Containers for Science and High-Performance ComputingDmitry Spodarets
Within this talk, we will explore how Singularity liberates non-privileged users and host resources (such as interconnects, resource managers, file systems, accelerators, etc.) allowing users to take full control to set-up and run in their native environments. This talk explores how Singularity combines software packaging models with minimalistic containers to create very lightweight application bundles which can be simply executed and contained completely within their environment or be used to interact directly with the host file systems at native speeds. A Singularity application bundle can be as simple as containing a single binary application or as complicated as containing an entire workflow and is as flexible as you will need.
Virtual machines are generally considered secure. At least, secure enough to power highly multi-tenant, large-scale public clouds, where a single physical machine can host a large number of virtual instances belonging to different customers. Containers have many advantages over virtual machines: they boot faster, have less performance overhead, and use less resources. However, those advantages also stem from the fact that containers share the kernel of their host, instead of abstracting a new independent environment. This sharing has significant security implications, as kernel exploits can now lead to host-wide escalations.
We will show techniques to harden Linux Containers; including kernel capabilities, mandatory access control, hardened kernels, user namespaces, and more, and discuss the remaining attack surface.
Вебинар: Основы распараллеливания С++ программ при помощи OpenMPFlyElephant
Презентация с первого технического вебинара FlyElephant, на котором были рассмотрены основы распараллеливания С/С++ программ при помощи OpenMP и рассказано о функционале FlyElephant.
Видео презентации: https://youtu.be/X1bqBPnJaHM
Сайт FlyElephant: http://flyelephant.net/
ПРОГРАММА БЕТА-ТЕСТИРОВАНИЯ FLYELEPHANT: http://flyelephant.net/beta/
Presented by Tim Mackey, Senior Technical Evangelist at Black Duck Software on September 8, 2016 with OpenShift Commons.
Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and associated network defenses. Since those defenses are reactive to application issues attackers choose to exploit, it’s critical to have visibility into both what is in your container library, but also what the current state of vulnerability activity might be. Current vulnerability information for container images can readily be obtained by using the scan action on Atomic hosts in your OpenShift Container Platform.
In this session we’ll cover how an issue becomes a disclosed vulnerability, how to determine the risk associated with your container usage, and potential mitigation patterns you might choose to utilize to limit any potential scope of compromise.
Containers for Science and High-Performance ComputingDmitry Spodarets
Within this talk, we will explore how Singularity liberates non-privileged users and host resources (such as interconnects, resource managers, file systems, accelerators, etc.) allowing users to take full control to set-up and run in their native environments. This talk explores how Singularity combines software packaging models with minimalistic containers to create very lightweight application bundles which can be simply executed and contained completely within their environment or be used to interact directly with the host file systems at native speeds. A Singularity application bundle can be as simple as containing a single binary application or as complicated as containing an entire workflow and is as flexible as you will need.
Virtual machines are generally considered secure. At least, secure enough to power highly multi-tenant, large-scale public clouds, where a single physical machine can host a large number of virtual instances belonging to different customers. Containers have many advantages over virtual machines: they boot faster, have less performance overhead, and use less resources. However, those advantages also stem from the fact that containers share the kernel of their host, instead of abstracting a new independent environment. This sharing has significant security implications, as kernel exploits can now lead to host-wide escalations.
We will show techniques to harden Linux Containers; including kernel capabilities, mandatory access control, hardened kernels, user namespaces, and more, and discuss the remaining attack surface.
Вебинар: Основы распараллеливания С++ программ при помощи OpenMPFlyElephant
Презентация с первого технического вебинара FlyElephant, на котором были рассмотрены основы распараллеливания С/С++ программ при помощи OpenMP и рассказано о функционале FlyElephant.
Видео презентации: https://youtu.be/X1bqBPnJaHM
Сайт FlyElephant: http://flyelephant.net/
ПРОГРАММА БЕТА-ТЕСТИРОВАНИЯ FLYELEPHANT: http://flyelephant.net/beta/
Presented by Tim Mackey, Senior Technical Evangelist at Black Duck Software on September 8, 2016 with OpenShift Commons.
Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and associated network defenses. Since those defenses are reactive to application issues attackers choose to exploit, it’s critical to have visibility into both what is in your container library, but also what the current state of vulnerability activity might be. Current vulnerability information for container images can readily be obtained by using the scan action on Atomic hosts in your OpenShift Container Platform.
