Deskpool making vdi cost effective for smbDongLiwu
Deskpool VDI solution is very suitable for small companies looking to control IT costs , which not only provides low cost VDI software solution, but also delivery low-cost, high performance thin client products.
Présentation de "Virtual Desktop Infrastructure" de Computerland.
Pour plus d'infos : #AskComputerland. Nos experts répondent à vos questions. http://bit.ly/1fonxAz
Discover the story behind XCP-ng, the free community build of XenServer. Why we did it, and how we built it, from technical and community perspective. And finally, what's coming next.
Hypervisor-Based Replication , Zerto architecture: Simple, effective, and virtual-ready , virtual replication and BC/DR capabilities for the data center and the cloud
Linux Crontab allows scheduling routine jobs to run automatically in the background at specific times or days. The document provides 15 examples of cron job configurations, including running jobs daily, weekly, monthly, at startup or reboot, and during specific time ranges. It also covers viewing, editing, and installing cron jobs, as well as redirecting output and specifying environment variables. Anacron is introduced as an alternative for machines that may not be running 24/7, to better ensure scheduled jobs run as expected.
Kvm performance optimization for ubuntuSim Janghoon
This document discusses various techniques for optimizing KVM performance on Linux systems. It covers CPU and memory optimization through techniques like vCPU pinning, NUMA affinity, transparent huge pages, KSM, and virtio_balloon. For networking, it discusses vhost-net, interrupt handling using MSI/MSI-X, and NAPI. It also covers block device optimization through I/O scheduling, cache mode, and asynchronous I/O. The goal is to provide guidance on configuring these techniques for workloads running in KVM virtual machines.
Nutanix Enterprise Cloud makes virtualization invisible, leveraging Nutanix's built-in and license free hypervisor – AHV. This powerful introduction to AHV and Prism's integrated virtualization management explains the benefits of converging the virtualization layer with the infrastructure stack. A veteran Nutanix engineer will demonstrate how easy it is to provision new workloads on AHV, and manage the full virtualization environment via Prism. See all of the enterprise-grade capabilities that make AHV the perfect choice for your applications and IT budget.
Deskpool making vdi cost effective for smbDongLiwu
Deskpool VDI solution is very suitable for small companies looking to control IT costs , which not only provides low cost VDI software solution, but also delivery low-cost, high performance thin client products.
Présentation de "Virtual Desktop Infrastructure" de Computerland.
Pour plus d'infos : #AskComputerland. Nos experts répondent à vos questions. http://bit.ly/1fonxAz
Discover the story behind XCP-ng, the free community build of XenServer. Why we did it, and how we built it, from technical and community perspective. And finally, what's coming next.
Hypervisor-Based Replication , Zerto architecture: Simple, effective, and virtual-ready , virtual replication and BC/DR capabilities for the data center and the cloud
Linux Crontab allows scheduling routine jobs to run automatically in the background at specific times or days. The document provides 15 examples of cron job configurations, including running jobs daily, weekly, monthly, at startup or reboot, and during specific time ranges. It also covers viewing, editing, and installing cron jobs, as well as redirecting output and specifying environment variables. Anacron is introduced as an alternative for machines that may not be running 24/7, to better ensure scheduled jobs run as expected.
Kvm performance optimization for ubuntuSim Janghoon
This document discusses various techniques for optimizing KVM performance on Linux systems. It covers CPU and memory optimization through techniques like vCPU pinning, NUMA affinity, transparent huge pages, KSM, and virtio_balloon. For networking, it discusses vhost-net, interrupt handling using MSI/MSI-X, and NAPI. It also covers block device optimization through I/O scheduling, cache mode, and asynchronous I/O. The goal is to provide guidance on configuring these techniques for workloads running in KVM virtual machines.
Nutanix Enterprise Cloud makes virtualization invisible, leveraging Nutanix's built-in and license free hypervisor – AHV. This powerful introduction to AHV and Prism's integrated virtualization management explains the benefits of converging the virtualization layer with the infrastructure stack. A veteran Nutanix engineer will demonstrate how easy it is to provision new workloads on AHV, and manage the full virtualization environment via Prism. See all of the enterprise-grade capabilities that make AHV the perfect choice for your applications and IT budget.
The document discusses various methods of backing up and recovering Unix systems. It describes full and incremental backups, different backup levels in HP-UX, and common backup and recovery methods like fbackup, tar, cpio, dump/restore, and pax. Graph files can be used with fbackup to selectively backup included files and directories. The frecover command restores backups created with fbackup. Tar supports backups larger than 2GB and can create archive files. Cpio works with other commands to support multiple volume backups of large file systems. Dump copies data to tape and restore reconstructs file systems from dump backups. Pax provides portable archiving of directory hierarchies.
