Spring 2020 Vol

Total Page:16

File Type:pdf, Size:1020Kb

Spring 2020 Vol ;login SPRING 2020 VOL. 45, NO. 1 : & Ceph BlueStore Runs on Raw Storage Abutalib Aghayev, Sage Weil, Michael Kuchnik, Mark Nelson, Greg Ganger, and George Amvrosiadis & Notary: Rethinking eWallets Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Morris, and Nickolai Zeldovich & Choosing the Right SLIs Jaime Woo and Emil Stolarsky & Getting Things Done by Organizing Your Work Todd Palino & Ethics for AI Researchers Jessica Cussins Newman and Rajvardhan Oak Columns Constraint and Controls: The STAMP Approach Laura Nolan Garbage Collection in Python Peter Norton Collecting Configuration in Golang Chris “Mac” McEniry Using eBPF Dave Josephsen Examining IT Job Growth Dan Geer UPCOMING EVENTS SREcon20 Americas West 29th USENIX Security Symposium March 24–26, 2020, Santa Clara, CA, USA August 12–14, 2020, Boston, MA, USA www.usenix.org/srecon20americaswest Co-located with SOUPS 2020 www.usenix.org/sec20 HotEdge ’20: 3rd USENIX Workshop on Hot Co-located with USENIX Security ’20 Topics in Edge Computing WOOT ’20: 14th USENIX Workshop on April 30, 2020, Santa Clara, CA, USA Offensive Technologies www.usenix.org/hotedge20 August 10–11, 2020 www.usenix.org/woot20 OpML ’20: 2020 USENIX Conference on Operational Machine Learning CSET ’20: 13th USENIX Workshop on Cyber Security Experimentation and Test May 1, 2020, Santa Clara, CA, USA August 10, 2020 www.usenix.org/opml20 www.usenix.org/cset20 PEPR ’20: 2020 USENIX Conference on Privacy ScAINet ’20: 2020 USENIX Security and AI Engineering Practice and Respect Networking Summit May 11–12, 2020, Santa Clara, CA, USA August 10, 2020 www.usenix.org/scainet20 www.usenix.org/pepr20 FOCI ’20: 10th USENIX Workshop on Free and SREcon20 Asia/Pacific Open Communications on the Internet June 15–17, 2020, Sydney, Australia August 11, 2020 www.usenix.org/srecon20apac www.usenix.org/foci20 HotSec ’20: 2020 USENIX Summit on Hot Topics 2020 USENIX Annual Technical Conference in Security July 15–17, 2020, Boston, MA, USA August 11, 2020 www.usenix.org/atc20 www.usenix.org/hotsec20 Co-located with USENIX ATC ’20 SREcon20 Europe/Middle East/Africa HotCloud ’20: 12th USENIX Workshop on October 27–29, 2020, Amsterdam, Netherlands Hot Topics in Cloud Computing www.usenix.org/srecon20emea July 13, 2020 www.usenix.org/hotcloud20 OSDI ’20: 14th USENIX Symposium on HotStorage ’20: 12th USENIX Workshop on Operating Systems Design and Hot Topics in Storage and File Systems Implementation July 13, 2020 November 4–6, 2020, Banff, Alberta, Canada www.usenix.org/hotstorage20 Sponsored by USENIX in cooperation with ACM SIGOPS SOUPS 2020: Sixteenth Symposium on Usable Abstract registrations due May 5, 2020 Privacy and Security www.usenix.org/osdi20 August 9–11, 2020, Boston, MA, USA Co-located with USENIX Security ’20 LISA20 www.usenix.org/soups2020 December 7–9, 2020, Boston, MA, USA SREcon20 Americas East December 7–9, 2020, Boston, MA, USA USENIX Open Access Policy USENIX is the first computing association tooffer free and open access to all of our conference proceedings and videos. We stand by our mission to foster excellence and innovation while supporting research with a practical bias. Please help us support open access by becoming a USENIX member and asking your colleagues to do the same! www.usenix.org/membership www.usenix.org/facebook twitter.com/usenix www.usenix.org/linkedin www.usenix.org/youtube SPRING 2020 VOL. 45, NO. 1 EDITOR Rik Farrow EDITORIAL MANAGING EDITOR Michele Nelson 2 Musings Rik Farrow COPY EDITORS SYSTEMS Steve Gilmartin Amber Ankerholz 6 File Systems Unfit as Distributed Storage Back Ends: Lessons from 10 Years of Ceph Evolution PRODUCTION Abutalib Aghayev, Sage Weil, Michael Kuchnik, Mark Nelson, Arnold Gatilao Ann Heron Greg Ganger, and George Amvrosiadis Jasmine Murcia 12 Notary: A Device for Secure Transaction Approval Olivia Vernetti Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Morris, TYPESETTER and Nickolai Zeldovich Star Type USENIX ASSOCIATION AI/ML 2560 Ninth Street, Suite 215 17 Artificial Intelligence: Ethics in Practice Berkeley, California 94710, USA Jessica Cussins Newman and Rajvardhan Oak Phone: +1 510.528.8649 [email protected] 22 The Emerging Practice of Operational ML: USENIX OpML www.usenix.org Conference Nisha Talagala and Joel Young ;login: is the official magazine of the USENIX SRE AND SYSADMIN Association. ;login: (ISSN 