Welcome to Linux Foundation E-Learning Training 2021/09/17 Version 8.31 Copyright © 2010-2021 the Linux Foundation
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Implementation of Centralized Logging and Log Analysis in Cloud Transition
Implementation of Centralized Logging and Log Analysis in Cloud Transition Antti Vainio School of Science Thesis submitted for examination for the degree of Master of Science in Technology. Espoo 3.7.2018 Supervisor Prof. Jukka Suomela Advisor MSc Cyril de Vaumas Copyright ⃝c 2018 Antti Vainio Aalto University, P.O. BOX 11000, 00076 AALTO www.aalto.fi Abstract of the master’s thesis Author Antti Vainio Title Implementation of Centralized Logging and Log Analysis in Cloud Transition Degree programme Computer, Communication and Information Sciences Major Computer Science Code of major SCI3042 Supervisor Prof. Jukka Suomela Advisor MSc Cyril de Vaumas Date 3.7.2018 Number of pages 84 Language English Abstract Centralized logging can be used to collect log data from multiple log files on multiple separate server machines and transmit the data to a single centralized location. Log analysis on top of that can automatically process large amounts of logs for various different purposes including problem detection, troubleshooting, monitoring system performance, identifying security incidents, and understanding user behavior. As the volume of log data is growing when software systems, networks, and services grow in size, the log data located on multiple separate server machines can be difficult to manage. The traditional way of manually inspecting logs hasalso become too labor-intensive and error-prone when large amounts of log data need to be analyzed. Setting up centralized logging and automatic log analysis systems can be used to solve this problem. This thesis explains the concepts of log data, centralized logging, and log analysis, and also takes a look at existing software solutions to implement such a system. -
Equity Research
EQUITY RESEARCH May 2021 7 Monthly Highlights FEATURED ARTICLES: DigitalOcean, Inc. 2 Sixth Street Specialty Lending 4 Coverage Universe (as of 4/30/21) 6 Outperform Rated Stocks 20-21 Perform Rated Stocks 22 Not Rated Stocks 23 Initiation of Coverage 24 Rating Changes 24 For analyst certification and important disclosures, see the Disclosure Appendix. Monthly Highlights Oppenheimer & Co Inc. 85 Broad Street, New York, NY 10004 Tel: 800-221-5588 Fax: 212-667-8229 Monthly Highlights May 3, 2021 CLOUD AND COMMUNICATIONS Stock Rating: DigitalOcean, Inc. Outperform 12-18 mo. Price Target $55.00 Pure-Play Public Cloud Platform for SMBs/Developers, DOCN-NASDAQ (4/30/21) $43.57 Initiated Outperform, $55 PT 11% 3-5 Yr. EPS Gr. Rate NA SUMMARY 52-week Range $45.49-$36.65 DigitalOcean is a very successful niche cloud provider, focused on ease of use for Shares Outstanding 127.0M developers and small businesses that need low-cost and easy-to-use cloud computing. The Float 40.0M Avg. Daily Trading Vol. NA cloud gives SMBs/developers flexibility to run applications and store data in a highly secure Market Capitalization $4,588.1M environment that can be accessed from anywhere. Every industry has scale providers and Dividend/Yield NA/NM niche ones. In cloud, AWS and MSFT are the scale providers with DigitalOcean and Fiscal Year Ends Dec Rackspace the niche providers. We believe that DOCN can grow revenues at 30%-plus per Book Value NM year for the next five years. It is turning FCF positive, and these margins should expand by 2021E ROE NA 100-200 basis points per year. -
View Annual Report
Dear Arista Networks Stockholders: I am pleased to report that Arista Networks demonstrated another year of strong execution in 2018, with continued momentum from our cloud customers and expanded business in the enterprise vertical. We are extremely proud of the strategic role that Arista is earning, with a broad set of customers deploying transformative cloud networking. 2018 Highlights: • Revenue for our fiscal year 2018 was $2.15 billion representing an increase of 30.7% from the prior year. We now serve over 5,600 customers, having shipped more than twenty million cloud networking ports worldwide, leveraging EOS our advanced network operating system. • Arista introduced Cognitive Cloud Networking for the campus encompassing a new network architecture designed to address transitional changes as the enterprise moves to an IoT ready campus. • Arista acquired WiFi pioneer Mojo Networks for cloud networking expansion, entering the wireless LAN market with a portfolio of WiFi edge products. • Arista introduced the next generation 400G version of our switch routing platforms with two new 400G fixed systems, delivering increased performance for the growth of applications such as AI (artificial intelligence), machine learning, and serverless computing. • Arista acquired Metamako, a leader in low-latency, FPGA-enabled network solutions. This acquisition plays a key role in the delivery of next generation platforms for low-latency applications. • The Forrester WaveTM Hardware Platforms for SDN, Q1 2018, recognized Arista as a leader in the current offering and strategy categories. • Arista maintained its leadership position in the Gartner July 2018 Magic Quadrant for Data Center Networking for the fourth consecutive year. Looking ahead, we see opportunities in delivering new technologies across our cloud networking and cognitive campus platforms in support of a broader customer base. -