Information Technology Disaster Recovery Guide - ABC Bank (redacted)Stephen White
This document provides a disaster recovery guide for ABC Bank. It outlines ABC Bank's current IT infrastructure, which includes servers and applications located across multiple sites. It then details the objectives, risks, preparation, and procedures for recovering ABC Bank's IT systems and services in the event of a disaster that impacts the primary data center. The plan defines the disaster recovery team and processes for activating the plan, assessing damage, restoring backups, and recovering critical systems and applications from the disaster recovery site.
Static partitioning is becoming increasingly common in embedded. A static hypervisor, such as Xen dom0less, is employed to split the hardware resources into multiple domains and run a different OS in each domain. For instance, Linux and Zephyr. Only the simplest static partitioning configurations don't involve any data exchanges between the domains. Often, communication and data exchanges between two or more environments are required to complete the data processing pipeline that implements the target application. However, the VM-to-VM communication mechanisms available in static partitioning configurations are typically more limited compared to general-purpose hypervisors. For example, PV drivers are not available to Xen dom0less domains. This presentation will discuss the need for communication in static partitioning setups and it will present the technical challenges involved in getting traditional communication methods to work, including Xen PV drivers and VirtIO. The talk will also provide simpler alternatives based on shared memory and interrupt notifications to set up domain-to-domain data streams: simpler techniques that are easily exploitable both by Linux and by tiny baremetal applications as well.
Analyze Virtual Machine Overhead Compared to Bare Metal with TracingScyllaDB
The document compares the performance of running a MySQL database benchmark (Sysbench) on virtual machines versus bare metal machines. On Fedora, the benchmark achieved 6-7% higher transactions per second, queries per second, and lower latency when run on the bare metal host compared to the virtual machine guest. Similarly, on Debian, the benchmark achieved significantly higher transactions per second (over 500 vs under 80) and lower latency when run on bare metal. Tracing tools like trace-cmd can be used to analyze the additional overhead introduced by the virtualization layer.
Intuit_payment_system_Craft_Demo_slide.pdfHaeyoon Jo
Haeyoon Jo gave a presentation on a payment system craft demo at Intuit. The presentation included an introduction of Haeyoon and his achievements in DevOps and MLOps. It then demonstrated the architecture of a payment system using microservices with RabbitMQ for queuing, REST APIs, and risk engines. The demo discussed continuous integration/delivery using Jenkins and GitHub Actions to deploy to ECR. It also covered infrastructure automation with Terraform, horizontal scaling with EKS/ECS, and using Aurora MySQL for the database. The presentation concluded with a question and answer session.
The document discusses RAID level 5, which stripes data and parity across all disks rather than dedicating a single disk to parity. This allows write operations to be parallelized across disks for improved performance compared to RAID level 4. Key advantages of RAID 5 include high data protection, support for multiple simultaneous reads and writes, and optimized performance for transaction processing workloads. The document also compares the performance characteristics and suitability of different RAID levels.
Benefits of Operating an On-Premises InfrastructureRebekah Rodriguez
Despite the rapid evolution and growth of public cloud usage, enterprises are finding value in on-premises IT infrastructure. As a result, some organizations are moving their workloads back, partially or entirely, to their own data centers. In fact, according to a survey conducted by IDC, over ½ of the IT spent on servers and storage is still driven by on-prem deployments, and over 70% of those surveyed said they plan to repatriate workloads back from public cloud to an On-Prem Infrastructure.
High-Performance Big Data Analytics with RDMA over NVM and NVMe-SSDinside-BigData.com
In this deck from the 2018 OpenFabrics Workshop, Xiaoyi Lu from OSU presents: High-Performance Big Data Analytics with RDMA over NVM and NVMe-SSD.
"The convergence of Big Data and HPC has been pushing the innovation of accelerating Big Data analytics and management on modern HPC clusters. Recent studies have shown that the performance of Apache Hadoop, Spark, and Memcached can be significantly improved by leveraging the high-performance networking technologies, such as Remote Direct Memory Access (RDMA). Most of these studies are based on `DRAM+RDMA' schemes. On the other hand, Non-Volatile Memory (NVM) and NVMe-SSD technologies can support RDMA access with low-latency, high-throughput, and persistence on HPC clusters. NVMs and NVMe-SSDs provide the opportunity to build novel high-performance and QoS-aware communication and I/O subsystems for data-intensive applications. In this talk, we propose new communication and I/O schemes for these data analytics stacks, which are designed with RDMA over NVM and NVMe-SSD. Our studies show that the proposed designs can significantly improve the communication, I/O, and application performance for Big Data analytics and management middleware, such as Hadoop, Spark, Memcached, etc. In addition, we will also discuss how to design QoS-aware schemes in these frameworks with NVMe-SSD."