In this session we’ll cover how an issue becomes a disclosed vulnerability, how to determine the risk associated with your container usage, and potential mitigation patterns you might choose to utilize to limit any potential scope of compromise.
Infrastructure for the work of Data ScientistsFlyElephant
Dmitry Spodarets, Founder and CEO at FlyElephant
III International conference on practical use of Artificial Intelligence and Data Science - http://aiukraine.com/en/
OpenVZ, which has turned 7 recently, is an implementation of lightweight virtualization technology for Linux, something which is also referred to as LXC or just containers. The talk gives an insight into 7 different problems with containers and how they were solved. While most of these problems and solutions belongs in the Linux kernel, kernel knowledge is not expected from the audience.
Contain your risk: Deploy secure containers with trust and confidenceBlack Duck by Synopsys
Presented on September 22, 2016 by Brent Baude, Principle Software Engineer, Atomic and Docker Development, Red Hat; Randy Kilmon, VP, Engineering, Black Duck
Organizations are increasingly turning to container environments to meet the demand for faster, more agile software development. But a 2015 study conducted by Forrester Consulting on behalf of Red Hat revealed that 53% of IT operations and development decision makers at global enterprises reported container security concerns as a barrier to adoption.
The challenges of managing security risk increase in scope and complexity when hundreds or even thousands of different open source software components and licenses are part of your application code base. Since 2014, more than 6,000 new open source security vulnerabilities have been reported, making it essential to have good visibility into and control over the open source in use in order to understand if any known vulnerabilities are present.
In this webinar, experts from Red Hat and Black Duck will share the latest insights and recommendations for securing the open source in your containers, including protecting them from vulnerabilities like Heartbleed, Shellshock and Venom. You’ll learn:
• Why container environments present new application security challenges, including those posed by ever-increasing open source use.
• How to scan applications running in containers to identify open source in use and map known open source security vulnerabilities.
• Best practices and methodologies for deploying secure containers with trust and confidence.
Making DevOps Secure with Docker on Solaris (Oracle Open World, with Jesse Bu...Jérôme Petazzoni
Docker, the container Engine and Platform, is coming to Oracle Solaris! This is the talk that Jérôme Petazzoni (Docker) and Jesse Butler (Oracle) gave at Oracle Open World in November 2015.
Docker landed almost two years ago, making it possible to build, ship, and run
any Linux application, on any platform, it was quickly adopted by developers
and ops, like no other tool before. The CI/CD industry even took it to
production long before it was stamped "production-ready."
Why does everyone (or almost!) love Docker? Because it puts powerful
automation abilities within the hands of normal developers. Automation
almost always involves building distribution packages, virtual machine
images, or writing configuration management manifests. With Docker,
those tasks are radically transformed: sometimes they're far easier than before,
other times they're no longer needed at all. Either way, the intervention
of a seasoned sysadmin guru is no longer required.
Docker, Linux Containers, and Security: Does It Add Up?Jérôme Petazzoni
Containers are becoming increasingly popular. They have many advantages over virtual machines: they boot faster, have less performance overhead, and use less resources. However, those advantages also stem from the fact that containers share the kernel of their host, instead of abstracting an new independent environment. This sharing has significant security implications, as kernel exploits can now lead to host-wide escalations.
In this presentation, we will:
- Review the actual security risks, in particular for multi-tenant environments running arbitrary applications and code
- Discuss how to mitigate those risks
- Focus on containers as implemented by Docker and the libcontainer project, but the discussion also stands for plain containers as implemented by LXC
Инвестиционный дайджест InVenture за февраль 2017 - все самое важное в сфере прямых инвестиций и венчурного капитала - за 1 месяц - на 10 страницах - за 5 минут!
Анализ данных: Data Science и Data Engineering @ GeekWeekConf 2015Petr Ermakov
Чем привлекателен анализ данных и на какие направления он делится? Как перестать беспокоиться и начать анализировать данные? А также с чего начать простому программисту? Ответы на эти вопросы и многое другое в данном докладе.
http://geekweekconf.ru
Infrastructure for the work of Data ScientistsFlyElephant
Dmitry Spodarets, Founder and CEO at FlyElephant
III International conference on practical use of Artificial Intelligence and Data Science - http://aiukraine.com/en/
OpenVZ, which has turned 7 recently, is an implementation of lightweight virtualization technology for Linux, something which is also referred to as LXC or just containers. The talk gives an insight into 7 different problems with containers and how they were solved. While most of these problems and solutions belongs in the Linux kernel, kernel knowledge is not expected from the audience.
