Users of Big Data oriented datastores want to process millions of operations per second in a latency-sensitive manner. To achieve these kind of performance, the kernel can be a friend with whom we ally, or a foe who we bypass.
In this talk we will present the internal architecture of the Scylla datastore--a C++ from-scratch reimplementation of the popular Apache Cassandra with a performance baseline not previously seen in the NoSQL world. Attendees will learn about what Linux interfaces are employed in modern datastores and why and which trade offs usually go with them.
IPv6 has often been Characterized by those looking to minimize the FUD surrounding deployment as "96 more bits, no magic." In fact, minimizing the differences afforded by the 96 bits undersells the proposition of a new expansive address space. In this presentation we describe how fastly leverages IPv6 address space, as well as how we retrofit concepts gleaned from our IPv6 experience onto the legacy IPv4 network with it’s necessarily more limited resources. This talk covers changes that affect provisioning, security, dos protection, and availability.
The high-tech industry has revolutionized healthcare, but how can we ensure that patients retain control over personal data, are empowered to use open formats, and can access data using FOSS tools?
Right now there are 3 allocators for compressed objects (zbud, zsmalloc, z3fold) and 2 main users of these allocators (zswap, zram). However, you can't normally have all 6 combinations due to the restrictions of zram implementation which will be proved artificial in this talk.
Apart from that and the performance and compression ratio comparisons for the allocators mentioned, we'll discuss the ongoing z3fold streamlining work, such as evaluating lock-less lists, per-CPU lists, wider use of atomic operations, bit read-write locks and implementing support for movable z3fold pages.
Your developers have built the node.js application, now it is finished and ready for production. You will need to get it running in Kubernetes.
The Internet today is plagued by many problems. From viruses and spam, to identity theft and piracy.
We can solve those problems.
With a virtual operating system that runs the cloud, using blockchains to secure identities and data, a virtual network layer to protect agains unauthorized network access, and a virtual machine to sandbox untrusted code.
This talk will describe Elastos, an Operating System for the smart web.
It will explore the approach that Elastos takes to achieve these goals, and gives a vision of a possible future internet.
How do breakpoints work? How does single stepping work? All tools that you may use in day-to-day life, but do you actually know how they work? During this talk, we will deepdive into the numerous tools Linux exposes that you can use to check and modify the state of another running process. Of course, most of it wouldn't be possible with just Linux support, so we will also have a brief look at the available hardware support
Embedded devices are all around us and have become deeply "embedded" into our daily lives : from micro controllers to "smart"-watches, routers and televisions, they are all around us. Many of us don't think twice about the root of control in these devices or even the software that runs on them. In some cases, manufactures lock users out from controlling these devices and cause a security nightmare when they stop supporting them. This session will cover a range of topics including : what libreCMC is, the project's goals and why Free Software is crucial in securing control and freedom.