Skip to main content
Main menu
●Home
●CFP
●Schedule
●Special Events
●Streaming Video
●Information
●Registration




Subscribe to our newsletters
Confirm your email address
Intermediate
Unity is the new desktop for Ubuntu, and like all new things there are tips and tricks on how to use it that can be useful for getting things accomplished. Join me as I explore using this desktop with an eye on power user techniques and show you all the nooks and crannies of Unity.
Audience:
Beginner
Intermediate
Categories:
Ubucon
●Read more about The Power User's Guide to Unity
Additional Speakers:
SpamapS
juju Charm School is an event where a juju expert is available to answer questions about writing your own juju charms. The intended audience are people who deploy software and want to contribute charms to the wider devops community to make deploying in the public and private cloud easy. Though not required, we recommend that you have juju installed and configured if you want to get deep into the event.
Attendees are more than welcome to:
●Ask questions about juju and charms
●Ask for help modifying existing scripts and make charms out of them
●Ask for peer review on existing charms you might be working on.
Sponsored by Canonical:
Audience:
Intermediate
Categories:
Sponsored
●Read more about juju Charm School
Sometimes tools like PING and Traceroute aren’t enough to isolate the cause of network problems.
This class will take a hands-on approach to learning how to use the Wireshark protocol analyzer to analyze network traffic. Numerous examples will be used throughout the day to walk the attendees though the process of filtering out those packets that are working well and drilling down to those that are at the root of the problem.
Attendees will be provided with a CD containing open source network troubleshooting tools, as well as the trace files used in the class. Laptops are required
Course Outline:
Installing and Configuring Wireshark
Using Display Filters
Using Capture Filters
Isolating the cause of slow data transfers
Running Wireshark from the command-line
Building a capture to disk appliance
Who Should Attend:
Network Administrators
Network Analysts
Server Administrators
Desktop Administrators
Network Managers
Note: This class is part of the SCALE University Program and requires an additional fee. Please remember to select the "SCALE University" addon at registration.
Audience:
Intermediate
Categories:
ScaleU
●Read more about CANCELLED - Deep Packet Inspection Using Wireshark
We will start with an examination of the pros and cons of different base operating systems as well as off-the-shelf NAS servers (both hardware and software). We will look at the more popular RAID levels and the impacts of software vs. hardware RAID implementations, data reliability, and rebuild time. We'll spend some time exploring ZFS. Attention will be paid to backups and some of the more common protocols used for accessing data from a NAS server.
In the later part of the class we will use a ready-made software implementation of a file server to delve into the potential issues involved in setup and maintenance of the server.
Note: This class is part of the SCALE University Program and requires an additional fee. Please remember to select the "SCALE University" addon at registration.
Audience:
Intermediate
Categories:
ScaleU
●Read more about NASes for the Masses
SmartOS is an open source distribution of illumos, currently in production for Joyent's public cloud, where it provides a hypervisor that is secure, flexible and observable. It leverages technologies such as ZFS snapshots and clones for rapid provisioning, KVM and Zones for hardware and OS virtualization, and DTrace to safely understand what's going on inside of guests and the hypervisor. This talk will describe these technologies and their use, including engineering challenges encountered, and discuss opportunities for observing guests such as Linux and Windows.
Audience:
Intermediate
Categories:
Kernel
●Read more about Using SmartOS as a Hypervisor
Cloud Computing introduces new challenges for performance analysis, for both customers and operators of the cloud. Apart from monitoring a scaling environment, issues within a system can be complicated when tenants are competing for the same resources, and are invisible to each other. Other factors include rapidly changing production code and wildly unpredictable traffic surges. For performance analysis in the Joyent public cloud, we use a variety of tools including Dynamic Tracing, which allows us to create custom tools and metrics and to explore new concepts. I'll discuss a collection of these tools and the metrics that they measure. While these are DTrace-based, the focus of the talk is on which metrics are proving useful for analyzing real cloud issues.
Audience:
Intermediate
Categories:
Kernel
●Read more about Performance Analysis: New Tools and Concepts from The Cloud
Real-time I/O is important in embedded systems as many of the systems are used for Process Control. There are 2 approaches to handling real-time: 1) the Kernel Approach: using RTAI, Xenomi, or PREEMPT_RT and 2) the Hardware Approach: Embedded Micro, FPGA/CPLD (programmable logic). This session will cover the current status of Real-time I/O, and discuss the technical merits of both Kernel and Hardware approaches to handling Real-time I/O and the advantages and disadvantages of each approach. Current best practices also will be discussed with examples of Latency and Jitter in Real-time I/O and how they effect performance and outcome of processes controlled by the Linux System. Examples will be from 3D printing and light CNC.
Audience:
Intermediate
Categories:
Kernel
●Read more about State of Real-time I/O Processing in Embedded Linux Systems
Additional Speakers:
mpatlasov
One of the feature differences between hypervisors and containers is the ability to store a virtual machine image in a single file, since most containers exist as a chroot within the host OS rather than as fully independent entities. However, the ability to save and restore state in a machine image file is invaluable in managing virtual machine lifecycles in the data centre. This talk will début a new loopback device which gives all the advantages of virtual machine images by storing the container in a file while preserving the benefits of sharing significant portions with the host OS. We will compare and contrast the technology with the traditional loopback device and LVM, and describe a few features of a new loopback useful in container snapshotting and live migration. This talk will be technical in nature but should be accessible to people interested in cloud, virtualisation and container technologies.
Audience:
Intermediate
Categories:
Cloud and Virtualization
●Read more about Reinventing Linux loopback device for clouds
nginx can sit between the web browser and the web server. In this position it can offload some of the work for the web server(s). In addition to caching data, nginx can handle URL rewriting, data compression, byte ranges, chunked responses, image resizing, SSL and many other tasks. nginx has support for virtual hosts and can proxy for multiple groups of web servers. nginx can also proxy for IMAP, SMTP and POP3 mail protocols including all three protocols over SSL. In October of 2011, Netcraft claimed that nginx has more than 11%[0] of the web server market and is growing. Learn about the up and coming web server that has already arrived.
[0] http://news.netcraft.com/archives/2011/10/06/october-2011-web-server-sur...
Audience:
Intermediate
Categories:
SysAdmin
●Read more about nginx: Proxy Your Web Servers for Better Performance
This presentation will begin with an introduction to the concepts of "owner", "group", and "other" as well as "read", "write", and "execute" permissions. We will discuss how these permissions affect files and directories differently. With real examples, we will see how complications and undesired access can arise from different permission settings. A survey of common permissions schemes will be made. The SUID, SGID, and the "sticky bit" will be introduced as means of surmounting common security issues in collaborative directories. With a firm conceptual foundation in place, Access Control Lists can be discussed as a means of fine-tuning access granted by standard permissions. The presentation will close with a dicsusssion of how to implement, manage, and determine ACLs.
Audience:
Intermediate
Categories:
SysAdmin
●Read more about File Security: Lock Down Your Data
Pages
●1
●2
●next ﹀
●last »
●About SCALE
●Contact Us
●Press
●Terms and Conditions
© 2002-2012 Linux Expo of Southern California. All Rights Reserved.