Watch the video: https://wp.me/p3RLHQ-iyB
Learn more: http://web.cse.ohio-state.edu/~lu.932/
and
https://www.openfabrics.org/index.php/2018-ofa-workshop-presentations.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Virtualization with KVM (Kernel-based Virtual Machine)Novell
As a technical preview, SUSE Linux Enterprise Server 11 contains KVM, which is the next-generation virtualization software delivered with the Linux kernel. In this technical session we will demonstrate how to set up SUSE Linux Enterprise Server 11 for KVM, install some virtual machines and deal with different storage and networking setups.
To demonstrate live migration we will also show a distributed replicated block device (DRBD) setup and a setup based on iSCSI and OCFS2, which are included in SUSE Linux Enterprise Server 11 and SUSE Linux Enterprise 11 High Availability Extension.
CEPH DAY BERLIN - UNLIMITED FILESERVER WITH SAMBA CTDB AND CEPHFSCeph Community
The presentation shows the setup of an unlimited file service cluster running Samba CTDB and using CephFS as the backend storage. It will show that using clustered Samba can achieve very high redundancy combined with the near limitless storage size of a Ceph storage system.
Should I use more, smaller instances, or fewer, bigger instances? Is 1Gbps enough for my network cards? Should I use batches? Can I have a collection with 3GB in size? Those are just some of the many questions we see users asking themselves on a daily basis over our mailing list, slack, and corporate ticket requests. In this talk, I will explore the answers to these common questions and help you make sure that your deployment is up to the highest standards.
Percona Xtrabackup provides fully open-source, high-performance, non-blocking backups for MySQL databases. It can create full or incremental backups of InnoDB or MyISAM tables with features like parallel backups, compression, point-in-time recovery, and streaming backups. The backups can be applied using the innobackupex command line tool to restore databases efficiently.
Vincent Van der Kussen discusses KVM and related virtualization tools. KVM is a kernel module that allows Linux to function as a hypervisor. It supports x86, PowerPC and s390 architectures. Key tools discussed include libvirt (the virtualization API), virsh (command line tool for libvirt), Qemu (runs virtual machines), and virt-tools like virt-install. The document provides an overview of using these tools to manage virtual machines and storage.
The document discusses the Linux DMA Engine. It describes the key components of DMA controllers and different types of DMA transfers like contiguous and scatter-gather. It outlines the steps to perform a DMA transfer using the Linux DMA Engine API, including allocating a DMA channel, preparing descriptors, submitting transactions and starting the transfer. Finally, it provides references to learn more about the Linux DMA Engine.
MySQL Group Replication is a new 'synchronous', multi-master, auto-everything replication plugin for MySQL introduced with MySQL 5.7. It is the perfect tool for small 3-20 machine MySQL clusters to gain high availability and high performance. It stands for high availability because the fault of replica don't stop the cluster. Failed nodes can rejoin the cluster and new nodes can be added in a fully automatic way - no DBA intervention required. Its high performance because multiple masters process writes, not just one like with MySQL Replication. Running applications on it is simple: no read-write splitting, no fiddling with eventual consistency and stale data. The cluster offers strong consistency (generalized snapshot isolation).
It is based on Group Communication principles, hence the name.
The document discusses different RAID levels for storing data across multiple disks. It provides details on RAID levels 0 through 6, including the minimum number of drives required, how data and parity are distributed, and example diagrams. The benefits of RAID include preventing data loss from disk failures through techniques like mirroring, striping, and parity.
This document discusses the configuration of various server services, including:
- Setting up an Apache web server with SSL encryption and generating SSL certificates.
- Additional Apache configurations like virtual hosting, CGI scripts, and SELinux contexts.
- Basic SMTP configuration using Postfix and setting up an internal mail server.
- Configuring a caching-only DNS server using Named.
- Setting up NFS for file sharing between servers.
- Enabling file sharing with Windows clients using Samba (CIFS).
- Configuring an anonymous FTP server with vsftpd.
It provides instructions and examples for configuring each of these services on Linux servers.
The document discusses various methods of backing up and recovering Unix systems. It describes full and incremental backups, different backup levels in HP-UX, and common backup and recovery methods like fbackup, tar, cpio, dump/restore, and pax. Graph files can be used with fbackup to selectively backup included files and directories. The frecover command restores backups created with fbackup. Tar supports backups larger than 2GB and can create archive files. Cpio works with other commands to support multiple volume backups of large file systems. Dump copies data to tape and restore reconstructs file systems from dump backups. Pax provides portable archiving of directory hierarchies.
