Endless' mission is to make computing universally accessible. We are reaching the next billion users through Endless OS, an easy-to-use operating syste designed to excel in areas with poor internet connectivity.
It's easy to criticize Equifax, but what does your open source process look like? Beyond a single vulnerability or product, what is the proper process to mitigate risk for open source software and still drive innovation? What role do vendors play? The technologists of today should learn a collaborative approach to open source usage and development at work.
The Salt Reactor drives the autonomous application of SaltStack systems management jobs providing asynchronous, event-driven task execution. . The demo in this session will show how a Salt Beacon event triggers the Salt Master for powerful and intelligent automation via the Salt Reactor system.
Developers are often challenged to deliver results that are hard to implement using simple SQL queries. Fortunately, complex SQL capabilities exist in the SQL standards. Common table expressions allow for imperative control of query results, while window functions allow row results to reference values in other rows of the data set. This tutorial shows how to use both of these SQL features to generate complex data results.
"Serverless" functions allow users to easily create services from source code without dealing with packaging, deployment, scaling and other aspects related to the management of the underlying infrastructure. Fission is an open source serverless function framework. Users write functions and map them to event sources, such as HTTP requests, timers, Kubernetes watches, and message queues.
Data is the raw material, sensors are natural resources, workflows are recipes, flash storage is cookware, the rotating disk is Tupperware. The majority of organizations underestimate the importance of data management. Granted, it is not trivial. And not that fun. Or is it?
Capture the Flag tournaments have long been used to test hacker skills but they can also serve as effective security training for developers. I’ll share a case study where I turned teams of developers with no prior security training against each other in a CTF cloud arena featuring their own applications and watched them rack up points as they popped shells in each other’s applications and filed bugs in our bug tracker. I’ll cover rules, scoring, and the preliminary training leading up to the CTF tournament as well as how I set up the arena and the results of my own CTF tournament.
Git is a powerful, flexible, distributed source control management system. With the power that Git gives the end user it is possible to create logs with commits which are simple to understand with changes described clearly, commits germane to a single atomic feature or bug fix, and unlikely to contain unintended consequences. With a clean commit history bugs and regressions can be clearly undersood and found using automated tools. These principles are required for patch submissions to the kernel and other F/OSS projects.
IoT is a mess of security problems, in fact there isn't a facet of the IoT world that isn't a security nightmare, and yet we are rushing as quickly as we can to deploy this amazingly powerful, and cheap, devices as quickly as possible. Given that IoT's future is rather bleak, with ip cameras participating in DDoS attacks, TVs listening to your conversations, and devices that are completely reliant on the cloud, this is intended as a discussion of what we can do, and what is being seen in live deployments.
Learn Kubernetes basics through a series of hands-on command-line interactions.
This interactive session involves using kubectl to learn about kubernetes APIs and the basic abstractions provided for modeling distributed solutions. By the end of this workshop you’ll be deploying, scaling, and automating container-based solutions using open source tools for distributed computing.
To follow along, bring a laptop with: http://bit.ly/scale-k8s#/laptop-setup