern FreeBSD.................................................................................................6 FreeBSD Development............................................................................................................7 Committers.........................................................................................................................7 Contributors........................................................................................................................8 Users..................................................................................................................................8
    [Show full text]
  • Proceedings of the Linux Symposium
    Proceedings of the Linux Symposium Volume One June 27th–30th, 2007 Ottawa, Ontario Canada Contents The Price of Safety: Evaluating IOMMU Performance 9 Ben-Yehuda, Xenidis, Mostrows, Rister, Bruemmer, Van Doorn Linux on Cell Broadband Engine status update 21 Arnd Bergmann Linux Kernel Debugging on Google-sized clusters 29 M. Bligh, M. Desnoyers, & R. Schultz Ltrace Internals 41 Rodrigo Rubira Branco Evaluating effects of cache memory compression on embedded systems 53 Anderson Briglia, Allan Bezerra, Leonid Moiseichuk, & Nitin Gupta ACPI in Linux – Myths vs. Reality 65 Len Brown Cool Hand Linux – Handheld Thermal Extensions 75 Len Brown Asynchronous System Calls 81 Zach Brown Frysk 1, Kernel 0? 87 Andrew Cagney Keeping Kernel Performance from Regressions 93 T. Chen, L. Ananiev, and A. Tikhonov Breaking the Chains—Using LinuxBIOS to Liberate Embedded x86 Processors 103 J. Crouse, M. Jones, & R. Minnich GANESHA, a multi-usage with large cache NFSv4 server 113 P. Deniel, T. Leibovici, & J.-C. Lafoucrière Why Virtualization Fragmentation Sucks 125 Justin M. Forbes A New Network File System is Born: Comparison of SMB2, CIFS, and NFS 131 Steven French Supporting the Allocation of Large Contiguous Regions of Memory 141 Mel Gorman Kernel Scalability—Expanding the Horizon Beyond Fine Grain Locks 153 Corey Gough, Suresh Siddha, & Ken Chen Kdump: Smarter, Easier, Trustier 167 Vivek Goyal Using KVM to run Xen guests without Xen 179 R.A. Harper, A.N. Aliguori & M.D. Day Djprobe—Kernel probing with the smallest overhead 189 M. Hiramatsu and S. Oshima Desktop integration of Bluetooth 201 Marcel Holtmann How virtualization makes power management different 205 Yu Ke Ptrace, Utrace, Uprobes: Lightweight, Dynamic Tracing of User Apps 215 J.
    [Show full text]
  • Lab 09: Operating System Basics
    ESE 150 – Lab 09: Operating System Basics LAB 09 Today’s Lab has the following objectives: 1. Learn how to remotely log into Eniac Linux server 2. Learn some of the basics of process management on the Linux Operating System This lab will take place in Ketterer (Moore 200). Background: OPERATING SYSTEMS We learned in lecture that a CPU can really only execute one task or instruction (like ADD or SUBTRACT, etc) at a time. The Operating System is a program that runs on a CPU with the job of managing the CPU’s time. It schedules programs that user’s would like run for time on the CPU, essentially its main job is to keep the CPU busy. Another aspect of the OS is to protect access to the hardware that surrounds the CPU (like input and output devices – keyboards, mice, etc.) so that programs don’t have direct access to the hardware, but instead ask the OS for permission to access it. This also lends itself to “virtualizing” the CPU and its hardware so that each program that runs on the CPU believes it is the only program running on the CPU at any given time. Before the personal computer existed, before Mac OS and Windows came into being, an operating system named UNIX was written to manage large computers at AT&T Bell Laboratories in the 1970s that became a model for modern operating systems (like Windows, and Mac OSX). In the 1990’s an operating system named Linux was invented modeled very heavily on the UNIX operating system.