Information Technology Disaster Recovery Guide - ABC Bank (redacted)Stephen White
This document provides a disaster recovery guide for ABC Bank. It outlines ABC Bank's current IT infrastructure, which includes servers and applications located across multiple sites. It then details the objectives, risks, preparation, and procedures for recovering ABC Bank's IT systems and services in the event of a disaster that impacts the primary data center. The plan defines the disaster recovery team and processes for activating the plan, assessing damage, restoring backups, and recovering critical systems and applications from the disaster recovery site.
Static partitioning is becoming increasingly common in embedded. A static hypervisor, such as Xen dom0less, is employed to split the hardware resources into multiple domains and run a different OS in each domain. For instance, Linux and Zephyr. Only the simplest static partitioning configurations don't involve any data exchanges between the domains. Often, communication and data exchanges between two or more environments are required to complete the data processing pipeline that implements the target application. However, the VM-to-VM communication mechanisms available in static partitioning configurations are typically more limited compared to general-purpose hypervisors. For example, PV drivers are not available to Xen dom0less domains. This presentation will discuss the need for communication in static partitioning setups and it will present the technical challenges involved in getting traditional communication methods to work, including Xen PV drivers and VirtIO. The talk will also provide simpler alternatives based on shared memory and interrupt notifications to set up domain-to-domain data streams: simpler techniques that are easily exploitable both by Linux and by tiny baremetal applications as well.
Analyze Virtual Machine Overhead Compared to Bare Metal with TracingScyllaDB
The document compares the performance of running a MySQL database benchmark (Sysbench) on virtual machines versus bare metal machines. On Fedora, the benchmark achieved 6-7% higher transactions per second, queries per second, and lower latency when run on the bare metal host compared to the virtual machine guest. Similarly, on Debian, the benchmark achieved significantly higher transactions per second (over 500 vs under 80) and lower latency when run on bare metal. Tracing tools like trace-cmd can be used to analyze the additional overhead introduced by the virtualization layer.
Intuit_payment_system_Craft_Demo_slide.pdfHaeyoon Jo
Haeyoon Jo gave a presentation on a payment system craft demo at Intuit. The presentation included an introduction of Haeyoon and his achievements in DevOps and MLOps. It then demonstrated the architecture of a payment system using microservices with RabbitMQ for queuing, REST APIs, and risk engines. The demo discussed continuous integration/delivery using Jenkins and GitHub Actions to deploy to ECR. It also covered infrastructure automation with Terraform, horizontal scaling with EKS/ECS, and using Aurora MySQL for the database. The presentation concluded with a question and answer session.
The document discusses RAID level 5, which stripes data and parity across all disks rather than dedicating a single disk to parity. This allows write operations to be parallelized across disks for improved performance compared to RAID level 4. Key advantages of RAID 5 include high data protection, support for multiple simultaneous reads and writes, and optimized performance for transaction processing workloads. The document also compares the performance characteristics and suitability of different RAID levels.
Benefits of Operating an On-Premises InfrastructureRebekah Rodriguez
Despite the rapid evolution and growth of public cloud usage, enterprises are finding value in on-premises IT infrastructure. As a result, some organizations are moving their workloads back, partially or entirely, to their own data centers. In fact, according to a survey conducted by IDC, over ½ of the IT spent on servers and storage is still driven by on-prem deployments, and over 70% of those surveyed said they plan to repatriate workloads back from public cloud to an On-Prem Infrastructure.
High-Performance Big Data Analytics with RDMA over NVM and NVMe-SSDinside-BigData.com
In this deck from the 2018 OpenFabrics Workshop, Xiaoyi Lu from OSU presents: High-Performance Big Data Analytics with RDMA over NVM and NVMe-SSD.
"The convergence of Big Data and HPC has been pushing the innovation of accelerating Big Data analytics and management on modern HPC clusters. Recent studies have shown that the performance of Apache Hadoop, Spark, and Memcached can be significantly improved by leveraging the high-performance networking technologies, such as Remote Direct Memory Access (RDMA). Most of these studies are based on `DRAM+RDMA' schemes. On the other hand, Non-Volatile Memory (NVM) and NVMe-SSD technologies can support RDMA access with low-latency, high-throughput, and persistence on HPC clusters. NVMs and NVMe-SSDs provide the opportunity to build novel high-performance and QoS-aware communication and I/O subsystems for data-intensive applications. In this talk, we propose new communication and I/O schemes for these data analytics stacks, which are designed with RDMA over NVM and NVMe-SSD. Our studies show that the proposed designs can significantly improve the communication, I/O, and application performance for Big Data analytics and management middleware, such as Hadoop, Spark, Memcached, etc. In addition, we will also discuss how to design QoS-aware schemes in these frameworks with NVMe-SSD."
