Presentations
Example driven introduction to regular expressions. The talk uses plain English to explain regular expression concepts, syntax and language. Common tools such as grep, sed and awk will provide conduits for demonstrating regular expressions.
Many of our favorite system administration tools use regular expressions for text matching. While using plain English to describe regular expressions the example driven introduction will explain regular expression concepts, syntax and language. Examples will include common tools such as grep, sed and awk.
When designing a database for your application, what looks like the best solution can be a trap. Join us as we expose these database anti-patterns. We'll model shoes at a fictional shoe store and show both a basic design and more flexible alternatives. We'll discuss how to represent trees, and see that the simplest solution is the slowest and hardest to query. We'll explore scenarios where a polymorphic relationship looks like a good choice, but isn't (and one where it is). Learn these pitfalls before falling into them, and save yourself from sloppy querying and poor performance
This talk will cover options for using containers and open source platforms to deploy apps and backing services, in a way that will run in an on premises datacenter, but still be portable, largely unchanged, to public clouds.
We will survey and compare popular orchestrators, and address what is possible, enhancements underway now, and limitations that still exist. We will also cover and compare some popular orchestrator distributions, touching on how they address installations and “day 2” operations like updates and adding new capacity to an existing cluster.
Rust is a new and exciting systems programming language promising strong typing, cost free abstractions, and fearless concurrency. Some of these hard problems have plagued all programming languages for years. We'll talk about why Rust helps you think about other programming languages more accurately, why Rust helps you communicate with your team, and how you can help test some actual Rust code every day to help the Mozilla foundation improve Firefox.
SCALE has grown a lot in its 16 years. Last year we had 11 tracks, plus installfests, gamenights, BoFs, and a myriad of hosted events. It's a big place and whether you're a 16 year veteran or a newcomer, it can be overwhelming. This will be a talk about how to get the most out of SCALE. We'll cover the kinds of things SCALE has to offer and tips to make sure you make the best of your time here.
IPv6 has often been characterized by those looking to minimize the FUD surrounding deployment as "96 more bits, no magic." In fact, minimizing the differences afforded by the 96 bits undersells the proposition of a new expansive address space. In this presentation we describe how fastly leverages IPv6 address space, as well as how we retrofit concepts gleaned from our IPv6 experience onto the legacy IPv4 network with it’s necessarily more limited resources. This talk covers changes that affect provisioning, security, dos protection, and availability.
Twistlock's Tracy Reed will walk through the guidelines in SP 800-190 and what they mean for organizations deploying containers. For each recommendation, he will outline specific configuration recommendations to ensure compliance and best practices. He will also highlight how organizations can leverage functionality provided by container-focused orchestration and security platforms.
Hypervisors were once seen as purely cloud and server technologies, but have slowly seeped into the embedded space providing extra layers of security. This discussion will showcase how companies from security vendors to automotive are using open source hypervisors (particularly Xen Project) to secure embedded systems, what challenges they face and how they have overcome them. We will also explore the new open source efforts in this space and their impact on IoT at large. We will show how to get started quickly in securing your embedded system with a hypervisor-first approach.
IoT edge device are more useful and powerful if connect with other devices, IoT Gateway or even with the cloud. MQTT is a popular lightweight publish/subscribe messaging protocol for the IoT ecosystem that sits on top of the TCP protocol stack. This session will give an introduction to what MQTT is, show how to use TLS to encrypt the data in transit for the protocol and also using OAuth2 to create a framework to authenticate and authorize which device or entity can participate in the communication.
We will dive into the Jeep Cherokee hack and understand the lessons learned from that and how to best protect against hacks in the future for the Linux-based connected car.