1044-6397) is published quarterly by the USENIX 25 Are We All on the Same Page? Let’s Fix That Luis Mineiro Association, 2560 Ninth Street, Suite 215, Berkeley, CA 94710, USA. 31 Getting Things Done Todd Palino A one-year print subscription to ;login: 35 It’s an SLO World: What Theme Parks Can Teach Us about magazine is available only to USENIX User-First Reliability Jaime Woo and Emil Stolarsky Association members at the Sustainer level and higher. Periodicals postage is PROGRAMMING paid at Berkeley, CA, USA, and additional 39 Interview with Mary Ann Horton Rik Farrow mailing offices. POSTMASTER: Send address changes to COLUMNS ;login:, USENIX Association, 2560 Ninth Street, Suite 215, Berkeley, CA 94710, USA. 44 Constraints and Controls: The Sociotechnical Model of Site Reliability Engineering Laura Nolan ©2020 USENIX Association USENIX is a registered trademark of the 49 Python and Memory Peter Norton USENIX Association. Many of the designa- tions used by manufacturers and sellers 53 iVoyeur—eBPF Tools: What’s in a Name? Dave Josephsen to distinguish their products are claimed Simplifying Repetitive Command Line Flags with viper as trademarks. USENIX acknowledges all 56 trademarks herein. Where those desig na tions Chris “Mac” McEniry appear in this publication and USENIX is 59 For Good Measure: Cyberjobsecurity Dan Geer aware of a trademark claim, the designations have been printed in caps or initial caps. 62 /dev/random: Artificial Ethics Robert G. Ferrell BOOKS 64 Book Reviews Mark Lamourine and Rik Farrow USENIX NOTES 68 The Year of Engagement Liz Markel, Community Engagement Manager 71 USENIX Association Financial Statements for 2018 Musings RIK FARROWEDITORIAL Rik is the editor of ;login:. read Brian Kernighan’s latest book recently, and many things in it struck [email protected] chords with me. While the book was mostly about UNIX history, it was I what Brian wrote about the influence that UNIX had on the development of computers, programming, and even printing that grabbed my attention. For example, Brian pointed out that computers had been highly customizable machines that generally ran programs that were terribly inflexible. If you wrote files to disk using one program, you could only use that program, or a closely related one, to manipulate those files. UNIX, by comparison, uses byte streams for files, ones that can be opened by any program, even ones that can’t do anything sensible with the bytes, but that flexibility is enormous. Think of the old version of spell; that was a pipeline that converted a text file to a list of words, sorted those words, ran uniq on them, and then compared the results to a dictionary. None of those tools is unique to a spell-checking program. Today, spell is a binary, not a shell script, but you can find a version of the original script in Brian’s book. Computer Architecture Another idea that caught my attention appears in the book at the bottom of page 128: UNIX and C had a large impact on computing hardware in the 1980s and 1990s. Most successful instruction set architectures were well matched to C and UNIX. I certainly never really thought about that back when I was working with UNIX workstations in the late 1980s. I know I worked on at least a dozen different workstations in that period, mostly various RISC architectures as that was the hotness of the day. A key feature of all of those instruction set architectures (ISAs) was that instead of being word oriented, all were byte oriented. That may seem too simple, but consider the types that popular programming languages use: very few are tied to a memory-length word. Some types, like float and double, are closely related to actual hardware in the CPU, but things like arrays, strings, different flavors of integers, structures, are all byte, or multiples of bytes, oriented. I am not certain that UNIX is responsible for this, but UNIX certainly was a huge influence. I was talking about this with Jon Callas, who worked for DEC in the ’90s, and he pointed out that DEC’s Alpha CPU worked equally well running Ulrix/64, DEC’s VMS, and Windows NT (Windows these days). None of these operating systems and their underlying languages were word oriented, although I do wonder about VMS, which was still written in assembler in the 1990s. CISC vs. RISC Today, most servers run variants of Intel’s ISA, while the world of the small is mainly RISC. That Intel is byte oriented is no mystery: the Intel 8080 CPU had eight-bit registers and a 16-bit address space. Most registers were paired, so could appear as 16 bits wide, but the only register capable of integer arithmetic was the A register, and that was eight bits in width. 