Watch the video: https://wp.me/p3RLHQ-iyB
Learn more: http://web.cse.ohio-state.edu/~lu.932/
and
https://www.openfabrics.org/index.php/2018-ofa-workshop-presentations.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Virtualization with KVM (Kernel-based Virtual Machine)Novell
As a technical preview, SUSE Linux Enterprise Server 11 contains KVM, which is the next-generation virtualization software delivered with the Linux kernel. In this technical session we will demonstrate how to set up SUSE Linux Enterprise Server 11 for KVM, install some virtual machines and deal with different storage and networking setups.
To demonstrate live migration we will also show a distributed replicated block device (DRBD) setup and a setup based on iSCSI and OCFS2, which are included in SUSE Linux Enterprise Server 11 and SUSE Linux Enterprise 11 High Availability Extension.
CEPH DAY BERLIN - UNLIMITED FILESERVER WITH SAMBA CTDB AND CEPHFSCeph Community
The presentation shows the setup of an unlimited file service cluster running Samba CTDB and using CephFS as the backend storage. It will show that using clustered Samba can achieve very high redundancy combined with the near limitless storage size of a Ceph storage system.
Should I use more, smaller instances, or fewer, bigger instances? Is 1Gbps enough for my network cards? Should I use batches? Can I have a collection with 3GB in size? Those are just some of the many questions we see users asking themselves on a daily basis over our mailing list, slack, and corporate ticket requests. In this talk, I will explore the answers to these common questions and help you make sure that your deployment is up to the highest standards.
Percona Xtrabackup provides fully open-source, high-performance, non-blocking backups for MySQL databases. It can create full or incremental backups of InnoDB or MyISAM tables with features like parallel backups, compression, point-in-time recovery, and streaming backups. The backups can be applied using the innobackupex command line tool to restore databases efficiently.
Vincent Van der Kussen discusses KVM and related virtualization tools. KVM is a kernel module that allows Linux to function as a hypervisor. It supports x86, PowerPC and s390 architectures. Key tools discussed include libvirt (the virtualization API), virsh (command line tool for libvirt), Qemu (runs virtual machines), and virt-tools like virt-install. The document provides an overview of using these tools to manage virtual machines and storage.
The document discusses the Linux DMA Engine. It describes the key components of DMA controllers and different types of DMA transfers like contiguous and scatter-gather. It outlines the steps to perform a DMA transfer using the Linux DMA Engine API, including allocating a DMA channel, preparing descriptors, submitting transactions and starting the transfer. Finally, it provides references to learn more about the Linux DMA Engine.
MySQL Group Replication is a new 'synchronous', multi-master, auto-everything replication plugin for MySQL introduced with MySQL 5.7. It is the perfect tool for small 3-20 machine MySQL clusters to gain high availability and high performance. It stands for high availability because the fault of replica don't stop the cluster. Failed nodes can rejoin the cluster and new nodes can be added in a fully automatic way - no DBA intervention required. Its high performance because multiple masters process writes, not just one like with MySQL Replication. Running applications on it is simple: no read-write splitting, no fiddling with eventual consistency and stale data. The cluster offers strong consistency (generalized snapshot isolation).
It is based on Group Communication principles, hence the name.
The document discusses different RAID levels for storing data across multiple disks. It provides details on RAID levels 0 through 6, including the minimum number of drives required, how data and parity are distributed, and example diagrams. The benefits of RAID include preventing data loss from disk failures through techniques like mirroring, striping, and parity.
This document discusses the configuration of various server services, including:
- Setting up an Apache web server with SSL encryption and generating SSL certificates.
- Additional Apache configurations like virtual hosting, CGI scripts, and SELinux contexts.
- Basic SMTP configuration using Postfix and setting up an internal mail server.
- Configuring a caching-only DNS server using Named.
- Setting up NFS for file sharing between servers.
- Enabling file sharing with Windows clients using Samba (CIFS).
- Configuring an anonymous FTP server with vsftpd.
It provides instructions and examples for configuring each of these services on Linux servers.
When you design your microservices strategy you will likely come up with patterns for when and how your services should execute. Traditional container scheduling services often deal with running container instances and distributing those instances across your cluster according to resource constraints – but your microservices design may also have other requirements such as message-based services that run and listen for topics; services that run on a scheduled job cycle; and services that may run in different ways based on initialization and have many instances running in parallel at any given time. This session looks at architecture patterns for container-based solutions; and illustrates the execution of these patterns with Docker containers and related tools. Concepts are platform independent but demos will be based on Kafka and Azure Container Service with Mesosphere DC/OS, Mesos, Marathon and Chronos.
Things I've learned working with Docker SupportSujay Pillai
This document provides instructions for backing up and restoring a Docker Enterprise installation including Docker Swarm, UCP, and DTR. It outlines the components included in each backup, prerequisites, and procedures for backing up each component while services are running. Containers are proposed for automating regular backups of UCP to a mounted volume. Exclusions from backups are also noted such as application data and image files stored externally.