Report on the 2020 FOSS Contributor Survey
Report on the 2020 FOSS Contributor Survey The Linux Foundation & The Laboratory for Innovation Science at Harvard Frank Nagle Harvard Business School David A. Wheeler The Linux Foundation Hila Lifshitz-Assaf New York University Haylee Ham Jennifer L. Hoffman Laboratory for Innovation Science at Harvard Acknowledgments This report and the research behind it would not have been possible without the leadership of the Core Infrastructure Initiative’s Advisory Committee, composed of Josh Corman, Steve Lipner, Audris Mockus, Henning Piezunka, and Sam Ransbotham. Frank Nagle would also like to thank his fellow co-directors of the Core Infrastructure Initiative, Jim Zemlin at the Linux Foundation and Karim Lakhani at the Laboratory for Innovation Science at Harvard, for their counsel and direction throughout this project. Gratitude and thanks to Michael Dolan and Kate Stewart at the Linux Foundation for their ongoing commitment to this undertaking. Thank you to James Dana for laying the initial groundwork for this survey. Finally — and perhaps, most importantly — thank you to all the individuals who contribute to FOSS projects. Without their tireless efforts, our core digital infrastructure and the feats enabled by it would not be sustainable. REVISED: This report has been updated since its original release on 8 December 2020. This second version, released on 10 December 2020, corrects errors found in the original text and graphics. Contents Executive Summary 4 Introduction 7 Methodology 9 Overview of Findings 10 Demographics 10 Figure 1: Gender -
Vmware Fusion 12 Vmware Fusion Pro 12 Using Vmware Fusion
Using VMware Fusion 8 SEP 2020 VMware Fusion 12 VMware Fusion Pro 12 Using VMware Fusion You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Fusion 9 1 Getting Started with Fusion 10 About VMware Fusion 10 About VMware Fusion Pro 11 System Requirements for Fusion 11 Install Fusion 12 Start Fusion 13 How-To Videos 13 Take Advantage of Fusion Online Resources 13 2 Understanding Fusion 15 Virtual Machines and What Fusion Can Do 15 What Is a Virtual Machine? 15 Fusion Capabilities 16 Supported Guest Operating Systems 16 Virtual Hardware Specifications 16 Navigating and Taking Action by Using the Fusion Interface 21 VMware Fusion Toolbar 21 Use the Fusion Toolbar to Access the Virtual-Machine Path 21 Default File Location of a Virtual Machine 22 Change the File Location of a Virtual Machine 22 Perform Actions on Your Virtual Machines from the Virtual Machine Library Window 23 Using the Home Pane to Create a Virtual Machine or Obtain One from Another Source 24 Using the Fusion Applications Menus 25 Using Different Views in the Fusion Interface 29 Resize the Virtual Machine Display to Fit 35 Using Multiple Displays 35 3 Configuring Fusion 37 Setting Fusion Preferences 37 Set General Preferences 37 Select a Keyboard and Mouse Profile 38 Set Key Mappings on the Keyboard and Mouse Preferences Pane 39 Set Mouse Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable or Disable Mac Host Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable Fusion Shortcuts on the Keyboard and Mouse Preference Pane 41 Set Fusion Display Resolution Preferences 41 VMware, Inc. -
Logging in the Cloud: from Zero to (Incident Response) Hero
SESSION ID: CSV-W01 Logging in the Cloud: From Zero to (Incident Response) Hero Jonathon Poling Managing Principal Consultant Secureworks @JPoForenso #RSAC 1 #RSAC Agenda for those in [ , , ]: print(“What Should I Be Logging?”) print(“How *Specifically* Should I Configure it?”) print(“What Should I Be Monitoring?”) else: print(“Questions?”) 2 2 #RSAC Today, We (Attempt to) Make History… I plan to live here… 3 3 #RSAC Why Me? Cloud (AWS) SME for Secureworks Developed Secureworks’ AWS Incident Response Service Line Help SMB through Fortune 10 Customers… – Intelligently Configure/Instrument Their Environments – Protect Their Infrastructure – Effectively Respond to Incidents 4 4 #RSAC Why This Presentation? Too many clouds, too little time – Many of us are still lacking foundational understanding of Cloud operations and security – It’s extremely hard to master one cloud, let alone multiple Tired of presentations with no actionable takeaways – People need prescriptive actions to take that can help them to immediately start getting/operating/securing their Cloud(s) better Helping us to help you (to help us and help you) 5 5 #RSAC How Will This Help You? In this talk you will (hopefully) learn: –Core log capabilities of each Cloud provider –Which core logs should be configured (specifically how) –Tips for Monitoring core logs –A few tips/tricks for Incident Response along the way 6 6 #RSAC Get Ready for a LOT of Material… 7 7 #RSAC Amazon Web Services (AWS) Overview of Logging 8 #RSAC Core Logs CloudTrail – Your account’s syslog on steroids -
D1.5 Final Business Models