Contain your risk: Deploy secure containers with trust and confidenceBlack Duck by Synopsys
Presented on September 22, 2016 by Brent Baude, Principle Software Engineer, Atomic and Docker Development, Red Hat; Randy Kilmon, VP, Engineering, Black Duck
Organizations are increasingly turning to container environments to meet the demand for faster, more agile software development. But a 2015 study conducted by Forrester Consulting on behalf of Red Hat revealed that 53% of IT operations and development decision makers at global enterprises reported container security concerns as a barrier to adoption.
The challenges of managing security risk increase in scope and complexity when hundreds or even thousands of different open source software components and licenses are part of your application code base. Since 2014, more than 6,000 new open source security vulnerabilities have been reported, making it essential to have good visibility into and control over the open source in use in order to understand if any known vulnerabilities are present.
In this webinar, experts from Red Hat and Black Duck will share the latest insights and recommendations for securing the open source in your containers, including protecting them from vulnerabilities like Heartbleed, Shellshock and Venom. You’ll learn:
• Why container environments present new application security challenges, including those posed by ever-increasing open source use.
• How to scan applications running in containers to identify open source in use and map known open source security vulnerabilities.
• Best practices and methodologies for deploying secure containers with trust and confidence.
Making DevOps Secure with Docker on Solaris (Oracle Open World, with Jesse Bu...Jérôme Petazzoni
Docker, the container Engine and Platform, is coming to Oracle Solaris! This is the talk that Jérôme Petazzoni (Docker) and Jesse Butler (Oracle) gave at Oracle Open World in November 2015.
Docker landed almost two years ago, making it possible to build, ship, and run
any Linux application, on any platform, it was quickly adopted by developers
and ops, like no other tool before. The CI/CD industry even took it to
production long before it was stamped "production-ready."
Why does everyone (or almost!) love Docker? Because it puts powerful
automation abilities within the hands of normal developers. Automation
almost always involves building distribution packages, virtual machine
images, or writing configuration management manifests. With Docker,
those tasks are radically transformed: sometimes they're far easier than before,
other times they're no longer needed at all. Either way, the intervention
of a seasoned sysadmin guru is no longer required.
Docker, Linux Containers, and Security: Does It Add Up?Jérôme Petazzoni
Containers are becoming increasingly popular. They have many advantages over virtual machines: they boot faster, have less performance overhead, and use less resources. However, those advantages also stem from the fact that containers share the kernel of their host, instead of abstracting an new independent environment. This sharing has significant security implications, as kernel exploits can now lead to host-wide escalations.
In this presentation, we will:
- Review the actual security risks, in particular for multi-tenant environments running arbitrary applications and code
- Discuss how to mitigate those risks
- Focus on containers as implemented by Docker and the libcontainer project, but the discussion also stands for plain containers as implemented by LXC
Инвестиционный дайджест InVenture за февраль 2017 - все самое важное в сфере прямых инвестиций и венчурного капитала - за 1 месяц - на 10 страницах - за 5 минут!
Анализ данных: Data Science и Data Engineering @ GeekWeekConf 2015Petr Ermakov
Чем привлекателен анализ данных и на какие направления он делится? Как перестать беспокоиться и начать анализировать данные? А также с чего начать простому программисту? Ответы на эти вопросы и многое другое в данном докладе.
http://geekweekconf.ru
В этом докладе мы говорили про:
+ Гибкое управление маркетингом и развитием компании.
+ Методики увеличения предсказуемости и “впихивания невпихуемого”.
+ Что значат модные термины Agile, Scrum, Kanban и как их применять в обычном бизнесе (маркетинг, копирайтинг, адвокатские услуги, консалтинг и т.д.)
+ Реальные кейсы преодоления хаоса через использование гибких методик.
+ Как попасть в сказку: все сделано вовремя, в рамках бюджета, с хорошим качеством.
Вам будет интересно, если перед Вами стоит одна из таких задач:
+ Проектов много, они разные и не понятно как ими управлять.
+ Вы занимаетесь творческими задачами (маркетинг, дизайн, разработка) и не понимаете как учитывать и приоритезировать работу.
+ У Вас в бизнесе управление проектами работает по принципу “как получится” или “через ж**у”.
+ Есть постоянные проблемы с качеством и сроками.
Кому будет полезно:
+ Владельцам и директорам не IT бизнеса
+ Проектным менеджерам
+ Тем, кто планирует открыть свое дело и хочет сразу делать все по уму.