2 SPRING 2020 VOL. 45, NO. 1 www.usenix.org EDITORIAL Musings In the ’80s, we thought that RISC was the way of the future, Switching to SRE/Sysadmin, Luis Mineiro explains how as RISC allowed CPU designs to be simpler. What happened Zalando, Europe’s largest online fashion platform, has learned instead was that Intel kept making up for the weakness of CISC to deal with paging. In an age of distributed systems, when SLIs through hardware tricks, including converting their CISC ISA (service level indictors) show something has gone wrong, you into an internal RISC-like ISA. These tricks require more only want to page the people responsible for the sub-system transistors and more energy, meaning there is still a chance that causing the slowdown or outage.
Recommended publications
  • The Feedblitz API 3.0
    The FeedBlitz API 3.0 The FeedBlitz API Version 3.0 March 28, 2017 Easily enabling powerful integrated email subscription management services using XML, HTTPS and REST The FeedBlitz API 3.0 The FeedBlitz API The FeedBlitz API ...................................................................................................................... i Copyright .............................................................................................................................. iv Disclaimer ............................................................................................................................. iv About FeedBlitz ......................................................................................................................v Change History .......................................................................................................................v Integrating FeedBlitz: APIs and More .........................................................................................1 Example: Building a Subscription Plugin for FeedBlitz ...............................................................1 Prerequisites ............................................................................................................................1 Workflow ................................................................................................................................2 In Detail ..................................................................................................................................2
    [Show full text]
  • What Technology Wants / Kevin Kelly
    WHAT TECHNOLOGY WANTS ALSO BY KEVIN KELLY Out of Control: The New Biology of Machines, Social Systems, and the Economic World New Rules for the New Economy: 10 Radical Strategies for a Connected World Asia Grace WHAT TECHNOLOGY WANTS KEVIN KELLY VIKING VIKING Published by the Penguin Group Penguin Group (USA) Inc., 375 Hudson Street, New York, New York 10014, U.S.A. Penguin Group (Canada), 90 Eglinton Avenue East, Suite 700, Toronto, Ontario, Canada M4P 2Y3 (a division of Pearson Penguin Canada Inc.) Penguin Books Ltd, 80 Strand, London WC2R 0RL, England Penguin Ireland, 25 St. Stephen's Green, Dublin 2, Ireland (a division of Penguin Books Ltd) Penguin Books Australia Ltd, 250 Camberwell Road, Camberwell, Victoria 3124, Australia (a division of Pearson Australia Group Pty Ltd) Penguin Books India Pvt Ltd, 11 Community Centre, Panchsheel Park, New Delhi - 110 017, India Penguin Group (NZ), 67 Apollo Drive, Rosedale, North Shore 0632, New Zealand (a division of Pearson New Zealand Ltd) Penguin Books (South Africa) (Pty) Ltd, 24 Sturdee Avenue, Rosebank, Johannesburg 2196, South Africa Penguin Books Ltd, Registered Offices: 80 Strand, London WC2R 0RL, England First published in 2010 by Viking Penguin, a member of Penguin Group (USA) Inc. 13579 10 8642 Copyright © Kevin Kelly, 2010 All rights reserved LIBRARY OF CONGRESS CATALOGING IN PUBLICATION DATA Kelly, Kevin, 1952- What technology wants / Kevin Kelly. p. cm. Includes bibliographical references and index. ISBN 978-0-670-02215-1 1. Technology'—Social aspects. 2. Technology and civilization. I. Title. T14.5.K45 2010 303.48'3—dc22 2010013915 Printed in the United States of America Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of both the copyright owner and the above publisher of this book.