    [Show full text]
  • Share Screen Via Chrome Remote Desktop
    Share Screen via Chrome Remote Desktop Topics Page no 1: What is Chrome Remote Desktop? 2 2: How to Install Chrome Remote Desktop on your PC? 2 3: How to share your computer screen using Chrome Remote Desktop? 6 4: How to share your computer screen using Chrome Remote Desktop? 9 5: How to create a shortcut for CHROME REMOTE DESKTOP? 10 1 Topic 1: What is Chrome Remote Desktop? Chrome Remote Desktop is a remote desktop software tool developed by Google that allows a user to remotely control another computer using a Chromoting protocol developed by Google. It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network. Chrome Remote Desktop requires the use of Google Chrome, along with the installation of an extension from the Chrome Web Store. https://en.wikipedia.org/wiki/Chrome_Remote_Desktop Topic 2: How to Install Chrome Remote Desktop on your PC? 1. Download the Chrome Remote Desktop app. From the below link https://chrome.google.com/webstore/detail/chrome-remote- desktop/gbchcmhmhahfdphkhkmpfmihenigjmpp?hl=en 2. Click on “Add to Chrome”. 2 3. Click on Add app 4. it will add to the Chrome apps. 5. On your computer, open Chrome. 6. In the address bar at the top, type chrome://apps, and press Enter. 3 7. After click enter, it will go to below page contains Chrome Remote Desktop app 8. Click on “Chrome Remote Desktop” App. 9. Under "My Computers" click “Get started”. 4 10. Click Enable remote connections.
    [Show full text]
  • Teaching Operating Systems Concepts with Systemtap
    Session 8B: Enhancing CS Instruction ITiCSE '17, July 3-5, 2017, Bologna, Italy Teaching Operating Systems Concepts with SystemTap Darragh O’Brien School of Computing Dublin City University Glasnevin Dublin 9, Ireland [email protected] ABSTRACT and their value is undoubted. However, there is room in introduc- e study of operating systems is a fundamental component of tory operating systems courses for supplementary approaches and all undergraduate computer science degree programmes. Making tools that support the demonstration of operating system concepts operating system concepts concrete typically entails large program- in the context of a live, real-world operating system. ming projects. Such projects traditionally involve enhancing an is paper describes how SystemTap [3, 4] can be applied to existing module in a real-world operating system or extending a both demonstrate and explore low-level behaviour across a range pedagogical operating system. e laer programming projects rep- of system modules in the context of a real-world operating sys- resent the gold standard in the teaching of operating systems and tem. SystemTap scripts allow the straightforward interception of their value is undoubted. However, there is room in introductory kernel-level events thereby providing instructor and students alike operating systems courses for supplementary approaches and tools with concrete examples of operating system concepts that might that support the demonstration of operating system concepts in the otherwise remain theoretical. e simplicity of such scripts makes context of a live, real-world operating system. is paper describes them suitable for inclusion in lectures and live demonstrations in an approach where the Linux monitoring tool SystemTap is used introductory operating systems courses.
    [Show full text]
  • Why I Hate Microsoft by F.W
    Why I hate Microsoft by F.W. van Wensveen Why I hate Microsoft "A personal, lengthy, but highly articulate outburst" by F.W. van Wensveen Table of contents Introduction A brief introduction, or why this paper needed to be written Abstract The management summary 1. From the people who brought you EDLIN Microsoft and innovation 2. The not-so-good, the bad and the ugly The general quality of Microsoft products 3. The power to bind Formats and standards 4. World domination From business to megalomania 5. Bad practice, foul play Exploring the limits of lawful conduct 6. Caveat Emptor Think before you buy 7. Where are you forced to go today? Price gouging and other monopolist practices 8. The road ahead On diminishing returns and continuing trends Appendix A A brief overview of Windows' most serious design flaws Appendix B Links Introduction "One OS to bring them all and in the darkness bind them..." From the title of this paper you may have guessed that I am not very impressed with the guys in Redmond. One might even say that my dislike for Microsoft is a pet hate gone out of control in an almost quixotic fashion. Why is this? Of course I have been accused of personal antipathy, of being jealous of Bill Gates and his billions, and of being prejudiced against all things Microsoft without any reason whatsoever. None of this is true. I have nothing personal against Bill Gates. Why should I? I don't know the man, I've never met him. I agree with those who say he might be the most successful salesman in history.
    [Show full text]