ITEA 2 Project 10014 EASI-CLOUDS - Extended Architecture and Service Infrastructure for Cloud-Aware Software Deliverable D1.5 – Final Business Models for EASI-CLOUDS Task 1.3: Business model(s) for the EASI-CLOUDS eco-system Editor: Atos, Gearshift Security public Version 1.0 Melanie Jekal, Alexander Krebs, Markku Authors Nurmela, Juhana Peltonen, Florian Röhr, Jan-Frédéric Plogmeier, Jörn Altmann, (alphabetically) Maurice Gagnaire, Mario Lopez-Ramos Pages 95 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Abstract The purpose of the business working group within the EASI-CLOUDS project is to investigate the commercial potential of the EASI-CLOUDS platform, and the brokerage and federation- based business models that it would help to enable. Our described approach is both ‘top down’ and ‘bottom up’; we begin by summarizing existing studies on the cloud market, and review how the EASI-CLOUDS project partners are positioned on the cloud value chain. We review emerging trends, concepts, business models and value drivers in the cloud market, and present results from a survey targeted at top cloud bloggers and cloud professionals. We then review how the EASI-CLOUDS infrastructure components create value both directly and by facilitating brokerage and federation. We then examine how cloud market opportunities can be grasped through different business models. Specifically, we examine value creation and value capture in different generic business models that may benefit from the EASI-CLOUDS infrastructure. We conclude by providing recommendations on how the different EASI-CLOUDS demonstrators may be commercialized through different business models. © EASI-CLOUDS Consortium. 2 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Table of contents Table of contents ........................................................................................................................... -
Kernel Validation with Kselftest Shuah Khan, Kernel Maintainer and Fellow, the Linux Foundation
Kernel Validation With Kselftest Shuah Khan, Kernel Maintainer and Fellow, The Linux Foundation • Why do we test? • Kinds of testing/tests ... – Unit, developer, regression, integration • Linux kernel testing philosophy – Developer and community driven testing – Reliance on community and users • Linux kernel release cycle – Time based - not feature based – Continuous and parallel development/testing model • Linux kernel testing and validation – Writing tests • Kernel test frameworks - Kselftest & KUnit – Developer testing • Kselftest, KUnit and others. – Regression testing • Kselftest, KUnit and others. • Linux kernel testing and validation – Continuous Integration testing • Static analysis tools (sparse, smatch, coccicheck etc.) • Dynamic analysis tools (fuzzers, syzbot etc.) • Where does this all happen? – Developer test systems – Continuous Integration Rings • Kernel CI Dashboard — Home • 0-Day - Boot and Performance issues • 0-Day - Build issues • Linaro QA • Buildbot • Hulk Robot • What is tested? – Kernel repositories: • linux mainline • linux-next • developer git repositories – Active kernel releases • Basic testing – Boot and usage test – Run basic sanity tests • Basic sanity tests – Does networking (wifi/wired) work correctly? – Does ssh work? – rsync a large file(s) from another system – Download files: wget, ftp, git clone etc. – Play audio/video • Examine kernel logs – Look for new critical and error messages – Check for new warning messages – Check for panic traces • Kernel selftest (Kselftest) – Regression test suite • Kernel -
This Guide Provides Basic Information About the Logging Agent, an Application Based on Uentd
1/25/2020 About the Logging agent | Stackdriver Logging | Google Cloud This guide provides basic information about the Logging agent, an application based on uentd (http://www.uentd.org/) that runs on your virtual machine (VM) instances. In its default conguration, the Logging agent streams logs from common third-party applications and system software to Logging; see the list of default logs (/logging/docs/agent/default-logs). You can congure the agent to stream additional logs; see Conguring the Logging agent (/logging/docs/agent/conguration) for details on agent conguration and operation. It is a best practice to run the Logging agent on all your VM instances. The agent runs under both Linux and Windows. To install the Logging agent, see Installing the agent (/logging/docs/agent/installation). https://cloud.google.com/logging/docs/agent/ 1/5 1/25/2020 About the Logging agent | Stackdriver Logging | Google Cloud You can run the Logging agent on the following operating systems on compatible virtual machine (VM) instances: CentOS 6, 7, and 8 Debian 9 "Stretch" and 10 "Buster" Red Hat Enterprise Linux 6, 7, and 8 Ubuntu LTS 16.04 "Xenial", LTS 18.04 "Bionic", and 19.04 "Disco" Ubuntu Minimal LTS 16.04 "Xenial", LTS 18.04 "Bionic" SUSE Linux Enterprise Server 12 SP3, 12 SP2 for SAP, 12 SP3 for SAP, 15, 15 for SAP, and 15 SP1 for SAP Windows Server 2008 R2, 2012 R2, 2016, and 2019 Amazon Linux AMI (except Amazon Linux 2.0 AMI) The Logging agent is compatible with the following environments: Compute Engine (/compute) instances. -