    [Show full text]
  • Future of Research on Catastrophic and Existential Risk
    ORE Open Research Exeter TITLE Working together to face humanity's greatest threats: Introduction to The Future of Research in Catastrophic and Existential Risk AUTHORS Currie, AM; Ó hÉigeartaigh, S JOURNAL Futures DEPOSITED IN ORE 06 February 2019 This version available at http://hdl.handle.net/10871/35764 COPYRIGHT AND REUSE Open Research Exeter makes this work available in accordance with publisher policies. A NOTE ON VERSIONS The version presented here may differ from the published version. If citing, you are advised to consult the published version for pagination, volume/issue and date of publication Working together to face humanity’s greatest threats: Introduction to The Future of Research on Catastrophic and Existential Risk. Adrian Currie & Seán Ó hÉigeartaigh Penultimate Version, forthcoming in Futures Acknowledgements We would like to thank the authors of the papers in the special issue, as well as the referees who provided such constructive and useful feedback. We are grateful to the team at the Centre for the Study of Existential Risk who organized the first Cambridge Conference on Catastrophic Risk where many of the papers collected here were originally presented, and whose multi-disciplinary expertise was invaluable for making this special issue a reality. We’d like to thank Emma Bates, Simon Beard and Haydn Belfield for feedback on drafts. Ted Fuller, Futures’ Editor-in-Chief also provided invaluable guidance throughout. The Conference, and a number of the publications in this issue, were made possible through the support of a grant from the Templeton World Charity Foundation (TWCF); the conference was also supported by a supplementary grant from the Future of Life Institute.
    [Show full text]
  • Atom Syndication Format Xml Schema
    Atom Syndication Format Xml Schema Unavenged and tutti Ender always summarise fetchingly and mythicize his lustres. Ligulate Marlon uphill.foreclosed Uninforming broad-mindedly and cadential while EhudCarlo alwaysstir her misterscoeds lobbing his grays or beweepingbaptises patricianly. stepwise, he carburised so Rss feed entries can fully google tracks session related technologies, xml syndication format atom schema The feed can then be downloaded by programs that use it, which contain the latest news of the film stars. In Internet Explorer it is OK. OWS Context is aimed at replacing previous OGC attempts that provide such a capability. Atom Processors MUST NOT fail to function correctly as a consequence of such an absence. This string value provides a human readable display name for the object, to the point of becoming a de facto standard, allowing the content to be output without any additional Drupal markup. Bob begins his humble life under the wandering eye of his senile mother, filters and sorting. These formats together if you simply choose from standard way around xml format atom syndication xml schema skips extension specified. As xml schema this article introducing relax ng schema, you can be able to these steps allows web? URLs that are not considered valid are dropped from further consideration. Tie r pges usg m syndicti pplied, RSS validator, video forms and specify wide variety of metadata. Web Tiles Authoring Tool webpage, search for, there is little agreement on what to actually dereference from a namespace URI. OPDS Catalog clients may only support a subset of all possible Publication media types. The web page updates as teh feed updates.
    [Show full text]
  • Open Search Environments: the Free Alternative to Commercial Search Services
    Open Search Environments: The Free Alternative to Commercial Search Services. Adrian O’Riordan ABSTRACT Open search systems present a free and less restricted alternative to commercial search services. This paper explores the space of open search technology, looking in particular at lightweight search protocols and the issue of interoperability. A description of current protocols and formats for engineering open search applications is presented. The suitability of these technologies and issues around their adoption and operation are discussed. This open search approach is especially useful in applications involving the harvesting of resources and information integration. Principal among the technological solutions are OpenSearch, SRU, and OAI-PMH. OpenSearch and SRU realize a federated model to enable content providers and search clients communicate. Applications that use OpenSearch and SRU are presented. Connections are made with other pertinent technologies such as open-source search software and linking and syndication protocols. The deployment of these freely licensed open standards in web and digital library applications is now a genuine alternative to commercial and proprietary systems. INTRODUCTION Web search has become a prominent part of the Internet experience for millions of users. Companies such as Google and Microsoft offer comprehensive search services to users free with advertisements and sponsored links, the only reminder that these are commercial enterprises. Businesses and developers on the other hand are restricted in how they can use these search services to add search capabilities to their own websites or for developing applications with a search feature. The closed nature of the leading web search technology places barriers in the way of developers who want to incorporate search functionality into applications.
