Presentations

der hans
Audience: Intermediate
Topic: SysAdmin

Example driven introduction to regular expressions. The talk uses plain English to explain regular expression concepts, syntax and language. Common tools such as grep, sed and awk will provide conduits for demonstrating regular expressions.

Many of our favorite system administration tools use regular expressions for text matching. While using plain English to describe regular expressions the example driven introduction will explain regular expression concepts, syntax and language. Examples will include common tools such as grep, sed and awk.

Brad Urani
Audience: Intermediate
Topic: General

When designing a database for your application, what looks like the best solution can be a trap. Join us as we expose these database anti-patterns. We'll model shoes at a fictional shoe store and show both a basic design and more flexible alternatives. We'll discuss how to represent trees, and see that the simplest solution is the slowest and hardest to query. We'll explore scenarios where a polymorphic relationship looks like a good choice, but isn't (and one where it is). Learn these pitfalls before falling into them, and save yourself from sloppy querying and poor performance

Steven Wong
Audience: Intermediate

This talk will cover options for using containers and open source platforms to deploy apps and backing services, in a way that will run in an on premises datacenter, but still be portable, largely unchanged, to public clouds.

We will survey and compare popular orchestrators, and address what is possible, enhancements underway now, and limitations that still exist. We will also cover and compare some popular orchestrator distributions, touching on how they address installations and “day 2” operations like updates and adding new capacity to an existing cluster.

Clint Byrum
Audience: Developer
Topic: Developer

Rust is a new and exciting systems programming language promising strong typing, cost free abstractions, and fearless concurrency. Some of these hard problems have plagued all programming languages for years. We'll talk about why Rust helps you think about other programming languages more accurately, why Rust helps you communicate with your team, and how you can help test some actual Rust code every day to help the Mozilla foundation improve Firefox.

Phil Dibowitz
Audience: Everyone
Topic: General

SCALE has grown a lot in its 16 years. Last year we had 11 tracks, plus installfests, gamenights, BoFs, and a myriad of hosted events. It's a big place and whether you're a 16 year veteran or a newcomer, it can be overwhelming. This will be a talk about how to get the most out of SCALE. We'll cover the kinds of things SCALE has to offer and tips to make sure you make the best of your time here.

Joel Jaeggli
Audience: Everyone
Topic: SysAdmin

IPv6 has often been characterized by those looking to minimize the FUD surrounding deployment as "96 more bits, no magic." In fact, minimizing the differences afforded by the 96 bits undersells the proposition of a new expansive address space. In this presentation we describe how fastly leverages IPv6 address space, as well as how we retrofit concepts gleaned from our IPv6 experience onto the legacy IPv4 network with it’s necessarily more limited resources. This talk covers changes that affect provisioning, security, dos protection, and availability.

Tracy Reed
Audience: Everyone
Topic: Security

Twistlock's Tracy Reed will walk through the guidelines in SP 800-190 and what they mean for organizations deploying containers. For each recommendation, he will outline specific configuration recommendations to ensure compliance and best practices. He will also highlight how organizations can leverage functionality provided by container-focused orchestration and security platforms.

Stefano Stabellini
Audience: Everyone
Topic: Security

Hypervisors were once seen as purely cloud and server technologies, but have slowly seeped into the embedded space providing extra layers of security. This discussion will showcase how companies from security vendors to automotive are using open source hypervisors (particularly Xen Project) to secure embedded systems, what challenges they face and how they have overcome them. We will also explore the new open source efforts in this space and their impact on IoT at large. We will show how to get started quickly in securing your embedded system with a hypervisor-first approach.

Anthony Chow
Audience: Everyone
Topic: Embedded

IoT edge device are more useful and powerful if connect with other devices, IoT Gateway or even with the cloud. MQTT is a popular lightweight publish/subscribe messaging protocol for the IoT ecosystem that sits on top of the TCP protocol stack. This session will give an introduction to what MQTT is, show how to use TLS to encrypt the data in transit for the protocol and also using OAuth2 to create a framework to authenticate and authorize which device or entity can participate in the communication.

Drew Moseley
Audience: Beginner
Topic: Embedded

We will dive into the Jeep Cherokee hack and understand the lessons learned from that and how to best protect against hacks in the future for the Linux-based connected car.