Building and Testing Puppet with Dockercarlaasouza
This document discusses using Docker containers to build and test Puppet code. It describes setting up a Docker container to mimic a production environment by specifying hostname, custom facts, and operating system. Tests can then be run by applying Puppet manifests within the container. The document also outlines using tools like rspec-puppet and beaker for additional testing and code reviews.
JDO 2019: Tips and Tricks from Docker Captain - Łukasz LachPROIDEA
The document provides tips and tricks for using Docker including:
1) Installing Docker on Linux in an easy way allowing choice of channel and version.
2) Setting up a local Docker Hub mirror for caching and revalidating images.
3) Using docker inspect to find containers that exited with non-zero codes or show commands for running containers.
4) Organizing docker-compose files with extensions, environment variables, anchors and aliases for well structured services.
This document contains C++ code implementing a thread pool with lock-based and lock-free designs for parallel task processing. It includes tasks for parallel search using the thread pools and SIMD for further parallelization. The thread pool manages task queues, thread allocation/deallocation, and synchronization mechanisms like mutexes and condition variables. It allows pushing tasks to be executed asynchronously by worker threads.
How we used ruby to build locaweb's cloud (http://presentations.pothix.com/ru...Willian Molinari
**The slides are not correctly rendered. The HTML/Javascript version is here: http://presentations.pothix.com/rubyconf2013/**
This presentation shows what we have done with Ruby to create Locaweb's cloud computing product.
Beyond Golden Containers: Complementing Docker with Puppetlutter
Often, Docker or more generally containers and immutable infrastructure are viewed as a replacement for configuration management. This talk explains why that is not the case, and that they are in fact complementary.
Containers move the challenges that configuration management solves to different places in the application lifecycle. The talk explains where Puppet fits into this changed lifecycle, and what tools Puppet provides there.
Slides for a talk I gave at the Linux Foundation Colaboration Summit 2015
Apache Con NA 2013 - Cassandra Internalsaaronmorton
The document provides an overview of the architecture and internals of Apache Cassandra. It discusses the client-facing API layer including Thrift, CQL, JMX, and CLI. It then covers the Dynamo layer which handles messaging, distributed hash tables, replication strategies, and gossip protocols. Finally, it summarizes the database layer for managing tables, columns, memtables, SSTables, and read/write paths.
Code testing and Continuous Integration are just the first step in a source code to production process. Combined with infrastructure-as-code tools such as Puppet the whole process can be automated, and tested!
Apache Cassandra in Bangalore - Cassandra Internals and Performanceaaronmorton
Cassandra internals and performance was presented. The key points covered include:
1) Cassandra has a layered architecture with APIs, a Dynamo layer, and a database layer. The Dynamo layer implements the Dynamo paper and handles replication and failure handling.
2) The database layer includes the memtable, SSTables, commit log and more. It handles writes, flushes, compactions and reads from storage.
3) A number of performance tests were shown measuring the impact of configuration parameters like memtable flush queue size, commit log sync period, and secondary indexes on write and read latency. Bloom filters, compactions and concurrency were also discussed.
New Docker Features for Orchestration and ContainersJeff Anderson
- Swarm mode in Docker Engine allows clustering of Docker hosts into a single virtual Docker engine with features like services, scaling, global services, and constraints.
- Services allow deploying replicated applications on a swarm using the docker service command and benefit from features like rolling updates, restarts on failure, and scaling.
- The routing mesh provides load balancing, service discovery, and transparent rerouting of traffic between nodes and containers.
PuppetConf 2017: Use Puppet to Tame the Dockerfile Monster- Bryan Belanger, A...Puppet
You want to create an application? Great. Download a Docker image and install all your stuff. Sounds like a lot of work, huh? Wait, you also need to be able to patch your container too? That Dockerfile will become a Frankenfile! Well, guess what: Puppet has a an answer for you. Using Docker, Puppet and Jenkins we will show you how you can: 1. Put all your code in an easy to use project. 2. Give yourself a powerful toolkit for configuration 3. Automate your builds 4. Allow your project to automate security updates / patches
The document discusses troubleshooting CloudStack. It covers troubleshooting for CloudStack developers and administrators. For developers, it discusses error codes, debugging tips, system virtual machine troubleshooting and port usage. For administrators, it discusses installation, configuration, log analysis, important parameters, best practices, reusing hypervisors and the CloudStack database. The document also provides references and information on getting involved in the CloudStack community.
Securing Prometheus exporters using HashiCorp VaultBram Vogelaar
Things like Infrastructure as Code, Service Discovery and Config Management can and have helped us to quickly build and rebuild infrastructure but we haven't nearly spend enough time to train our self to review, monitor and respond to outages. Does our platform degrade in a graceful way or what does a high cpu load really mean? What can we learn from level 1 outages to be able to run our platforms more reliably.