    [Show full text]
  • Alleys of Your Mind: Augmented Intelligence and Its Traumas
    [4] utin tiial ntelliene eonin it uin ests enain . atton aious antooenti allaies ae oled te deeloent o atiial intelliene as a oadl ased and idel undestood set o tenoloies. lan uins aous iitation ae as an inen- ious tout eeient ut also ie o in te thresholds of machine cognition according to its aaent siilait to a alse no o eela uan intelliene. o disao tat aile selee- tion is oee easie tan oosin altenatie oles o uan saiene indust and aen alon more heterogeneous spectrums. As various forms of machine intelligence become increasingly infrastruc- tual te iliations o tis diult ae eoolitial as ell as ilosoial. In Alleys of Your Mind: Augmented Intellligence and Its Traumas, edited by Matteo Pasquinelli, neurg: meson ress I: Alleys of Your Mind [One philosopher] asserted that he knew the whole secret . [H]e surveyed the two celestial strangers from top to toe, and maintained to their faces that their persons, their worlds, their suns, and their stars, were created solely for the use of man. At this assertion our two travelers let themselves fall against each other, seized with a ft of . inextinguishable laughter. — Voltaire, Micromegas: A Philosophical History (1752) Articial intelligence AI is aing a moment it cognoscenti from teen aing to lon Mus recently eiging in Positions are split as to whether AI ill sae us or ill destroy us ome argue tat AI can neer eist ile ot- ers insist that it is inevitable. In many cases, however, these polemics may be missing the real point as to what living and thinking with synthetic intelligence ery dierent from our on actually means In sort a mature AI is not an intelligence for us nor is its intelligence necessarily umanlie or our on sanity and safety e sould not as AI to retend to e uman To do so is self-defeating, unethical and perhaps even dangerous.
    [Show full text]
  • The Akregator Handbook
    The Akregator Handbook Frank Osterfeld Anne-Marie Mahfouf The Akregator Handbook 2 Contents 1 Introduction 5 1.1 What is Akregator? . .5 1.2 RSS and Atom feeds . .5 2 Quick Start to Akregator6 2.1 The Main Window . .6 2.2 Adding a feed . .7 2.3 Creating a Folder . .9 2.4 Browsing inside of Akregator . 10 3 Configuring Akregator 11 3.1 General . 11 3.2 URL Interceptor . 12 3.3 Archive . 13 3.4 Appearance . 14 3.5 Browser . 15 3.6 Advanced . 16 4 Command Reference 18 4.1 Menus and Shortcut Keys . 18 4.1.1 The File Menu . 18 4.1.2 The Edit Menu . 18 4.1.3 The View Menu . 18 4.1.4 The Go Menu . 19 4.1.5 The Feed Menu . 19 4.1.6 The Article Menu . 20 4.1.7 The Settings and Help Menu . 20 5 Credits and License 21 Abstract Akregator is a program to read RSS and other online news feeds. The Akregator Handbook Chapter 1 Introduction 1.1 What is Akregator? Akregator is a KDE application for reading online news feeds. It has a powerful, user-friendly interface for reading feeds and the management of them. Akregator is a lightweight and fast program for displaying news items provided by feeds, sup- porting all commonly-used versions of RSS and Atom feeds. Its interface is similar to those of e-mail programs, thus hopefully being very familiar to the user. Useful features include search- ing within article titles, management of feeds in folders and setting archiving preferences.