+ Тем, кто не понимает, что такое Agile и хочет узнать что-то новое, чтобы потом блистать знаниями перед коллегами.
Что получили слушатели на выходе:
+ Понимание как в обычном бизнесе использовать лучшие наработки IT сферы.
+ Основы design thinking
+ Понимание как управлять маркетингом вашей компании
RnDm. Управление проектами исследования и разработки. Лекция 2. Инициализация...Alexey Kachalin
Управление проектами исследования и разработки - курс, ориентированный на студентов и молодых специалистов в области разработки программного обеспечения, а также проектов НИР/НИОКР.
Цель курса - показать ключевые практики управления проектами как по ключевым стандартам из области управления проектами и специализированным - для разработки ПО, а также обсудить реальные примеры из исследовательских проектов (научных, технологических, бизнес-аналитических), востребованных в научных и коммерческих организациях.
Миссия курса: дать необходимые знания о возможных инструментах и практиках не загоняя в жесткие рамки отдельного стандарта, методики или фреймворка; обеспечить молодым специалистам лёгкое вхождение в действующие производственные команды и проекты, научить мыслить и осознавать ценности и преимущества проектной организации работы в организации.
Инициализация, планирование, ключевые артефакты проектного управления на этих этапах. Начнём анализировать роль и функции менеджера проекта.
Современное программное обеспечение в работе психологаKyrylo Zakharov
Презентация к докладу "Современное программное обеспечение в работе психолога". Возможно, не все будет понятно, так как многое показывалось непосредственно на самом семинаре. :)
RnDm. Управление проектами исследования и разработки. Лекция 3. Декомпозиция...Alexey Kachalin
Управление проектами исследования и разработки - курс, ориентированный на студентов и молодых специалистов в области разработки программного обеспечения, а также проектов НИР/НИОКР.
Цель курса - показать ключевые практики управления проектами как по ключевым стандартам из области управления проектами и специализированным - для разработки ПО, а также обсудить реальные примеры из исследовательских проектов (научных, технологических, бизнес-аналитических), востребованных в научных и коммерческих организациях.
Миссия курса: дать необходимые знания о возможных инструментах и практиках не загоняя в жесткие рамки отдельного стандарта, методики или фреймворка; обеспечить молодым специалистам лёгкое вхождение в действующие производственные команды и проекты, научить мыслить и осознавать ценности и преимущества проектной организации работы в организации.
В этой лекции речь пойдет о разработке структуры работ проекта: формулировке задач и их декомпозиции, планировании сроков и анализе трудоемкости задач.
RnDm. Управление проектами исследования и разработки. Лекция 1. ВведениеAlexey Kachalin
Управление проектами исследования и разработки - курс, ориентированный на студентов и молодых специалистов в области разработки программного обеспечения, а также проектов НИР/НИОКР.
Цель курса - показать ключевые практики управления проектами как по ключевым стандартам из области управления проектами и специализированным - для разработки ПО, а также обсудить реальные примеры из исследовательских проектов (научных, технологических, бизнес-аналитических), востребованных в научных и коммерческих организациях.
Миссия курса: дать необходимые знания о возможных инструментах и практиках не загоняя в жесткие рамки отдельного стандарта, методики или фреймворка; обеспечить молодым специалистам лёгкое вхождение в действующие производственные команды и проекты, научить мыслить и осознавать ценности и преимущества проектной организации работы в организации.
Проектное управление - стандарт де-факто в современных производственных компаниях. Понимание основ проектного управления требуется не только от менеджеров проекта, но и от каждого участника проектной команды. В рамках курса слушателям будет предложено применять получаемые знания к проекту (например - курсовой работе). Курс не ориентирован и не предполагает углублённого изучения программных средств управления проектами. На семинаре будут обсуждаться реальные практики российских компаний-разработчиков (в т.ч. в формате приглашения руководителей проектов и ведущих специалистов государственных и коммерческих компаний).
Similar to [Impact Lab] IT инструменты для проекта (20)
2. Содержание
• Управление проектом
• Коммуникация внутри проекта
• Аналитика деятельности проекта
• Компоненты для сайта
• Программы поддержки стартапов
3. Обо мне
• Преподаватель ОНПУ
• Основатель GeeksLab и
FlyElephant
• Один из координаторов
Одесского ИТ Сообщества
4. Почта и анализ почты
http://www.yesware.com/
http://www.getsidekick.com/
https://mail.yandex.ua
https://gmail.com