This talk will focus on on creating a secure prometheus exporter ecosystem using HashiCorp Vault where we can we be sure that we are not leaking any business metrics from our observability stack. After which we ll investigate how to automatically rotate the certificates we created to do so.
Get hands-on with security features and best practices to protect your containerized services. Learn to push and verify signed images with Docker Content Trust, and collaborate with delegation roles. Intermediate to advanced level Docker experience recommended, participants will be building and pushing with Docker during the workshop.
Led By Docker Security Experts:
Riyaz Faizullabhoy
David Lawrence
Viktor Stanchev
Experience Level: Intermediate to advanced level Docker experience recommended
fog or: How I Learned to Stop Worrying and Love the Cloud (OpenStack Edition)Wesley Beary
The document discusses how to use the Fog library to interact with cloud services. Fog allows interacting with multiple cloud providers like AWS, Rackspace, etc in a portable way. It provides models, collections, and methods to manage resources like servers, storage, DNS etc. in an abstracted way across providers. The document demonstrates how to boot a server, install SSH keys, run commands via SSH, and ping a target using the Fog and Ruby APIs in just a few lines of code.
UI5con 2024 - Bring Your Own Design SystemPeter Muessig
How do you combine the OpenUI5/SAPUI5 programming model with a design system that makes its controls available as Web Components? Since OpenUI5/SAPUI5 1.120, the framework supports the integration of any Web Components. This makes it possible, for example, to natively embed own Web Components of your design system which are created with Stencil. The integration embeds the Web Components in a way that they can be used naturally in XMLViews, like with standard UI5 controls, and can be bound with data binding. Learn how you can also make use of the Web Components base class in OpenUI5/SAPUI5 to also integrate your Web Components and get inspired by the solution to generate a custom UI5 library providing the Web Components control wrappers for the native ones.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Drona Infotech is a premier mobile app development company in Noida, providing cutting-edge solutions for businesses.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
Malibou Pitch Deck For Its €3M Seed Roundsjcobrien
French start-up Malibou raised a €3 million Seed Round to develop its payroll and human resources
management platform for VSEs and SMEs. The financing round was led by investors Breega, Y Combinator, and FCVC.
Artificia Intellicence and XPath Extension FunctionsOctavian Nadolu
The purpose of this presentation is to provide an overview of how you can use AI from XSLT, XQuery, Schematron, or XML Refactoring operations, the potential benefits of using AI, and some of the challenges we face.
Consistent toolbox talks are critical for maintaining workplace safety, as they provide regular opportunities to address specific hazards and reinforce safe practices.
These brief, focused sessions ensure that safety is a continual conversation rather than a one-time event, which helps keep safety protocols fresh in employees' minds. Studies have shown that shorter, more frequent training sessions are more effective for retention and behavior change compared to longer, infrequent sessions.
Engaging workers regularly, toolbox talks promote a culture of safety, empower employees to voice concerns, and ultimately reduce the likelihood of accidents and injuries on site.
The traditional method of conducting safety talks with paper documents and lengthy meetings is not only time-consuming but also less effective. Manual tracking of attendance and compliance is prone to errors and inconsistencies, leading to gaps in safety communication and potential non-compliance with OSHA regulations. Switching to a digital solution like Safelyio offers significant advantages.
Safelyio automates the delivery and documentation of safety talks, ensuring consistency and accessibility. The microlearning approach breaks down complex safety protocols into manageable, bite-sized pieces, making it easier for employees to absorb and retain information.
This method minimizes disruptions to work schedules, eliminates the hassle of paperwork, and ensures that all safety communications are tracked and recorded accurately. Ultimately, using a digital platform like Safelyio enhances engagement, compliance, and overall safety performance on site. https://safelyio.com/
Liberarsi dai framework con i Web Component.pptxMassimo Artizzu
In Italian
Presentazione sulle feature e l'utilizzo dei Web Component nell sviluppo di pagine e applicazioni web. Racconto delle ragioni storiche dell'avvento dei Web Component. Evidenziazione dei vantaggi e delle sfide poste, indicazione delle best practices, con particolare accento sulla possibilità di usare web component per facilitare la migrazione delle proprie applicazioni verso nuovi stack tecnologici.
How Can Hiring A Mobile App Development Company Help Your Business Grow?ToXSL Technologies
ToXSL Technologies is an award-winning Mobile App Development Company in Dubai that helps businesses reshape their digital possibilities with custom app services. As a top app development company in Dubai, we offer highly engaging iOS & Android app solutions. https://rb.gy/necdnt
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsPeter Muessig
The UI5 tooling is the development and build tooling of UI5. It is built in a modular and extensible way so that it can be easily extended by your needs. This session will showcase various tooling extensions which can boost your development experience by far so that you can really work offline, transpile your code in your project to use even newer versions of EcmaScript (than 2022 which is supported right now by the UI5 tooling), consume any npm package of your choice in your project, using different kind of proxies, and even stitching UI5 projects during development together to mimic your target environment.