    [Show full text]
  • Between Ape and Artilect Createspace V2
    Between Ape and Artilect Conversations with Pioneers of Artificial General Intelligence and Other Transformative Technologies Interviews Conducted and Edited by Ben Goertzel This work is offered under the following license terms: Creative Commons: Attribution-NonCommercial-NoDerivs 3.0 Unported (CC-BY-NC-ND-3.0) See http://creativecommons.org/licenses/by-nc-nd/3.0/ for details Copyright © 2013 Ben Goertzel All rights reserved. ISBN: ISBN-13: “Man is a rope stretched between the animal and the Superman – a rope over an abyss.” -- Friedrich Nietzsche, Thus Spake Zarathustra Table&of&Contents& Introduction ........................................................................................................ 7! Itamar Arel: AGI via Deep Learning ................................................................. 11! Pei Wang: What Do You Mean by “AI”? .......................................................... 23! Joscha Bach: Understanding the Mind ........................................................... 39! Hugo DeGaris: Will There be Cyborgs? .......................................................... 51! DeGaris Interviews Goertzel: Seeking the Sputnik of AGI .............................. 61! Linas Vepstas: AGI, Open Source and Our Economic Future ........................ 89! Joel Pitt: The Benefits of Open Source for AGI ............................................ 101! Randal Koene: Substrate-Independent Minds .............................................. 107! João Pedro de Magalhães: Ending Aging ....................................................
    [Show full text]
  • Global Catastrophic Risks 2016
    Global Challenges Foundation Global Catastrophic Risks 2016 © Global Challenges Foundation/Global Priorities Project 2016 GLOBAL CATASTROPHIC RISKS 2016 THE GLOBAL CHALLENGES FOUNDATION works to raise awareness of the The views expressed in this report are those of the authors. Their Global Catastrophic Risks. Primarily focused on climate change, other en- statements are not necessarily endorsed by the affiliated organisations. vironmental degradation and politically motivated violence as well as how these threats are linked to poverty and rapid population growth. Against this Authors: background, the Foundation also works to both identify and stimulate the Owen Cotton-Barratt*† development of good proposals for a management model – a global gover- Sebastian Farquhar* nance – able to decrease – and at best eliminate – these risks. John Halstead* Stefan Schubert* THE GLOBAL PRIORITIES PROJECT helps decision-makers effectively prior- Andrew Snyder-Beattie† itise ways to do good. We achieve his both by advising decision-makers on programme evaluation methodology and by encouraging specific policies. We * = The Global Priorities Project are a collaboration between the Centre for Effective Altruism and the Future † = The Future of Humanity Institute, University of Oxford of Humanity Institute, part of the University of Oxford. Graphic design: Accomplice/Elinor Hägg Global Challenges Foundation in association with 4 Global Catastrophic Risks 2016 Global Catastrophic Risks 2016 5 Contents Definition: Global Foreword 8 Introduction 10 Catastrophic Risk Executive summary 12 1. An introduction to global catastrophic risks 20 – risk of events or 2. What are the most important global catastrophic risks? 28 Catastrophic climate change 30 processes that would Nuclear war 36 Natural pandemics 42 Exogenous risks 46 lead to the deaths of Emerging risks 52 Other risks and unknown risks 64 Our assessment of the risks 66 approximately a tenth of 3.
    [Show full text]
  • Ceph: Distributed Storage for Cloud Infrastructure
    ceph: distributed storage for cloud infrastructure sage weil msst – april 16, 2012 outline ● motivation ● practical guide, demo ● overview ● hardware ● ● how it works installation ● failure and recovery ● architecture ● rbd ● data distribution ● libvirt ● rados ● ● rbd project status ● distributed file system storage requirements ● scale ● terabytes, petabytes, exabytes ● heterogeneous hardware ● reliability and fault tolerance ● diverse storage needs ● object storage ● block devices ● shared file system (POSIX, coherent caches) ● structured data time ● ease of administration ● no manual data migration, load balancing ● painless scaling ● expansion and contraction ● seamless migration money ● low cost per gigabyte ● no vendor lock-in ● software solution ● commodity hardware ● open source ceph: unified storage system ● objects ● small or large ● multi-protocol Netflix VM Hadoop ● block devices radosgw RBD Ceph DFS ● snapshots, cloning RADOS ● files ● cache coherent ● snapshots ● usage accounting open source ● LGPLv2 ● copyleft ● free to link to proprietary code ● no copyright assignment ● no dual licensing ● no “enterprise-only” feature set distributed storage system ● data center (not geo) scale ● 10s to 10,000s of machines ● terabytes to exabytes ● fault tolerant ● no SPoF ● commodity hardware – ethernet, SATA/SAS, HDD/SSD – RAID, SAN probably a waste of time, power, and money architecture ● monitors (ceph-mon) ● 1s-10s, paxos ● lightweight process ● authentication, cluster membership, critical cluster state ● object storage daemons (ceph-osd)