Titans and Trolls of the Open Source Arena
Titans and Trolls Enter the Open-Source Arena * by DEBRA BRUBAKER BURNS I. Introduction .................................................................................... 34 II. Legal Theories for Open Source Software License Enforcement ................................................................................... 38 A. OSS Licensing .......................................................................... 38 B. Legal Theories and Remedies for OSS Claims .................... 40 1. Legal Protections for OSS under Copyright and Contract Law ..................................................................... 40 Stronger Protections for OSS License under Copyright Law ................................................................... 40 2. Copyright-Ownership Challenges in OSS ....................... 42 3. Potential Legal Minefields for OSS under Patent Law ...................................................................................... 45 4. Added Legal Protection for OSS under Trademark Law ...................................................................................... 46 5. ITC 337 Action as Uncommon Legal Protection for OSS ..................................................................................... 49 III. Enforcement Within the OSS Community .................................. 49 A. Software Freedom Law Center Enforces OSS Licenses .... 50 B. Federal Circuit Finds OSS License Enforceable Under Copyright Law ......................................................................... 53 C. Commercial OSS -
Lowering AWS Costs with Digitalocean
Lowering AWS Costs with DigitalOcean WHITE PAPER Introduction Since the introduction of cloud computing, businesses have been leveraging dynamic infrastructure to quickly scale without the burden of significant capital expense. According to the Rightscale State of the Cloud 2018 Report, 92% of SMBs leverage cloud solutions and 50% spend more than $10,000 a month. Of these SMBs, 76% plan to spend more in 2018 and 72% say that managing costs is a top challenge with cloud adoption. While many of these businesses use AWS for cloud infrastructure, with 1300 new choices introduced this year according to Datamation, AWS can be difficult to navigate. According to Concurrency Labs the price variations of AWS regions can result in costs that are much higher than expected. These complexities can drive up business costs and lower developer productivity. Rightscale estimates that up to 35% of cloud spend is wasted due to under-utilized or un-optimized cloud resources. DigitalOcean aims to provide an easier cloud platform to deploy, manage, and scale applications of any size, often resulting in savings of up to 67% compared to AWS (see figure 2). DigitalOcean keeps pricing simple by including commonly used resources like storage and bandwidth, and by setting consistent pricing across data center regions. Since 2012 DigitalOcean has been focused on providing the best price-to-performance cloud with a focus on simplicity. By offering cloud compute, storage, and networking products with leading pricing and performance, DigitalOcean helps your business scale while lowering your cloud costs. Typical Cloud Cost Drivers Total Cost of Ownership (TCO) can be difficult to calculate because of AWS’s regional price variations and thousands of product choices. -
Please Don't Go
Please Don’t Go - Increasing Women’s Participation in Open Source Software Bianca Trinkenreich Northern of Arizona University Flagstaff, AZ, USA [email protected] Abstract—Women represent less than 24% of the software the development of the community with norms and values development industry and suffer from various types of prejudice consistent with their own vision [12], focusing on the first and biases. In Open Source Software projects, despite a variety social experiences through programs such as mentorships [13], of efforts to increase diversity and multi-gendered participation, women are even more underrepresented (less than 10%). My and fixing the gender-bias issues in non-inclusive tools and research focuses on answering the question: How can OSS infrastructure [14]. Some strategies that are discouraged by communities increase women’s participation in OSS projects? the literature include setting quotas for women. Just increasing I will identify the different OSS career pathways, and develop the proportion of women can lead to questioning stereotypes a holistic view of women’s motivations to join or leave OSS, and decisions to simply re-classify types of work that are cur- along with their definitions of success. Based on this empirical investigation, I will work together with the Linux Foundation rently packaged in masculine-feminine stereotyped specialties. to design attraction and retention strategies focused on women. Another discouraged strategy is related to coding schools that Before and after implementing the strategies, I will conduct train women in specialties where they are already represented. empirical studies to evaluate the state of the practice and These schools might perpetuate the disadvantage of women understand the implications of the strategies.