8 Best Automated Android App Testing Tool and Framework in 2024.pdfkalichargn70th171
Regarding mobile operating systems, two major players dominate our thoughts: Android and iPhone. With Android leading the market, software development companies are focused on delivering apps compatible with this OS. Ensuring an app's functionality across various Android devices, OS versions, and hardware specifications is critical, making Android app testing essential.
Microservice Teams - How the cloud changes the way we workSven Peters
A lot of technical challenges and complexity come with building a cloud-native and distributed architecture. The way we develop backend software has fundamentally changed in the last ten years. Managing a microservices architecture demands a lot of us to ensure observability and operational resiliency. But did you also change the way you run your development teams?
Sven will talk about Atlassian’s journey from a monolith to a multi-tenanted architecture and how it affected the way the engineering teams work. You will learn how we shifted to service ownership, moved to more autonomous teams (and its challenges), and established platform and enablement teams.
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
Using Query Store in Azure PostgreSQL to Understand Query PerformanceGrant Fritchey
Microsoft has added an excellent new extension in PostgreSQL on their Azure Platform. This session, presented at Posette 2024, covers what Query Store is and the types of information you can get out of it.
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...kalichargn70th171
In today's business landscape, digital integration is ubiquitous, demanding swift innovation as a necessity rather than a luxury. In a fiercely competitive market with heightened customer expectations, the timely launch of flawless digital products is crucial for both acquisition and retention—any delay risks ceding market share to competitors.
Hand Rolled Applicative User ValidationCode KataPhilip Schwarz
Could you use a simple piece of Scala validation code (granted, a very simplistic one too!) that you can rewrite, now and again, to refresh your basic understanding of Applicative operators <*>, <*, *>?
The goal is not to write perfect code showcasing validation, but rather, to provide a small, rough-and ready exercise to reinforce your muscle-memory.
Despite its grandiose-sounding title, this deck consists of just three slides showing the Scala 3 code to be rewritten whenever the details of the operators begin to fade away.
The code is my rough and ready translation of a Haskell user-validation program found in a book called Finding Success (and Failure) in Haskell - Fall in love with applicative functors.
7. API for Perl and REST
for my $domain ($rvd->list_domains) {
if ($domain->is_active) {
$domain->shutdown();
}
}
8. Tested Sources
t/vm/h10_hybernate.t ............ ok
t/vm/h20_hybernate_req.t ........ ok
t/vm/m10_freemem.t .............. # Testing free mem on KVM
t/vm/m10_freemem.t .............. ok
t/vm/m20_memory.t ............... # Testing free mem on KVM
t/vm/m20_memory.t ............... ok
t/vm/n10_nat.t .................. ok
t/vm/n20_name.t ................. ok
t/vm/t10_timeout.t .............. # Testing timeout for KVM
t/vm/t10_timeout.t .............. ok
t/vm/v10_volatile.t ............. 3/? # Testing volatile for KVM
t/vm/v10_volatile.t ............. ok
t/vm/v20_volatile_clones.t ...... 2/? # Testing volatile clones for KVM
t/vm/v20_volatile_clones.t ...... ok
t/vm/z_101.t .................... 394/? # Testing KVM VM
t/vm/z_101.t .................... ok
t/void/00_create.t .............. ok
All tests successful.
Files=93, Tests=10852, 1845 wallclock secs
Result: PASS
Disk Image deployment
Expensive maintenance
Hardware must be renewed
Explicar el dia a dia en un aulari: diferents sistemes operatius, diferents software, tot ha de funcionar. Dificultat d’aplicar canvis a tot el parc de PCs
Easier maintenance
Fast deploy
Reduced hardware expense
BYOD (Bring Your Own Device)
Roam device
ATAWAD ( Any Time, AnyWhere, Any Device )
Interface molt simple per l’usuari final: Llistat de màquinas i posar en marxa
Requeriments: Un navegador i un petit client
L’accés es pot filtrar per LDAP
Requires a server with Debian or Ubuntu Server.
MariaDB will be installed along Ravada but an external database can be used.
LDAP server is optional but it provides more users management features
A partir de Github ho tenim tot:
el web del projecte
documentació
codi que inclou les traduccions
Tot ve d’un issue:
fix
feature
question
Hem rebut col·laboracions espontànies d’arreu del món: Brasil, Canadà, Alemanya, India, Indonèsia. Ens han enviat sense demanar-ho, traduccions a l’indonesi, portugués, françes i revisions de l’anglés.