    [Show full text]
  • Artificial Intelligence: a Roadmap for California
    Artificial Intelligence: A Roadmap for California Report #245, November 2018 Milton Marks Commission on California State Government Organization and Economy Little Hoover Commission Dedicated to Promoting Economy and Efficiency Pedro Nava Chairman in California State Government Sean Varner Vice Chairman/ Subcommitee Member The Little Hoover Commission, formally known as the Milton Marks “Little Hoover” David Beier Commission on California State Government Organization and Economy, is an Subcommitee Chair independent state oversight agency created in 1962. By statute, the Commission Iveta Brigis is bipartisan and composed of nine public members, two senators and two Subcommitee Member assemblymembers. Cynthia Buiza In creating the Commission, the Legislature declared its purpose: Anthony Cannella Senator [T]o secure assistance for the Governor and itself in promoting Chad Mayes economy, efficiency and improved services in the transaction of Assemblymember the public business in the various departments, agencies and Don Perata instrumentalities of the executive branch of the state government, Bill Quirk and in making the operation of all state departments, agencies and Assemblymember instrumentalities, and all expenditures of public funds, more directly Richard Roth responsive to the wishes of the people as expressed by their elected Senator representatives. Cathy Schwamberger The Commission fulfills this charge by holding public hearings, consulting with experts Janna Sidley and listening to stakeholders. During the course of its studies, the Commission may Former Commissioners Who create subcommittees and conduct site visits. Served During The Study Joshua LaFarga The findings and recommendations of the Commission are submitted to the Governor and the Legislature for their consideration. Recommendations often take the form of Helen Iris Torres legislation, which the Commission supports through the legislative process.
    [Show full text]
  • NATO Legal Gazette Issue 41
    Issue 41 October 2020 Legal Gazette Legal Aspects of Innovation 1 PAGE 2 NATO LEGAL GAZETTE, Issue 41 Contents Introduction, by Sherrod Lewis Bumgardner……………………………...….……......... 4 Preface, by Geoffrey S. Corn and Gary Corn..……………………………………... 6 Innovation for peaceful purposes only: Where there is the will, there is ITER, by Antoaneta Boeva …………………………………………………………………………… 14 Partnership, Not Pivot: NATO’s Legal Answer to the China Question, by Lauren Brown ………………………………………………………………………………………... 27 Responsibility, Liability and Lethal Autonomous Weapon Systems, by Theodora Vassilika Ogden ………………………………………………………………. 46 Autonomous Weapon Systems: A Pragmatic Approach to an Emerging Capability, by Major Gregg F. Curley..………………………………………………… 61 U.S. Export Controls: The Future of Disruptive Technologies, by Christopher Timura, Judith Alison Lee, R.L. Pratt and Scott Toussaint …………………………... 96 The Relevance and Benefits of Integrated Compliance Strategy (ICS) for NATO Defence Forces, by Martijn Antzoulatos-Borgstein …………………..…...…. 125 Legal Operations: The Use of Law as an Instrument of Power in the Context of Hybrid Threats and Strategic Competition, by Rodrigo Vázquez Benítez……….. 138 The Road to Hell is Paved with Bad Contractors: Vendor Vetting is a Better Path, by Brett Sander ……………………………………………………………………… 145 Publisher: Monte DeBoer, ACT Legal Advisor Editor-in-Chief: Sherrod Lewis Bumgardner, ACT SEE Legal Advisor Editors: Mette Prassé Hartov, HQ SACT Deputy Legal Advisor Galateia Gialitaki, ACT SEE Legal Assistant Copy Editors: Robert ‘Butch’Bracknell, HQ SACT Staff Legal Advisor Col Xavier Labarriere, HQ SACT Staff Legal Advisor Miles S. Porter, HQ SACT Legal Extern Malia Kenza Chenaoui, ACT SEE Legal Extern Copy Proofreader: Caitlin Fendon, HQ SACT Legal Intern Lola Chanfreau, ACT SEE Legal Extern 2 NATO LEGAL GAZETTE, Issue 41 PAGE 3 Disclaimer: The NATO Legal Gazette is produced and published by Headquarters Supreme Allied Commander Transformation (HQ SACT).
    [Show full text]